Loading…
Secured Data Storage and Retrieval Algorithm Using Map Reduce Techniques and Chaining Encryption in Cloud Databases
Cloud databases provide facilities for large scale data storage and retrieval of distributed data. However, the current access control techniques provided in database systems for maintaining security are not sufficient to secure the private data stored in public cloud databases. In this paper, a new...
Saved in:
Published in: | Wireless personal communications 2017-10, Vol.96 (4), p.5621-5633 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c316t-3742b164bea1591679f22c95919c601ef3d50ed9cd8e4945b269db4098477b273 |
---|---|
cites | cdi_FETCH-LOGICAL-c316t-3742b164bea1591679f22c95919c601ef3d50ed9cd8e4945b269db4098477b273 |
container_end_page | 5633 |
container_issue | 4 |
container_start_page | 5621 |
container_title | Wireless personal communications |
container_volume | 96 |
creator | Muthurajkumar, S. Vijayalakshmi, M. Kannan, A. |
description | Cloud databases provide facilities for large scale data storage and retrieval of distributed data. However, the current access control techniques provided in database systems for maintaining security are not sufficient to secure the private data stored in public cloud databases. In this paper, a new secured data storage algorithm for effective maintenance of confidential data is proposed. To perform storage and retrieval operations of data in the cloud data storage effectively, map reduce algorithms are developed in this work which performs data reduction and fast processing. In order to consider the temporal nature of documents to be retrieved, we propose a new algorithm called Temporal Secured Cloud Map Reduced Algorithm which integrates temporal constraints with map reduce algorithms and also the chaining Hill Cipher encryption algorithms which is proposed newly in this work. The main advantages of the proposed algorithm is that they reduce the processing time and maintains security effectively. The experimental results obtained from this work depict that the proposed model is optimizing cost and it ensures data security. |
doi_str_mv | 10.1007/s11277-017-4437-3 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1942705292</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1942705292</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-3742b164bea1591679f22c95919c601ef3d50ed9cd8e4945b269db4098477b273</originalsourceid><addsrcrecordid>eNp1kEtLxDAUhYMoOI7-AHcB19W82kyWQ33CiODMgLuQpmknQyetSSvMvze1Lty4uhfu-c65HACuMbrFCPG7gDHhPEGYJ4xRntATMMMpJ8mCso9TMEOCiCQjmJyDixD2CEVKkBkIa6MHb0p4r3oF133rVW2gciV8N7235ks1cNnUrbf97gC3wboavqouXstBG7gxeufs52DCD5PvlHWj5MFpf-x62zpoHcybdpgSChVMuARnlWqCufqdc7B9fNjkz8nq7eklX64STXHWJ5QzUuCMFUbhVOCMi4oQLeIqdIawqWiZIlMKXS4MEywtSCbKgiGxYJwXhNM5uJl8O9-OL_Zy3w7exUiJBSMcpUSQqMKTSvs2BG8q2Xl7UP4oMZJjt3LqVsZu5ditpJEhExOi1tXG_3H-F_oGlQh7uA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1942705292</pqid></control><display><type>article</type><title>Secured Data Storage and Retrieval Algorithm Using Map Reduce Techniques and Chaining Encryption in Cloud Databases</title><source>Springer Nature</source><creator>Muthurajkumar, S. ; Vijayalakshmi, M. ; Kannan, A.</creator><creatorcontrib>Muthurajkumar, S. ; Vijayalakshmi, M. ; Kannan, A.</creatorcontrib><description>Cloud databases provide facilities for large scale data storage and retrieval of distributed data. However, the current access control techniques provided in database systems for maintaining security are not sufficient to secure the private data stored in public cloud databases. In this paper, a new secured data storage algorithm for effective maintenance of confidential data is proposed. To perform storage and retrieval operations of data in the cloud data storage effectively, map reduce algorithms are developed in this work which performs data reduction and fast processing. In order to consider the temporal nature of documents to be retrieved, we propose a new algorithm called Temporal Secured Cloud Map Reduced Algorithm which integrates temporal constraints with map reduce algorithms and also the chaining Hill Cipher encryption algorithms which is proposed newly in this work. The main advantages of the proposed algorithm is that they reduce the processing time and maintains security effectively. The experimental results obtained from this work depict that the proposed model is optimizing cost and it ensures data security.</description><identifier>ISSN: 0929-6212</identifier><identifier>EISSN: 1572-834X</identifier><identifier>DOI: 10.1007/s11277-017-4437-3</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Access control ; Algorithms ; Chaining ; Chains ; Communications Engineering ; Computer Communication Networks ; Current distribution ; Cybersecurity ; Data reduction ; Data storage ; Encryption ; Engineering ; Networks ; Signal,Image and Speech Processing</subject><ispartof>Wireless personal communications, 2017-10, Vol.96 (4), p.5621-5633</ispartof><rights>Springer Science+Business Media New York 2017</rights><rights>Copyright Springer Science & Business Media 2017</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-3742b164bea1591679f22c95919c601ef3d50ed9cd8e4945b269db4098477b273</citedby><cites>FETCH-LOGICAL-c316t-3742b164bea1591679f22c95919c601ef3d50ed9cd8e4945b269db4098477b273</cites><orcidid>0000-0003-3960-6926</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Muthurajkumar, S.</creatorcontrib><creatorcontrib>Vijayalakshmi, M.</creatorcontrib><creatorcontrib>Kannan, A.</creatorcontrib><title>Secured Data Storage and Retrieval Algorithm Using Map Reduce Techniques and Chaining Encryption in Cloud Databases</title><title>Wireless personal communications</title><addtitle>Wireless Pers Commun</addtitle><description>Cloud databases provide facilities for large scale data storage and retrieval of distributed data. However, the current access control techniques provided in database systems for maintaining security are not sufficient to secure the private data stored in public cloud databases. In this paper, a new secured data storage algorithm for effective maintenance of confidential data is proposed. To perform storage and retrieval operations of data in the cloud data storage effectively, map reduce algorithms are developed in this work which performs data reduction and fast processing. In order to consider the temporal nature of documents to be retrieved, we propose a new algorithm called Temporal Secured Cloud Map Reduced Algorithm which integrates temporal constraints with map reduce algorithms and also the chaining Hill Cipher encryption algorithms which is proposed newly in this work. The main advantages of the proposed algorithm is that they reduce the processing time and maintains security effectively. The experimental results obtained from this work depict that the proposed model is optimizing cost and it ensures data security.</description><subject>Access control</subject><subject>Algorithms</subject><subject>Chaining</subject><subject>Chains</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Current distribution</subject><subject>Cybersecurity</subject><subject>Data reduction</subject><subject>Data storage</subject><subject>Encryption</subject><subject>Engineering</subject><subject>Networks</subject><subject>Signal,Image and Speech Processing</subject><issn>0929-6212</issn><issn>1572-834X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNp1kEtLxDAUhYMoOI7-AHcB19W82kyWQ33CiODMgLuQpmknQyetSSvMvze1Lty4uhfu-c65HACuMbrFCPG7gDHhPEGYJ4xRntATMMMpJ8mCso9TMEOCiCQjmJyDixD2CEVKkBkIa6MHb0p4r3oF133rVW2gciV8N7235ks1cNnUrbf97gC3wboavqouXstBG7gxeufs52DCD5PvlHWj5MFpf-x62zpoHcybdpgSChVMuARnlWqCufqdc7B9fNjkz8nq7eklX64STXHWJ5QzUuCMFUbhVOCMi4oQLeIqdIawqWiZIlMKXS4MEywtSCbKgiGxYJwXhNM5uJl8O9-OL_Zy3w7exUiJBSMcpUSQqMKTSvs2BG8q2Xl7UP4oMZJjt3LqVsZu5ditpJEhExOi1tXG_3H-F_oGlQh7uA</recordid><startdate>20171001</startdate><enddate>20171001</enddate><creator>Muthurajkumar, S.</creator><creator>Vijayalakshmi, M.</creator><creator>Kannan, A.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0003-3960-6926</orcidid></search><sort><creationdate>20171001</creationdate><title>Secured Data Storage and Retrieval Algorithm Using Map Reduce Techniques and Chaining Encryption in Cloud Databases</title><author>Muthurajkumar, S. ; Vijayalakshmi, M. ; Kannan, A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-3742b164bea1591679f22c95919c601ef3d50ed9cd8e4945b269db4098477b273</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>Chaining</topic><topic>Chains</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Current distribution</topic><topic>Cybersecurity</topic><topic>Data reduction</topic><topic>Data storage</topic><topic>Encryption</topic><topic>Engineering</topic><topic>Networks</topic><topic>Signal,Image and Speech Processing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Muthurajkumar, S.</creatorcontrib><creatorcontrib>Vijayalakshmi, M.</creatorcontrib><creatorcontrib>Kannan, A.</creatorcontrib><collection>CrossRef</collection><jtitle>Wireless personal communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Muthurajkumar, S.</au><au>Vijayalakshmi, M.</au><au>Kannan, A.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secured Data Storage and Retrieval Algorithm Using Map Reduce Techniques and Chaining Encryption in Cloud Databases</atitle><jtitle>Wireless personal communications</jtitle><stitle>Wireless Pers Commun</stitle><date>2017-10-01</date><risdate>2017</risdate><volume>96</volume><issue>4</issue><spage>5621</spage><epage>5633</epage><pages>5621-5633</pages><issn>0929-6212</issn><eissn>1572-834X</eissn><abstract>Cloud databases provide facilities for large scale data storage and retrieval of distributed data. However, the current access control techniques provided in database systems for maintaining security are not sufficient to secure the private data stored in public cloud databases. In this paper, a new secured data storage algorithm for effective maintenance of confidential data is proposed. To perform storage and retrieval operations of data in the cloud data storage effectively, map reduce algorithms are developed in this work which performs data reduction and fast processing. In order to consider the temporal nature of documents to be retrieved, we propose a new algorithm called Temporal Secured Cloud Map Reduced Algorithm which integrates temporal constraints with map reduce algorithms and also the chaining Hill Cipher encryption algorithms which is proposed newly in this work. The main advantages of the proposed algorithm is that they reduce the processing time and maintains security effectively. The experimental results obtained from this work depict that the proposed model is optimizing cost and it ensures data security.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11277-017-4437-3</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0003-3960-6926</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0929-6212 |
ispartof | Wireless personal communications, 2017-10, Vol.96 (4), p.5621-5633 |
issn | 0929-6212 1572-834X |
language | eng |
recordid | cdi_proquest_journals_1942705292 |
source | Springer Nature |
subjects | Access control Algorithms Chaining Chains Communications Engineering Computer Communication Networks Current distribution Cybersecurity Data reduction Data storage Encryption Engineering Networks Signal,Image and Speech Processing |
title | Secured Data Storage and Retrieval Algorithm Using Map Reduce Techniques and Chaining Encryption in Cloud Databases |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T09%3A55%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secured%20Data%20Storage%20and%20Retrieval%20Algorithm%20Using%20Map%20Reduce%20Techniques%20and%20Chaining%20Encryption%20in%20Cloud%20Databases&rft.jtitle=Wireless%20personal%20communications&rft.au=Muthurajkumar,%20S.&rft.date=2017-10-01&rft.volume=96&rft.issue=4&rft.spage=5621&rft.epage=5633&rft.pages=5621-5633&rft.issn=0929-6212&rft.eissn=1572-834X&rft_id=info:doi/10.1007/s11277-017-4437-3&rft_dat=%3Cproquest_cross%3E1942705292%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c316t-3742b164bea1591679f22c95919c601ef3d50ed9cd8e4945b269db4098477b273%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1942705292&rft_id=info:pmid/&rfr_iscdi=true |