Javascript must be enabled to continue!
HKE‐BC: hierarchical key exchange for secure scheduling and auditing of big data in cloud computing
View through CrossRef
SummaryBig data is one of the most referred key words in recent information and communications technology industry. As the new‐generation distributed computing platform, cloud environments offer high efficiency and low cost for data‐intensive storage and computation for big data applications. Cloud resources and services are available in pay‐as‐you‐go mode, which brings extraordinary flexibility and cost‐effectiveness as well as minimal investments in their own computing infrastructure. However, these advantages come at a price—people no longer have direct control over their own data. Based on this view, data security becomes a major concern in the adoption of cloud computing. Authenticated key exchange is essential to a security system that is based on high‐efficiency symmetric‐key encryptions. With virtualisation technology being applied, existing key exchange schemes such as Internet key exchange become time consuming when directly deployed into cloud computing environment, especially for large‐scale tasks that involve intensive user–cloud interactions, such as scheduling and data auditing. In this paper, we propose a novel hierarchical key exchange scheme, namely hierarchical key exchange for big data in cloud, which aims at providing efficient security‐aware scheduling and auditing for cloud environments. In this novel key exchange scheme, we developed a two‐phase layer‐by‐layer iterative key exchange strategy to achieve more efficient authenticated key exchange without sacrificing the level of data security. Both theoretical analysis and experimental results demonstrate that when deployed in cloud environments with diverse server layouts, efficiency of the proposed scheme is dramatically superior to its predecessors cloud computing background key exchange and Internet key exchange schemes. Copyright © 2014 John Wiley & Sons, Ltd.
Title: HKE‐BC: hierarchical key exchange for secure scheduling and auditing of big data in cloud computing
Description:
SummaryBig data is one of the most referred key words in recent information and communications technology industry.
As the new‐generation distributed computing platform, cloud environments offer high efficiency and low cost for data‐intensive storage and computation for big data applications.
Cloud resources and services are available in pay‐as‐you‐go mode, which brings extraordinary flexibility and cost‐effectiveness as well as minimal investments in their own computing infrastructure.
However, these advantages come at a price—people no longer have direct control over their own data.
Based on this view, data security becomes a major concern in the adoption of cloud computing.
Authenticated key exchange is essential to a security system that is based on high‐efficiency symmetric‐key encryptions.
With virtualisation technology being applied, existing key exchange schemes such as Internet key exchange become time consuming when directly deployed into cloud computing environment, especially for large‐scale tasks that involve intensive user–cloud interactions, such as scheduling and data auditing.
In this paper, we propose a novel hierarchical key exchange scheme, namely hierarchical key exchange for big data in cloud, which aims at providing efficient security‐aware scheduling and auditing for cloud environments.
In this novel key exchange scheme, we developed a two‐phase layer‐by‐layer iterative key exchange strategy to achieve more efficient authenticated key exchange without sacrificing the level of data security.
Both theoretical analysis and experimental results demonstrate that when deployed in cloud environments with diverse server layouts, efficiency of the proposed scheme is dramatically superior to its predecessors cloud computing background key exchange and Internet key exchange schemes.
Copyright © 2014 John Wiley & Sons, Ltd.
Related Results
Use of data auditing for encrypted data stored in cloud environment
Use of data auditing for encrypted data stored in cloud environment
The exponential growth of data generation and the increasing reliance on cloud-based storage solutions have raised significant concerns regarding data security and privacy. The wid...
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
Cloud computing is the delivery of computing services, such as storage, processing power, and software applications, via the internet. Cloud computing offers various advantages and...
Hybrid Cloud Scheduling Method for Cloud Bursting
Hybrid Cloud Scheduling Method for Cloud Bursting
In the paper, we consider the hybrid cloud model used for cloud bursting, when the computational capacity of the private cloud provider is insufficient to deal with the peak number...
Use of Big Data in the Cloud Computing
Use of Big Data in the Cloud Computing
Abstract: Cloud computing is a powerful technology to perform massive-scale and complex computing. It eliminates the need to maintain expensive computing hardware, dedicated space,...
TH variation in Hong Kong English
TH variation in Hong Kong English
The current study examines patterns of TH variation in Hong Kong English (HKE). In particular, it examines patterns in the realization of the voiceless interdental fricative /θ/ as...
Resource Scheduling in Cloud Computing Based on a Hybridized Whale Optimization Algorithm
Resource Scheduling in Cloud Computing Based on a Hybridized Whale Optimization Algorithm
The cloud computing paradigm, as a novel computing resources delivery platform, has significantly impacted society with the concept of on-demand resource utilization through virtua...
Is cloud computing a game-changer for SME financial performance? Unveiling the mediating role of organizational agility through PLS-SEM
Is cloud computing a game-changer for SME financial performance? Unveiling the mediating role of organizational agility through PLS-SEM
PurposeCloud computing services are game-changing in empowering organizations to drive innovation and unlock new growth opportunities. Accordingly, this study aims to examine the d...
Enhanced Multitask Scheduling in Cloud Computing through Advanced Techniques
Enhanced Multitask Scheduling in Cloud Computing through Advanced Techniques
The delivery of computing services over the internet is referred to as cloud computing. One of the most significant challenges in the cloud computing environment is task scheduling...

