[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content

Advertisement

Log in

Secure and efficient data storage scheme for unstructured data in hybrid cloud environment

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Enterprises are increasingly adopting cloud for their storage and computations due to various benefits like cost, availability, etc. It is important to ensure the security and privacy of the cloud to accelerate this adoption. Hybrid cloud is a solution to address these requirements of security and privacy. Hybrid cloud uses a mix of public, private, and managed cloud with a single access interface to the users. Security and privacy are addressed in hybrid cloud through data partitioning and data distribution depending on the sensitivity of the data and reliability of the cloud. Many solutions have been proposed for partitioning structured data, but there are very few works addressing the partitioning and distribution of unstructured data. With unstructured data, gaining importance in various applications like sentiment prediction, recommendation based on reviews, emails, etc. ensuring security and privacy of unstructured through partitioning and distribution has become highly relevant. In this work, a secure and efficient data storage scheme for unstructured data is proposed based on hybrid cloud architecture.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data availability

Not Applicable.

References

  • Cheng H, Rong C, Hwang K, Wang W, Li Y (2015) Secure big data storage and sharing scheme for cloud tenants. China Commun 12(6):106–115. https://doi.org/10.1109/CC.2015.7122469

    Article  Google Scholar 

  • Colombo M, Asal R, Hieu QH, Ali El-Moussa F, Sajjad A, Dimitrakos T (2019) Data protection as a service in the multi-cloud environment. In: 2019 IEEE 12th international conference on cloud computing (CLOUD), Milan, Italy, pp 81–85. https://doi.org/10.1109/CLOUD.2019.00025

  • Dobre D, Viotti P, Vukolić M (2014) Hybris: robust hybrid cloud storage. In: Proceedings of the ACM symposium on cloud computing, SOCC '14, pp 12:1–12:14, New York, NY, USA. ACM

  • Jo H, Kim Y, Lee H, Lee YC, Han H, Kang S (2019) On the trade-off between performance and storage efficiency of replication-based object storage. In: 2019 IEEE international conference on cloud computing technology and science (CloudCom), pp 301–304

  • Khan SI, Qadir Z, Munawar HS, Nayak SR, Budati AK, Verma KD, Prakash D (2021) UAVs path planning architecture for effective medical emergency response in future networks. Phys Commun 47:101337. https://doi.org/10.1016/j.phycom.2021.101337

    Article  Google Scholar 

  • Le D-N, Seth B, Dalal S (2018) A hybrid approach of secret sharing with fragmentation and encryption in cloud environment for securing outsourced medical database: a revolutionary approach. J Cyber Secur Mobil 7:379–408. https://doi.org/10.13052/jcsm2245-1439.742

    Article  Google Scholar 

  • Leistikow R, Tavangarian D (2013) Secure picture data partitioning for cloud computing services. In: 27th international conference on advanced information networking and applications workshops (WAINA), Barcelona, pp 668–671, https://doi.org/10.1109/WAINA.2013.157

  • Li J, Lin D, Squicciarini AC, Li J, Jia C (2017) Towards privacy-preserving storage and retrieval in multiple clouds. IEEE Trans Cloud Comput 5(3):499–509. https://doi.org/10.1109/TCC.2015.2485214

    Article  Google Scholar 

  • Manoharan JS (2021) A Novel User Layer Cloud Security Model based on Chaotic Arnold Transformation using Fingerprint Biometric Traits. J Innovat Image Process (JIIP) 3(01):36–51

    Article  Google Scholar 

  • Mikolov, Sutskever I, Chen K, Corrado GS, Dean J (2013) Distributed representations of words and phrases and their compositionality. In: Advances in neural information processing systems, pp 3111–3119

  • Papaioannou TG, Bonvin N, Scalia KA (2012) An adaptive scheme for efficient multi-cloud storage. In: Proceedings of the international conference on high performance computing, networking, storage and analysis, SC '12, pp 20:1–20:10, Los Alamitos, CA, USA. IEEE Computer Society Press

  • Rafique A, Van Landuyt D, Reniers V, Joosen W (2017) Towards an adaptive middleware for efficient multi-cloud data storage. InL Proceedings of the 4th workshop on crosscloud infrastructures & platforms (Crosscloud'17). Association for Computing Machinery, New York, NY, USA, Article 4, 1–6. https://doi.org/10.1145/3069383.3069387

  • Reddy VS, Rao BT (2017) A combined clustering and geometric data perturbation approach for enriching privacy preservation of healthcare data in hybrid clouds. Int J Eng Syst

  • Samundiswary S, Dongre NM (2017) Object storage architecture in cloud for unstructured data. Int Conf Invent Syst Control (ICISC) 2017:1–6

    Google Scholar 

  • Shakya S (2019) An efficient security framework for data migration in a cloud computing environment. J Artif Intell 1(01):45–53

    Google Scholar 

  • Suwansrikham P, She K (2019) Protection of big data privacy on multiple cloud providers by asymmetric security scheme. In: Proceedings of the 2019 2nd international conference on data storage and data engineering (DSDE 2019). Association for Computing Machinery, New York, NY, USA, 47–53

  • Wang T, Zhou J, Chen X, Wang G, Liu A, Liu Y (2018) A Three-layer privacy preserving cloud storage scheme based on computational intelligence in fog computing. IEEE Trans Emerg Top Comput Intell 2(1):3–12

    Article  Google Scholar 

  • Wu H, Wang Q, Wolter K (2013) Mobile healthcare systems with multi-cloud offloading. In: IEEE 14th international conference on mobile data management (MDM), vol 2, Milan, Itali, pp 668–671. https://doi.org/10.1109/MDM.2013.92

  • Zhang X, Yang C, Nepal S, Liu C, Dou W, Chen J (2013) A MapReduce based approach of scalable multidimensional anonymization for big data privacy preservation on cloud. In: Proceedings of 3rd international conference on cloud and green computing, IEEE, pp 105–112

  • Zobaed SM, Ahmad S, Gottumukkala R, Salehi MA (2019) ClustCrypt: privacy-preserving clustering of unstructured big data in the cloud. In: 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp 609–616

Download references

Funding

No Funding is provided for the preparation of Manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sridhar Reddy Vulapula.

Ethics declarations

Conflict of interest

We would like to declare that no conflict of Interest.

Additional information

Communicated by Joy Iong-Zong Chen.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vulapula, S.R., Valiveti, H.B. Secure and efficient data storage scheme for unstructured data in hybrid cloud environment. Soft Comput 26, 13145–13152 (2022). https://doi.org/10.1007/s00500-022-06977-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-022-06977-1

Navigation