Skip to main content
Log in

Exploring New Vista of Secured and Optimized Data Slicing for Big Data: An IOT Paradigm

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Security and privacy are useful concerns in the context of big data. The Internet of Things (IoT) serves both to bolster and to ease security worries. IoT gadgets raise immense new security challenges, particularly with regards to things like basic framework. Be that as it may, they additionally offer approaches to help keep clients progressively secure by adding additional obstructions of safeguard to information and people. In order to sustain the integrity of data and to provide in order to implicit security for any big database, data slicing is constructive. Data slicing implicitly provides the preservation and the query performance to the database users. The sliced data are stored at servers in a distributed system to protect the data from the attackers. In this article, an intelligent and efficient model is developed to partition the polynomial data securely and to store at various servers in a distributed system. An auto-key generator spawns an encryption key to encrypt the polynomial data as a higher level security. Encrypted data is partitioned by an efficient Fast Fourier transform Technique. A novel clustering methodology entitled as Binary Reverse Clustering is introduced to optimize the performance as well as to reduce the servers’ requisition. Moreover, the novel clustering technique is compared with the traditional clustering algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Jasimhadi, H., Shnain, A. H., Hadishaheed, S., & Ahmad, A. H. (2015). Big data and five V’s characteristics. International Journal of Advances in Electronics and Computer Science, 2(1), 16–23.

    Google Scholar 

  2. Aldossary, S., & Allen, W. (2016). Data security, privacy, availability and integrity in cloud computing: Issues and current solutions. International Journal of Advanced Computer Science and Applications, 7(4), 485–498.

    Article  Google Scholar 

  3. Sarkar, M., Banerjee, S., Badr, Y., & Sangaiah, A. K. (2017). Configuring a trusted cloud service model for smart city exploration using hybrid intelligence. International Journal of Ambient Computing and Intelligence IGI Global, 8(3), 1–21.

    Article  Google Scholar 

  4. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., et al. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371–386.

    Article  Google Scholar 

  5. Sevis, K. N., & Seker, E. (2016). Survey on data integrity in cloud. In IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), Beijing, China, 2527 June 2016. https://doi.org/10.1109/cscloud.2016.35.

  6. Zhang, Y., Chunxiang, X., Liang, X., Li, H., Yi, M., & Zhang, X. (2017). Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation. IEEE Transactions on Information Forensics and Security, 12(3), 676–688.

    Article  Google Scholar 

  7. Sarkar, M., Banerjee, S., & Hassanieen, A. E. (2015). Evaluating the degree of trust for a context sensitive relational database model: Through a hybrid intelligent approach. International Journal of Rough Sets and Data Analysis (IJRSDA), 2(1), 1–21.

    Article  Google Scholar 

  8. Oracle Partitioning Policy, Oracle Corporation, November 6, 2013.

  9. Grosskreutz, H., Lemmen, B., & Ruping, S. (2011). Secure Distributed Subgroup Discovery in Horizontally Partitioned Data. Transactions on Data pPrivacy, 4, 147–165.

    MathSciNet  MATH  Google Scholar 

  10. Nehme, R., & Bruno, N. (2011). Automated partitioning design in parallel database systems. In ACM.

  11. Becker, B. A. (2011). High-level data partitioning for parallel computing on heterogeneous hierarchical HPC platforms. Technical report UCD-CSI-2011-10.

  12. Hunyadi, L., & Vajk, I. (2013). Modeling by fitting a union of polynomial functions to data in an errors-in-variables context. International Journal of Pattern Recognition and Artificial Intelligence, 27(2), 1350004.

    Article  MathSciNet  Google Scholar 

  13. Monagan, M., & Pearce, R. (2012). POLY: A new polynomial data structure for Maple 17. ACM Communications in Computer Algebra, 46(182), 1–22.

    MathSciNet  MATH  Google Scholar 

  14. Hansen, S. L. & Mukherjee, S. (2003). A polynomial algorithm for optimal univariate microaggregation. IEEE Transactions on Knowledge and Data Engineering, 15(4), 1043–1044.

    Article  Google Scholar 

  15. Cormen, T. H., Leiserson, C. E., Rivest, R. L., & Stein, C. (2009). Introduction to algorithms, 2nd Edn. New Delhi: PHI Learning Pvt. Ltd. ISBN-978-81-203-2141-0, 2009.

  16. Katz, J., Sahai, A., & Waters, B. (2008). Predicate Encryption supporting disjunctions, polynomial equations, and inner products. In Advances in Cryptology – EUROCRYPT 2008. EUROCRYPT 2008. Lecture Notes in Computer Science (Vol 4965, pp. 146–162). Berlin: Springer.

  17. Chen, Q., Tang, Z., Li, Y., Niu, Y., & Mo, J. (2011). Research on encryption algorithm of data security for wireless sensor network. Journal of Computational Information Systems, 7(2), 369–376.

    Google Scholar 

  18. Mohassel, P. (2011). Fast computation on encrypted polynomials and applications. In Cryptology and network security. CANS 2011. Lecture notes in computer science, Vol 7092, pp. 234-254. Berlin: Springer.

  19. Owens, J., & Matthews, J. (2008). A study of passwords and methods used in brute-force SSH attacks. A Thesis of Master of Science, Department of Mathematics and Computer Science, Clarkson University.

  20. Owens, J. P. Jr. (2008). A study of passwords and methods used in brute-force SSH attacks. A thesis, March 20, 2008.

  21. Dzitac, I., & Barbat, B. E. (2009). Artificial intelligence + distributed systems = agents. International Journal of Computers, Communications and Control, IV(1), 17–26 ISSN 1841-9836, E-ISSN 1841-9844.

  22. Firdhous, M. (2011). Implementation of security in distributed systems—A comparative study. International Journal of Computer Information Systems, 2(2), 1–6.

    Google Scholar 

  23. Hamlen, K., Kantarcioglu, M., Khan, L., & Thuraisingham, B. (2010). Security issues for cloud computing. International Journal of Information Security and Privacy, 4(2), 39–51.

    Article  Google Scholar 

  24. Hashizume, K., Rosado, D. G., Fernandez-Medina, E., & Fernandez, E. B. (2013) An analysis of security issues for cloud computing. Journal of Internet Services and Applications 4(5), 1–13.

    Google Scholar 

  25. Aikebaier, A., Enokido, T., & Takizawa, M. (2011). Human-centric Computing and Information Sciences, 1(6).

  26. Parakh, A., & Kak, S. (2009). Online data storage using implicit security. Information Sciences, 179, 3323–3331.

    Article  MATH  Google Scholar 

  27. Kaufmann, M. (2019). Big data management canvas: A reference modelfor value creation from data. Big data and Cognitive Computing, 3(1), 1–18. https://doi.org/10.3390/bdcc3010019.

    Article  Google Scholar 

  28. Sawant, M., Kinage, K., Pilankar, P., & Chaudhari, N. (2013). Database partitioning: a review paper. International Journal of Innovative Technology and Exploring Engineering, 3(5), October 2013. ISSN: 2278-3075.

  29. Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information Sciences, 305, 357–383.

    Article  MathSciNet  Google Scholar 

  30. Lee, K., Liu, L., Tang, Y., Zhang, Q., & Zhou, Y. Efficient and customizable data partitioning framework for distributed big RDF data processing in the cloud.

  31. Karr, A. F., Lin, X., Sanil, A. P., & Reiter, J. P. (2009). Privacy-preserving analysis of vertically partitioned data using secure matrix products. Journal of Official Statistics, 25(1), 125–138.

    Google Scholar 

  32. Grosskreutz, H., Lemmen, B., & Uping, S. R. (2011). Secure distributed subgroup discovery in horizontally partitioned data. Transactions on Data Privacy, 4, 147–165.

    MathSciNet  Google Scholar 

  33. Inan, A., Saygın, Y., Savas, E., Hintoglu, A. A., & Levi, A. (2006) Privacy preserving clustering on horizontally partitioned data. In Proceedings of the 22nd International Conference on Data Engineering Workshops (ICDEW’06), IEEE 2006.

  34. Lakshmipathi Raju, N. V. S., Seetaramanath, M. N., Srinivasa Rao, P., & Nandini, G. (2013, November). Rough set based privacy preserving attribute reduction on horizontally partitioned data and generation of Rules. International Journal of Advanced Research in Computer and Communication Engineering, 2(11), 2278–1021 ISSN (Online).

  35. Pavlo, A., Curino, C., & Zdonik, S. (2012) Skew-aware automatic database partitioning in shared-nothing. In Parallel OLTP systems, ACM.

  36. Khalifa, S., Martin, P., & Young, R. (2019). Label-aware distributed ensemble learning: A simplified distributed classifier training model for big data. Big DataResearch, 15(2019), 1–11. https://doi.org/10.1016/j.bdr.2018.11.001.

    Article  Google Scholar 

  37. Zheng, L., Chong, S., Myers, A. C., & Zdancewic, S. (2003). Using replication and partitioning to build secure distributed systems. In Proceedings of the 2003 IEEE symposium on security and privacy, pp. 236–250.

  38. Siddiqui, I. F., Qureshi, N. M. F., Shankar Chowdhry, B., & Aslam Uqaili, M. (2019). Edge-node-aware adaptive data processing framework for smart grid. Wireless Personal Communications, 106(1), 179–189.

    Article  Google Scholar 

  39. Konur, D., Campbell, J. F., & Monfared, S. A. (2017). “Economic and environmental considerations in a stochastic inventory control model with order splitting under different delivery schedules among suppliers. Omega, 71, 46–65.

    Article  Google Scholar 

  40. Yao, J. (2017). Optimisation of one-stop delivery scheduling in online shopping based on the physical Internet. International Journal of Production Research, 55(2), 358–376.

    Article  Google Scholar 

  41. Grunder, O., Hammoudan, Z., & Moudni, A. E. (2016). Production and delivery scheduling problem with delivery time and costs dependent on batch-size. International Journal of Logistics Systems and Management, 24(3), 333–355.

    Google Scholar 

  42. Patier, D., David, B., Chalon, R., et al. (2014). A new concept for urban logistics delivery area booking. Procedia- Social and Behavioral Sciences, 125, 99–110.

    Article  Google Scholar 

  43. Zhu, D. (2018). IOT and big data based cooperative logistical delivery scheduling method and cloud robot system. Future Generation Computer Systems, 86, 709–715. https://doi.org/10.1016/j.future.2018.04.081.

    Article  Google Scholar 

  44. Conti, M., Dehghantanha, A., & KatrinFranke, S. W. (2018). Internet of things security and forensics: Challenges andopportunities. Future Generation Computer Systems, 78, 544–546.

    Article  Google Scholar 

  45. Osman, A. M. S. (2019). A novel big data analytics framework for smart cities. Future Generation Computer Systems, 91, 620–633.

    Article  Google Scholar 

  46. Lenda, G. (2008). The application of least-squares method for approximating the surfaces of engineering structures. Geomatics and Environmental Engineering, 2(1), 50–56.

    Google Scholar 

  47. Cui, Q., Li, Q., Li, G., Li, Z., Han, X., Lee, H. P., et al. (2017). Globally-optimal prediction-based adaptive mutation particle swarm optimization. Information Sciences, 418–419, 186–217.

    Article  Google Scholar 

  48. Leskovec, J., Huttenlocher, D., & Kleinberg, J. (2010). Governance in social media: A case study of the {Wikipedia} promotion process. In: Proceedings of the international conference on weblogs and social media, 2010 (pp. 98–105). http://snap.stanford.edu/data/wiki-Vote.html

  49. Kaur, S., & Singh, C. (2016). Comparative study of data clustering techniques. International Journal of Engineering Development and Research, 4(4), 309–312.

    Google Scholar 

  50. Priyono, A., Ridwan, M., Alias, J. A., Rahmat, R. A. O. K., Hassan, A., Alauddin, Mohd., et al. (2005). Generation of fuzzy rules with subtractive clustering. Jurnal Teknologi, 43(1), 143–153.

    Article  Google Scholar 

  51. Berneti, S. M. (2011). Design of fuzzy subtractive clustering model using particle swarm optimization for the permeability prediction of the reservoir. International Journal of Computer Applications, 29(11), 33–37.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aboul Ella Hassanien.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix: Program Output

Appendix: Program Output

The Core Logic of the Formulation: The basic Core JAVA code has been developed to quantify the Binary reverse clustering technique. Jdk-6u11-windows-i586-p is used to develop the logic. The output of the program is shown in the following screen shots (Figs. 9 and 10):

Fig. 9
figure 9

Calculating the total number of cluster for 8 data slices

Fig. 10
figure 10

Calculating the total number of cluster for 32 data slices

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sarkar, M., Hassanien, A.E. Exploring New Vista of Secured and Optimized Data Slicing for Big Data: An IOT Paradigm. Wireless Pers Commun 116, 601–628 (2021). https://doi.org/10.1007/s11277-020-07730-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07730-3

Keywords

Navigation