Академический Документы
Профессиональный Документы
Культура Документы
ABSTRACT
Cloud computing is a latest computational system which
can be used for big data processing. Huge amount of
unstructured, structured and semi structured data can be
called as big data. Map-Reduce and the Hadoop facilitate
an affordable mechanism to handle and process data
from multiple sources and store the big data in
distributed cloud. This paper explains the secured and
cost minimizing approach to move and store very large
amount of data to cloud. Hyper elliptic cryptography is
introduced in this paper to provide encryption to the
huge amount of data arriving to the cloud. In addition to
cryptography, data download module is included. So the
paper mainly covers cost minimization in moving big
data and the security of the big data.
Keywords- Big Data, Cloud Computing, Hyper Elliptic
Curve Cryptography, Online Algorithm
1. INTRODUCTION
Cloud computing is simply a service over the internet to
store gigantic amount of data that our computers or
single server cannot hold and facilitate services of
computer over the Internet. That is it provides server
resources such as storage, bandwidth and CPU to users.
Its desirable feature is on demand supply of server
resources and minimized management effort. Cloud
platform is a collection/group of software and internet
infrastructure integrated and hardware that are inter
connected. The software - hardware services of cloud
computing are available to enterprises, corporations,
businesses markets and public.
Essential characteristics of cloud computing are on
demand self-service, rapid elasticity, broad network
access, resources pooling and measured service. Massive
Scale,
Geographic
Distribution,
Homogeneity,
Virtualization, Low Cost Software, Resilient computing
are some of the common features of cloud computing.
Big data analysts concentrated their work more in the
analyzing and processing of big data. Before analyzing,
it is necessary to store the data in a storage area. As we
know, the big data is intensively larger in volume, so the
2. RELATED WORKS
A series of recent work studies application migration to
the cloud. The following are some of the related works
on cloud computing and big data.
Big Data is not just Hadoop [1]. This paper
summarizes Hadoop as a cost-efficient platform and it
has the ability to significantly lower the cost of certain
workloads. Organizations may have particular pain
around reducing the overall cost of their data warehouse.
Certain groups of data may be seldom used and possible
candidates to offload to a lower-cost platform. Certain
operations such as transformations may be offloaded to a
more cost efficient platform. The primary area of value
creation is cost savings. By pushing workloads and data
sets onto a Hadoop platform, organizations are able to
preserve their queries and take advantage of Hadoops
cost-effective processing capabilities. One customer
example, a financial services firm, moved processing of
applications and reports from an operational data
warehouse to Hadoop Hbase; they were able to preserve
their existing queries and reduce the operating cost of
their data management platform.
A tunable workflow scheduling algorithm based on
particle swarm optimization for cloud computing [2]
explains that Cloud computing provides a pool of
virtualized computing resources and adopts pay-per-use
model. Schedulers for cloud computing make decision
on how to allocate tasks of workflow to those virtualized
computing resources. In this paper, a flexible particle
swarm optimization (PSO) based scheduling algorithm
to minimize both total cost and make span is presented.
Experiment is conducted by varying computation of
www.ijsret.org
554
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 5, May 2015
3. METHODOLOGY
3.1 PROBLEM DEFINITION
This work is focused on providing security in big data in
cloud which arrives from data centers. Current
approaches concentrate in big data analysis, and
constraints regarding moving big data to cloud system.
The proposed method is focused on encryption of data in
cloud, downloading of data from cloud. The encryption
method proposed here is Hyper Elliptic Curve
Cryptography. The downloading module includes a
clustering system to simplify the bottlenecks in
downloading.
3.2
SYSTEM DESIGN
We consider a cloud consisting of K geo-distributed data
centers in a set of regions K, where K = |K|. A cloud user
(e.g., a global astronomical telescope application)
continuously produces large volumes of data at a set D
www.ijsret.org
555
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 5, May 2015
www.ijsret.org
556
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 5, May 2015
y(t)) at time t (to make sure that the migration cost is not
too excessive). If a change of migration data center is
indicated (y(t) = y(t 1)), the algorithm accepts the new
aggregation decision, and migrates data accordingly. In
all other cases, the aggregation data center remains
unchanged from t1, while optimal data routing paths
are computed given this aggregation decision, for upload
of new data generated in t.
The Online Algorithm:
1: t = 1;
2: t = 1; //Time slot when the last change of aggregation
data center happens
3: Compute data routing decision x(1) and aggregation
decision_y(1) by minimizing C(x(1), y(1));
4: Compute C1 MG(y(1), y(0)) and C1 MG(x(1),y(1));
5: while t T do
6: if Ct MG(y(t), y(t1)) 1 2 t1 =t CMG(x(),
y()) then
7: Derive x(t) and y(t) by minimizing Ct MG(x(t), y(t))
and constraint Ct MG(y(t), y(t1)) 1Ct MG(x(t),
y(t));
8: if y(t) = y(t 1) then
9: Use the new aggregation data center indicated by y(t);
10: t = t;
11: if t < t then //not to use new aggregation data center
12: y(t) = y(t 1), compute data routing decision x(t)
if not derived;
13: t = t + 1;
3.2.4 HYPER ELLIPTIC CURVES
A hyper elliptic curve C of genus g outlined over a field
Fq of characteristic p is given by associate degree
equation of the form
y2 + h(x)y = f(x)
where h(x) and f(x) square measure polynomials with
coefficients in Fq, with deg h(x) g and deg f(x) = 2g +
one. an extra demand is that C isn't a singular curve. If
h(x) = zero and p > a pair of this amounts to the
necessity that f(x) could be a square free polynomial. In
general, the condition is that there aren't any x and y in
the pure mathematics closure of Fq that satisfy the
equation (1) and also the 2 partial derivatives 2y + h(x) =
zero and h (x)y f (x) = 0.
3.2.5 SCHEMES
Signature schemes, encryption schemes and key
agreement schemes are the schemes which can base on
elliptic and hyper elliptic curves.
Diffie-Hellman Key Agreement Scheme: Two
parties Sender and Receiver wish to agree on a common
secret by communicating over a public channel. An
eavesdropper Interrupter, who can listen to all
www.ijsret.org
557
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 5, May 2015
4. RESULTS
We compare the performance of our scheme with the
previous paper. The previous paper didnt use any
security measures for storing the big data in cloud. This
paper employed encryption for the big data which gives
more advantage and efficiency to the system. The
computation and communication overhead when we
used the encryption to entire file (n) and randomly
choose file(c) is shown in the TABLE 1. It is much
lesser but provides great achievement to the work.
Table 1. Comparison of Overheads
n = 100,000
c = 460
Computation Overhead
13.15 sec
0.21 sec
Communication
2.11 MB
30.37 KB
Overhead
Signature generation time, extra storage space on
signatures are also evaluated with some other previous
works which uses another encryption method and the
result is obtained as shown in the TABLE 2.
Table 2. Comparison of Signature Complexity
[12]
[13]
Signature Generation
149.08
142.72 20.28
Time (ms)
Extra storage space on
2
20
32.8
signatures (MB)
5. CONCLUSION
In this paper, we used an efficient security system for the
big data in the cloud. So the data in the cloud kept
safely. The encryption method used is the Hyper Elliptic
Curve Cryptosystem with use the mathematical concepts
of Hyper Elliptic Curve to encrypt the data. This work is
www.ijsret.org
558
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 4, Issue 5, May 2015
[12]
[13]
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
www.ijsret.org
B. Wang, B. Li, and H. Li, Oruta: PrivacyPreserving Public Auditing for Shared Data in the
Cloud, in IEEE Cloud, June 2012, pp. 295302.
B. Wang, B. Li, and H. Li, Knox: PrivacyPreserving Auditing for Shared Data with Large
Groups in the Cloud, in ACNS, 2012, pp. 507- 525.
559