CFP last date
20 May 2024
Reseach Article

Big Data Security with Access Control Model and Honeypot in Cloud Computing

by Jahanara Akhtar, Md. Tahzib-Ul-Islam, Md. Habibullah Belali, Saiful Islam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 33
Year of Publication: 2019
Authors: Jahanara Akhtar, Md. Tahzib-Ul-Islam, Md. Habibullah Belali, Saiful Islam
10.5120/ijca2019919207

Jahanara Akhtar, Md. Tahzib-Ul-Islam, Md. Habibullah Belali, Saiful Islam . Big Data Security with Access Control Model and Honeypot in Cloud Computing. International Journal of Computer Applications. 178, 33 ( Jul 2019), 16-20. DOI=10.5120/ijca2019919207

@article{ 10.5120/ijca2019919207,
author = { Jahanara Akhtar, Md. Tahzib-Ul-Islam, Md. Habibullah Belali, Saiful Islam },
title = { Big Data Security with Access Control Model and Honeypot in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2019 },
volume = { 178 },
number = { 33 },
month = { Jul },
year = { 2019 },
issn = { 0975-8887 },
pages = { 16-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number33/30751-2019919207/ },
doi = { 10.5120/ijca2019919207 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:52:07.216060+05:30
%A Jahanara Akhtar
%A Md. Tahzib-Ul-Islam
%A Md. Habibullah Belali
%A Saiful Islam
%T Big Data Security with Access Control Model and Honeypot in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 33
%P 16-20
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Big data typically coins with large volume of data and various enterprises are involving day to day in cloud environment. Nowadays, Cloud facility adoption has enlarged. With the acceptance of cloud facility, numerous of the enterprises are expending to store and process Large Data in cloud. Safety methods provided by the facility providers might not be sufficient to safe the data in the cloud. Enterprise as well as users are suffering with proper security aspect to store, retrieve and process big data in cloud environment. An access control model with honeypot is presented in this paper. Access control model deals with various parameters of authentication, log etc. Various link and areas are included as honeypot to catch hackers or unauthorized users.

References
  1. Pedro Calderira Neves, Bradley Schmerl, Jorge Bernardino, and Javier Camara., “Big Data in Cloud Computing: Features and Issues”, International Conference on Internet of Things and Big Data, Jan 2016.
  2. Richard Branch, Heather Tjeerdsma, Cody Wilson, Richard Hurley, and Sabine McConnell., “Cloud Computing and Big Data: A Review of Current Service Models and Hardware Perspectives”, Journal of Software Engineering and Applications, 2014, 7, 686-693.
  3. Elmustafa Sayed Ali Ahmed and Rashid A. Saeed., “A Survey of Big Data Cloud Computing Security”, International Journal of Computer Science and Software Engineering (IJCSSE), vol 3, issue 1, December 2014, pp. 78-85.
  4. Linda K. Breggin, et al.(editors). “Big Data, big challenges in Evidence-based policy making”, 2014, West Academic Press.
  5. James Kobielus., “Deployment in Big Data Analytics Applications to the Cloud: Road Map for Success”, Cloud Standards Customer Council, Technical report, 2014.
  6. “Impact of cloud computing on Healthcare, Version 2.0”, Cloud Standards Customer Council, Technical Report, February 2017. Alan Keeso., “Big Data and Environmental Sustainability: A Conversation Starter”, Smith School Working Paper series, working paper 14-04, 2014.
  7. Yan Zh., Hongxin Hu, Gail-Joon Ahn, Dijiang Huang, and Shanbiao Wang., ”Towards Temporal Access Control in Cloud Computing”, Proceedings of IEEE INFOCOM, 2012.
  8. Yuhong Liu, Jung Ryoo, and Syed Rizvi., “Ensuring Data Confidentiality in cloud Computing: An Enryption and Trust-based Solution”, Proceedings of IEEE 23rd Wireless and Optimal Communication Conference (WOCC), 2014.
  9. Young-Gi Min, Hyo-Jin Shin, and Young Hwan Bang., “Cloud Computing Security Issues and Access Control Solutions”, Journal of Engineering, 9, 2, 2012.
  10. Ali Gholami and Ervin Laure., “Big Data Security and Privacy Issues in the Cloud”, Int. J. of Network Security & its Applications (IJNSA), vol. 8, No.1, Jan 2016, pp. 59-79.
  11. Marcos D. Asuncao, Rodrigo N. Calheiros, Silvia Bianchi, Marco A. S. Netto, and Rajkumar Buyya., “Big Data Computing and Clouds: Trends and future directions”, J. parallel Distributed Computing, 79- 80, 2015, pp.3 15.
  12. Venkata Narasimha Inukollu, Sailaja Arsi, and Srinivasa Rao Ravuri., “Security Issues Associated with Big Data in Cloud Computing”, Int. J. of Netork Security & its Applications (IJNSA), Vol. 6, N0.3, May 2014, pp. 45-56.
  13. R. Saranya and V. P. Muthukumar., “Security issues associated with big data in cloud computing”, Int. J. of multidisciplinary and development, vol. 2, issue.4, April 2015, pp. 580-585.
  14. Avodele, O., Izang A. A., Kuyoro. S. O., and Osisanwo, F.Y., “Big Data and Cloud Computing Issues”, Int. J. of Computer Applications (0975 – 8887), vol 133, no.12, Jan 2016, pp.14 – 19. Ramgovind, S., and Smith, E., “The Management of Security in Cloud Computing”, IEEE Information Security for South Africa (ISSA), 2010.
  15. Dimitrios Z., and Dimitrios, L., “Addressing cloud computing security issues”, Future Generation Computer Systems 28 (2012) 583–592 Dimitrios, Zissis. And Dimitrios, L., “Addressing cloud computing security issues”, Future Generation Computer Systems, 28 (2012) 583–592.
  16. Dawn, x. S., David, W. and Adrian, P., “Practical Techniques for Searches on Encrypted Data”, IEEE Symposium on Security and Privacy, 2000, pp. 44-55.
  17. Jangala Sasi Kiran, M. Sravanthi, K. Preethi, and M. Anusha., “Recent Issues and Challenges on Big Data in Cloud Computing”, IJCCCSSST, Vol.6, issue.2, June 2015, pp. 98-102.
  18. Shehnila Z., Najeed A. K., and Mohsin Ali Memon., “Systematic Analysis of Risks in Cloud Architecture”, Int. J. computer Science and Information Security (IJCSIS), vol. 14, no.11, November 2016.
  19. D Wallner, E. Harder, and R. Agee, “Key Management for Multicast: Issues and Architectures”, RFC 2627, June 1999. K. Gai, L. Qiu, M. Chen, H. Zhao, and M. Qiu., "SA-EAST: securityaware efficient data transmission for ITS in mobile heterogeneous cloud computing", ACM Transactions on Embedded Computing Systems, Vol. 16, No. 2, Article 60, Publication date: January 2017.
  20. K. Gai and M. Qiu., "Blend Arithmetic Operations on Tensor-based Fully Homomorphic Encryption Over Real Numbers", IEEE Transactions on Industrial Informatics, December 2017.
  21. K. Gai, M. Qiu,and H. Zhao., "Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing", IEEE Transactions on Big Data, May 18, 2017.
  22. Y. B Reddy., “Big Data Security in Cloud Environment”, 2018 4th IEEE International Conference on Big Data Security on Cloud, pp. 100-106, May 2018.
  23. AUTHORS PROFILE
  24. Mst. Jahanara Akhtar is now serving as an Associate Professor of the department of Computer Science and Engineering, Dhaka International University, Dhaka, Bangladesh. She is a Research Fellow (PhD) in the department of Computer Science and Engineering, Jahangirnagar University, Dhaka, Bangladesh. Jahanara completed B.Sc in Electronics & Computer Science and M.Sc. in Computer Science and Engineering from Jahangirnagar University. She has publications in national and international conference
  25. Md. Tahzib-Ul-Islam is currently serving as an Assistant Professor of Computer Science and Engineering department, Dhaka International University, Dhaka, Bangladesh. He is a M.Sc. student in the Institute of Information and Technology, University of Dhaka, Dhaka, Bangladesh. Tahzib completed B.Sc in Computer Science and Engineering in Department of Computer Science and Engineering from University of Dhaka. He published research papers in national and international conference and journals. His re
  26. Md. Habibullah Belali is currently serving as an Asistant Professor of Computer Science and Engineering department, Dhaka International University, Dhaka, Bangladesh. Habibullah completed B.Sc. in Computer Science and Engineering from University of Dhaka. He has publications in national and international conference and journals. His research interest includes Image Processing, Data Mining and Advance Database.
  27. Saiful Islam is currently pursuing his Ph.D. in Computer Science and Engineering degree in Dhaka University of Engineering and Technology (DUET), Gazipur, Bangladesh. Saiful completed B.Sc. in CSE and M.Sc. in EEE from Dhaka University of Engineering and Technology (DUET), Gazipur, Bangladesh. He also completed M.Sc. in ICT from Bangladesh University of Engineering and Technology (BUET), Bangladesh. He has several publications in national and international conference and journals. His research i
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Big Data Honeypot Cloud data Security Access Control Model.