You are on page 1of 7

2018 4th IEEE International Conference on Big Data Security on Cloud

Big Data Security in Cloud Environment


Yenumula B Reddy
Department of Computer Science; Grambling State University, Grambling, LA 71245, USA
Email: ybreddy@gram.edu; URL: http://www.symbolicscience.com

Abstract - Big data conventionally coins large volume of computing power as required. Cloud services provide
data that continuously increases in a real-time basis and difficult infrastructure, software, and platform as services.
to store, retrieve, and process in traditional database techniques.
But it is necessary to know that big data is unstructured and does
Cloud computing allows for the storing and processing of
not follow the conventional storage retrieval methods. The sizable unstructured volume of continuously generated data,
challenges are to store in a cloud, process, and develop resource availability, and fault tolerance through its various
meaningful form so that it is useful to the businesses, hardware and software facilities. Many companies including
government, and customers. This paper discusses the current Nokia, RedBus, Google, IBM, Amazon, and Microsoft
challenges to store, retrieve, process, and implement security provide consumers with on-demand services. The big
requirements, and possible solutions. We further provide the business decided to migrate to Hadoop distributed file system
security model in a dynamic cloud environment to store, (HDFS) that integrates data into one domain and uses
process and retrieve the data. supplicated algorithms to get proper results to customers. The
advantage of using Hadoop is cheaper storage compared to
KEYWORDs - Big data, cloud computing, big data issues, big data traditional databases. Currently, HDFS helps Nokia, RedBus,
security, access rights, cloud environment, authentication, Google, and other companies to fulfill their needs. The facility
sensitive data.
supports these companies to concentrate on their businesses
1. INTRODUCTION rather than on technical details and requirements.
The word big data coined recently and became popular Big Data technology solves many problems irrespective
due to its capabilities for storage (beyond the size of the of volume, velocity, and source of generation. It is a
standard database), retrieval, analysis, and to produce useful constantly changing technology, and many industries,
results. It is an unstructured, vast volume, continuously customers, and government agencies are involved in its usage
growing on a real-time basis, and difficult to process. and management. Further, if the data is in a cloud
Technology changes influence the classification changes of environment, the user access level management, privacy
such data over a period. Therefore, its definition changes time policies, user accountability and service provider
to time and organization to organization (making it difficult accountability comes into the primary responsibility of cloud
to have a perfect definition). Every organization has vested management.
interested in the classification of such unstructured data. As
Due to this reason, we need to create security policies,
the technology changed from computers to hand devices, the
access rights, secure storage, and retrieval methods. Due to
processing became a big problem. Due to this reason, cloud
continuously growing of data, control is required to keep the
requirement exists. Cloud can store a large volume of data,
valuable data. Therefore, we need to enforce data governance
complex computations, and generation of customer output.
policies like organizational practices, operational practices,
Cloud requirement for big data must consider its size, a and relational practices.
different type of data from multiple sources, the velocity of
Disaster recovery (in the case of dangerous accidents
its flow (incoming and outgoing), potential value if properly
including floods, earthquakes, fire, and accidental loss of
classified and processed, and confidentiality. Cloud
data) for valuable data is a requirement. The big corporations
computing is a paradigm with unlimited on-demand services.
define a set of procedures for a disaster recovery plan to
It can virtualize hardware and software resources, high
restore the data. In addition to security policies, disaster
processing power, storage, and pay-per-usage. Moreover, it
recovery is strongly recommended (fault-tolerance depends
transfers cost calculation responsibilities to the provider and
on disaster recovery). Other issues include the secure transfer
minimizes the great setup of computing facilities at small
of data to the cloud, incorporating high-performance
enterprises. It has negotiable natural resources and gets
computing, and data management. Big data in the cloud has
many research and practical challenges. Storing the data using
encryption technique takes extra time. Standardization of

978-1-5386-4399-0/18/$31.00 ©2018 IEEE 100


DOI 10.1109/BDS/HPSC/IDS18.2018.00033
procedures is required to minimize the impact of collaboration, sustainability to organizations to big data
heterogeneous data. Data governess, recovery plans, quality efforts, and emerging business models.
of services for secure transfer of data, and petaflop computing
Yan et al. [8] discussed the access control in cloud
are some of the problems with implementation.
computing. The paper presents the temporal access control in
The successful deployment of big data on cloud requires cloud computing using encryption techniques. Yuhong et al.
building a business case with an appropriate strategic plan to [9] examine data confidentiality in cloud computing. The
use the cloud. The project must develop productivity, extract article uses the trust-based evaluation encryption model. In
more significant value, continuous improvement, customer this model, the trust factor decides the access control of user
acquisition, satisfaction, loyalty, and security. Assessment of status. Young et al. [10] discussed the security issues in cloud
a suitable cloud environment (private or public) and computing and described the access control requirements,
development of a technical approach are also necessary. Next, authentication and ID management in the cloud.
address the governance, privacy, security, risk, and
Ali and Erwin [11] reviewed security and privacy issues
accountability requirements. Finally, the operational
on big data and cloud aspects. They concluded that cloud data
environment can be developed. The provider meets many
privacy and safety is based on the cloud provider. They also
challenges depending on the cloud data environment.
discussed big data security challenges and cloud security
Security, cost factor, customer satisfaction, and service
challenges. Their paper examines the security policy
reliability are primary issues.
management and big data infrastructure and programming
2. LITERATURE REVIEW models. They did not suggest any particular model but
Storage, processing, and retrieval of big data in the cloud discussed all possible solutions for the security of big data in
are significant problems in current research. Pedro et al. [1] the cloud.
studied the overview of present and future issues. The Marcos et al. [12] presented approaches and
document discusses scalability and fault tolerance of various environments to carry out big data computing in the cloud.
vendors including Google, IBM, Nokia, and RedBus. The The paper discusses the visualization and user interaction,
authors further considered the security, privacy, integrity, model building, and data management. Venkata et al. [13]
disaster recovery, and fault tolerant issues. The review of examined issues in a cloud environment for big data. The
current service models, import concepts of cloud computing, primary focus is security problems and possible solutions.
and processing of big data are discussed in [2]. Elmustafa and Further, they discussed MapReduce and Apache
Rashid [3] presented the survey issues of big data security in environments in the cloud and needed for the security.
cloud computing.
Saranya and Kumar [14] addressed the security issues
Linda et al. [4] showed environmental examples of big associated with big data in a cloud environment. They
data use in government that includes Environmental suggested few approaches for the complicated business
Protection Agency, Department of the Interior, Department of environment. The paper discusses unstructured big data
Energy, and Postal Services. The study consists of the characteristics, analytics, Hadoop architecture, and real-time
government open access initiatives, federal data center big data analytics. The authors did not present any particular
consolidation initiative, and enforcement of compliance model in the article. They explained few concepts related to
online. James [5] presented a roadmap to the success of big security in a cloud environment.
data analytics and applications. The report discusses the
definition and description of unstructured data, relevant use Avodele et al. [15] presented issues and challenges for
cases in the cloud, potential benefits, and challenges deployments of big data in the cloud. They suggested
associated with deploying in the cloud. solutions that are relevant to organizations to deploy the data
in the cloud. The authors indicated the importance of
The impact of cloud computing on Healthcare studied in authentication controls and access controls.
[6]. The study explores on-demand access to computing and
large storage, supporting big data sets for electronic health Ramgovind and Smith [16] discussed the overall security
records and the ability to analyze and tracking the health perspective and potential of cloud computing. They examined
records. Keeso presented the environmental sustainability of cloud threats and security requirements including
big data, barriers, and opportunities [7]. This research also identification and authentication, authorization,
includes new opportunities for partnership based confidentiality, integrity, non-repudiation, and availability.
They also provided the cloud delivery models for the private,

101
public and hybrid cloud. They did not develop any model in access in the cloud. The current TID model in equation (1)
this research. explains with seven parameters.
Dimitrios and Dimitrios addressed the cloud computing TID = UID, IID, MDT, TA, PA, LGE, SA (1)
security issues [17]. They identified the security requirements
Where
and discussed the viable solution to eliminate the potential
threats. To ensure authentication, integrity, and UID User identification and access rights
confidentiality, they suggested a cryptography-based
IID Issue Date
solution.
MDT Maximum Date (expiration Date)
Gai et al. [23 - 25] proposed a cloud-based approach to
secure sensitive data. The model dynamically assigns the data TA Time of Access
packet to cloud resources based on security requirements. The
proposed model requires the third party to audit the PA Place of Access (current place and node ID)
verification process. The authors also suggested fully LGE Log Entry (UID, IID, MDT, TA, PA, LGE)
Homomorphic Encryption for Blend Operations (FHE-BO)
model. It uses tensor laws to carry the computations of blend SA Security Alarm
arithmetic operations over real numbers. The authors claimed The user is an owner of the data, or a user may be a
that the method concurrently deals with the adversarial customer. In either case, the user is a client with different
hazards and support computations on cipher-text. access rights. Once the user logs into cloud network, the
The remaining paper discusses the problem formulation authentication access token connects to the user account. The
that leads to the authentication model in the cloud in section token verifies the user’s access limits and allows or denies
3, simulations in section 4, algorithms for access control on appropriate file access. Further, the system does the entries in
sensitive data in section 5, and conclusions and future work user and cloud log table for each attempt of a user to a
in section 6. particular file with all details. The various validation and
verification check the modifications help find unauthorized
3. PROBLEM FORMATION access. The trustworthiness of provider or user can be
The security model involves the cloud customer data calculated using the log values.
security at storage, retrieval, transfer, processing, and updates The trustworthiness of a user can be calculated using trust
(insert, modify, delete). The security needs to set at the log function in equation (2). For each entry of the user, the weight
entry at user and cloud level. It also requires the automatic ‘W’ is assigned. The entry Wi,j means, the weight for ith user

validation of stored data status and verifies the trust level. The and jth entry. Let ܷ‫ܦܫ‬௜ǡ௝ be the user i entered jth time with good
framework of the proposed model includes the data ௕
behavior (gj) and ܷ‫ܦܫ‬௜ǡ௝ is the user i entered jth time with bad
encryption, correctness, and processing. These three modes
depend upon the access rights of the user as discussed at the behavior (bj). The user trust depends on the number of times
beginning of the current section. For storage and retrieval of entered in database with good behavior. Each time we
data the basic encryption techniques AES, RSA, and calculate the trusted behavior of the user. The weight will be
steganography model are sufficient. If the data requires increased or decreased depending on the trust credit. As the
storage and processing the recommendations in [18] may be trust increases the credit weight increases.
useful. The paper discussed the various techniques to search The trustworthiness of a user can be calculated by
cipher text and query isolation (avoid the untrusted server). multiplying the user entry value with corresponding weight at
Controlled searching, dealing with variable word lengths, good or bad actions. The trustworthiness Ti of ith user
searching encrypted index, and support for hidden search is calculated as follows.
part of the research. In this paper, the proposed access control
model with encrypted processing data is useful to avoid
untrusted provider and malicious users in the cloud. ¦Tj
i, j = ¦ Wi , j * g j − Wi , j b j
j
(2)
The access control model for cloud storage incorporates
the authentication of user and user current access level. The
token identification (TID) is attached as soon as the user login ¦T i, j

UIDTi =
j
is equal to
into the system. To maintain the security of data and its trust j
level, we have to define many control parameters to the user
௚ ௕
(ܷ‫ܦܫ‬௜ǡ௝ െ ܷ‫ܦܫ‬௜ǡ௝ )/j

102
If UIDTi is greater than a set threshold, the user credit can 4. SECURITY OF CLOUD DATA
be approved to access otherwise false alarm alert the security As the data increases, resources requires new
administrator. The user may be an independent customer or mechanisms that enable cost-effective management while
part of the organization. The weight varies between 0 to 1, and guaranteeing critical features like privacy and security. The
the number of accesses to the data (or data files) will be 1 to challenges arise from the redistribution of responsibilities
n (for j n and n is an integer). If the user is good then g value across cloud supply chains. The cost-effective resource is a
is 1 and b value is 0; otherwise, b=1 and g=0 which means cloud. Moving the data to cloud arises many questions.
that the user crosses the access limits or user is a hacker.
• Who can access the data and how it will be used
Figure 1 represents a good user with successful attempts
to the database. The user has one failed attempt, and • The initial requirements, risks, and accountability
remaining attempts are successful. This result shows that the • Reliability to detect the incidents
user is in good standing. Figure 2 shows the bad user • Control of each customer access
attempting to retrieve or access to the database. After nine (9)
attempts the user got success on the 10th try. The situation The access control of cloud data can be managed using
created in the current program is not acceptable. If we group key management system [16 – 18]. The authors in [22]
generate an alarm after three (3) failed attempts, the user will described the logical key hierarchy (LKH) protocol. In LKH
be locked and reported to the security manager. Therefore, to each member stores log2 (n) + 1 keys. In the traditional LKH
separate the bad user from good some policies are required in protocol, as the number of members increases the keys also
the cloud database. increase.
In the proposed model, each customer is assigned a key
with appropriate access limits concerning storing, updating,
retrieving, and processing. Depending on the sensitivity of the
information, we incorporate the time and place. The model
was provided in equation (1). Equation (2) helps the trust of
the customer to the cloud data.
5. ACCESS CONTROLS ON SENSITIVE DATA
Access to sensitive data cannot satisfy pure
trustworthiness. Along with honesty, the procedure requires
the user access limits, day, time of the day, and log entry for
validation. The UID contains access rights & user ID issue
Figure 1: Good standing user for 10 continuous date, expiration date, time of access, and location of access
attempts (depends upon sensitiveness of data). Once the user logs into
the system, the cloud log and owner logs are automatically
registered entries. For hackers, only cloud log entry appears.
The various validation and verification checks reveal the
hacking. The token ID parameters in equation (1) is used in
objective function G.

G = {N , A, D,U} (3)

The objective function G replaces TID, N replaces UID


(contains IID, MDT, TA, and PA), D is a data file (or
database), and U replaces LGE. The security alarm will be
activated depending upon the hacker identification or trust
failure. Therefore the parameters are explained further as
below.
Figure 2. Bad user or hacker; after 9 fail attempts got
success in 10th attempt. N the set of users (n1 , n2 ,.....nm )
The equation (2) does not include issue date of user ID,
expiration date, time of access, place of access, or other A set of access rights (a1 , a2 ,.....a p )
parameters. These controls will be discussed in Section 5.

103
D set of allowed resources in file or database hui ⊇ ui + h ' di ( ui internal user), alarms security
(d1 , d 2 ,.....d q ) manager about internal hacker.

U the result of the query and log entries for verification


If Q(ni ,d i) ⊂ ui then exit;
and validation. else
Once the authenticated user ni (ni ∈ N ) logs into cloud if Q(ni ,d i) ⊄ ui & &Q(ni ,d i) ≅ hui then
environment, the cloud service attaches a service token to a
resource within its domain with a set of access types ai . The convert Q(ni ,d i) as Q(ni , hd i) and generate
limitation helps to control the user for resource access. For
every service requested by the user, the system generates a set
hui ⊇ ui + h d i '

of access permissions to the resources. The services required


should not exceed the user access limits. If the resource Store the user utility hui that contains ui + h' di and
requirements are outside the user boundaries, then the system inform security and keep the counter (log) in alert for further
alarms the security and denies the request. Whereas hacker is attempts.
a user that does not have any role in the system. An authorized
user will be treated as a hacker if the user tries to access The Algorithm 1 helps to detect the hacker if the user tries
unauthorized information. For example, the healthcare staff to gain the information with unauthorized access from the
member may be considered as an intruder if the user accesses database. The following query and Table I explains the
unauthorized data or misuses (for instance, printing and unauthorized access to information.
forwarding) the authorized information
If Q ( ni ,d i) ≡ Q ( hn i , d i ) ⊄ u i
In the proposed cloud environment the user with
complete authorization access is called a super user (S). The or
super user ‘S’ possesses access rights of all users S ⊇ * ai
i =1, n Q(hni , di ) ≈ hui
where ⊇ means contains. All accesses of super user on the
then
database must be recorded. The user that does not have

authorization to resource (s) is called hacker ( hi ) and Q(hni , di ) = hui , retrieve hui (utility from the Hacker
alarm to database) and alert the security alarm.
represented as H ( hi ∈ H ) and ∀H (hackers) the access
where hui is available in log or identified as a new hacker and
rights aih 6 di ≡ φ is true; aih is access rights of the logged as new entry. The log is provided in Table I.
hackers ( 6 implication to, and ≡ is equivalent to). Using
this information, we design two algorithms. Table I. User Log and Action
Algorithm 1: User Status Result Action
The successful user login includes the access rights to the
data. Any query generated by the user will be verified with ࢛૚ First Not available in Identified as
access rights for access and return results. time log enter as ݄‫ݑ‬ଵ new hacker,
login alarm
If the query Q ( ni , d i ) matches the ni as owner for token
identification (TokenID), then the corresponding utility ࢛૛ Repeated Available in log Alarm and
function ui will be generated, else the query reflects as login as ݄‫ݑ‬ଶ freeze
Q(ni , hd i) , where h is a hacker.
࢛૜ Internal Unauthorized Alarm and
User access freeze
If the hacker is an internal user then

104
There is a chance that the hacker attempts to gain access where hui is available in log or identified as a new hacker and
to database through various attempts at different trimming. logged as a new entry. Table II provides the log entries.
Trying to varying timings in a day can mislead the
implemented procedure of the log. If the log has user access Depending upon the security level, the Algorithm-2 will
details with timings and attempts to gain access to the be modified by adding the terminal type and log-on timings.
database, then it will be easy to lock the hacker. Therefore, Terminal type and time of access attributes along with access
the time attribute plays a vital role in detecting the hacker. The type attributes will protect the secret and top secret
Algorithm 1 needs to be modified with time attribute for the information.
detection of unauthorized smart users. The time and day The real world applications include healthcare
attributes are incorporated in Algorithm 1 and presented as environment, university grading system, financial systems and
Algorithm-2. critical infrastructure including chemical and defense. The
healthcare environment is discussed briefly.
Algorithm 2
Let us assume the hospital environment in the healthcare
The input to the algorithm is log entry. Once the user enters
system. A doctor and nurse have same access rights to
then log will be created and related history will be
individual patient data (doctor prescribes the medicine and
incorporated for analysis of user.
implemented by the nurse). Then the attributes patient id, type
If Q(ni , ti ,d i) is genuine and attempted during duty times of medication, and scheduled time dose to be given to a patient
are accessible by the nurse. The same attributes are also
then corresponding utility function ui will be generated, available to the doctor. Therefore, the system security
depends upon the merge and decomposition of two or more
else the query reflects as Q(ni , t j , hd i) then user will get users.

hui ⊇ ui + h'di (where ui is internal user information TABLE II. HACKER LOG AND DETECTION

and h ' d i is the hacker alarm at time t j ). User Status Time and Result Action
access limits

If Q(ni , ti ,d i) ⊂ ui then exit (user access accepted) ࢛૚ Internal Access Internal hacker Freeze
User outside access and alarm
else limits

if (Q(ni , t j ,d i) ⊄ ui ) & &(Q(ni , t j ,d i) ≅ hui ) ࢛૛ Repeated Access Verify the Alarm and
login outside time and log freeze
bounds and entries and
Convert Q(ni , t j ,d i) as Q ( ni , t j , hd i) and generate different identified as
times of the internal hacker
hui ⊇ ui + h ' d i (alarm alert to Security manager) day

ui + h' di and ࢛૜ New No log entries Unauthorized Alarm


Note: Store the user utility hui that contains User and try to access
alert security and keep the counter for further attempts. gain access

If the hacker is external then divert to the KDS. If the user


hacks with authentication then the time stamp will help to 6. CONCLUSIONS
detect the hacker. For example,
The recent issues and challenges were discussed in big
If Q(ni , t j ,d i) ≡ Q(hni , t j , di ) ⊄ ui or ⊆ hui data in the cloud [18] and other related papers [8-15, 19-25].
After evaluation of recent developments, it may be concluded
then that it is necessary to develop a trust and access control
methodology in a cloud environment for big data processing.
Q(hni , t j , di ) = hui , retrieve hui , and alarm the security; Therefore, in the current research, an objective function was
proposed with a set of users, associated access rights,
resources and return result verification. The proposed model

105
is appropriate for storage, processing, and retrieval of big data [9] Yuhong Liu, Jung Ryoo, and Syed Rizvi., “Ensuring Data
in a cloud environment. Further, two algorithms were Confidentiality in cloud Computing: An Enryption and Trust-based
Solution”, Proceedings of IEEE 23rd Wireless and Optimal
presented to detect the external and internal hackers in a cloud
Communication Conference (WOCC), 2014.-
environment. The tables provided the idea of log analysis to [10] Young-Gi Min, Hyo-Jin Shin, and Young Hwan Bang., “Cloud
identify the internal and external hackers. The user entry logs, Computing Security Issues and Access Control Solutions”, Journal of
authentication, and access rights have a significant role in Engineering, 9, 2, 2012.
providing the hacker information to the security [11] Ali Gholami and Ervin Laure., “Big Data Security and Privacy Issues
administrator. in the Cloud”, Int. J. of Network Security & its Applications (IJNSA),
vol. 8, No.1, Jan 2016, pp. 59-79.
Future work may improve the algorithms to protect [12] Marcos D. Asuncao, Rodrigo N. Calheiros, Silvia Bianchi, Marco A.
S. Netto, and Rajkumar Buyya., “Big Data Computing and Clouds:
sensitive data in business and government through access
Trends and future directions”, J. parallel Distributed Computing, 79-
rights in a cloud environment. Further, incorporating 80, 2015, pp.3 15.
honeypots may be helpful to mislead the malicious users and [13] Venkata Narasimha Inukollu, Sailaja Arsi, and Srinivasa Rao Ravuri.,
hackers at sensitive data places. “Security Issues Associated with Big Data in Cloud Computing”, Int.
J. of Netork Security & its Applications (IJNSA), Vol. 6, N0.3, May
ACKNOWLEDGEMENTS 2014, pp. 45-56.
[14] R. Saranya and V. P. Muthukumar., “Security issues associated with
The research work was supported by the CMAST big data in cloud computing”, Int. J. of multidisciplinary and
program funded by NSF through award number 1719523 and development, vol. 2, issue.4, April 2015, pp. 580-585.
[15] Avodele, O., Izang A. A., Kuyoro. S. O., and Osisanwo, F.Y., “Big
Department of Education P031B150020 - Title III
Data and Cloud Computing Issues”, Int. J. of Computer Applications
Cybersecurity. The author wishes to express appreciation to (0975 – 8887), vol 133, no.12, Jan 2016, pp.14 – 19.
Dr. Connie Walton, Director Sponsored programs at [16] Ramgovind, S., and Smith, E., “The Management of Security in Cloud
Grambling State University and PI of NSF Big Data grant for Computing”, IEEE Information Security for South Africa (ISSA),
her continuous support. The author also wishes to appreciation 2010.
to Dr. Stacy Duhon, Dean, College of Arts and Sciences for [17] Dimitrios Z., and Dimitrios, L., “Addressing cloud computing security
issues”, Future Generation Computer Systems 28 (2012) 583–592
continuous encouragement.
[18] Dimitrios, Zissis. And Dimitrios, L., “Addressing cloud computing
security issues”, Future Generation Computer Systems, 28 (2012)
REFERENCES 583–592.
[1] Pedro Calderira Neves, Bradley Schmerl, Jorge Bernardino, and Javier [19] Dawn, x. S., David, W. and Adrian, P., “Practical Techniques for
Camara., “Big Data in Cloud Computing: Features and Issues”, Searches on Encrypted Data”, IEEE Symposium on Security and
International Conference on Internet of Things and Big Data, Jan 2016 Privacy, 2000, pp. 44-55.
[2] Richard Branch, Heather Tjeerdsma, Cody Wilson, Richard Hurley, [20] Jangala Sasi Kiran, M. Sravanthi, K. Preethi, and M. Anusha., “Recent
and Sabine McConnell., “Cloud Computing and Big Data: A Review Issues and Challenges on Big Data in Cloud Computing”,
of Current Service Models and Hardware Perspectives”, Journal of IJCCCSSST, Vol.6, issue.2, June 2015, pp. 98-102.
Software Engineering and Applications, 2014, 7, 686-693. [21] Shehnila Z., Najeed A. K., and Mohsin Ali Memon., “Systematic
[3] Elmustafa Sayed Ali Ahmed and Rashid A. Saeed., “A Survey of Big Analysis of Risks in Cloud Architecture”, Int. J. computer Science and
Data Cloud Computing Security”, International Journal of Computer Information Security (IJCSIS), vol. 14, no.11, November 2016.
Science and Software Engineering (IJCSSE), vol 3, issue 1, December [22] D Wallner, E. Harder, and R. Agee, “Key Management for Multicast:
2014, pp. 78-85. Issues and Architectures”, RFC 2627, June 1999.
[4] Linda K. Breggin, et al.(editors). “Big Data, big challenges in [23] K. Gai, L. Qiu, M. Chen, H. Zhao, and M. Qiu., "SA-EAST: security-
Evidence-based policy making”, 2014, West Academic Press. aware efficient data transmission for ITS in mobile heterogeneous
[5] James Kobielus., “Deployment in Big Data Analytics Applications to cloud computing", ACM Transactions on Embedded Computing Systems,
Vol. 16, No. 2, Article 60, Publication date: January 2017.
the Cloud: Road Map for Success”, Cloud Standards Customer
[24] K. Gai and M. Qiu., "Blend Arithmetic Operations on Tensor-based
Council, Technical report, 2014.
Fully Homomorphic Encryption Over Real Numbers", IEEE
[6] “Impact of cloud computing on Healthcare, Version 2.0”, Cloud
Transactions on Industrial Informatics, December 2017.
Standards Customer Council, Technical Report, February 2017.
[25] K. Gai, M. Qiu,and H. Zhao., "Privacy-Preserving Data Encryption
[7] Alan Keeso., “Big Data and Environmental Sustainability: A
Strategy for Big Data in Mobile Cloud Computing", IEEE
Conversation Starter”, Smith School Working Paper series, working
Transactions on Big Data, May 18, 2017.
paper 14-04, 2014.
[8] Yan Zh., Hongxin Hu, Gail-Joon Ahn, Dijiang Huang, and Shanbiao
Wang., ”Towards Temporal Access Control in Cloud Computing”,
Proceedings of IEEE INFOCOM, 2012.

106

You might also like