Abstract
Security and privacy are useful concerns in the context of big data. The Internet of Things (IoT) serves both to bolster and to ease security worries. IoT gadgets raise immense new security challenges, particularly with regards to things like basic framework. Be that as it may, they additionally offer approaches to help keep clients progressively secure by adding additional obstructions of safeguard to information and people. In order to sustain the integrity of data and to provide in order to implicit security for any big database, data slicing is constructive. Data slicing implicitly provides the preservation and the query performance to the database users. The sliced data are stored at servers in a distributed system to protect the data from the attackers. In this article, an intelligent and efficient model is developed to partition the polynomial data securely and to store at various servers in a distributed system. An auto-key generator spawns an encryption key to encrypt the polynomial data as a higher level security. Encrypted data is partitioned by an efficient Fast Fourier transform Technique. A novel clustering methodology entitled as Binary Reverse Clustering is introduced to optimize the performance as well as to reduce the servers’ requisition. Moreover, the novel clustering technique is compared with the traditional clustering algorithm.
Similar content being viewed by others
References
Jasimhadi, H., Shnain, A. H., Hadishaheed, S., & Ahmad, A. H. (2015). Big data and five V’s characteristics. International Journal of Advances in Electronics and Computer Science, 2(1), 16–23.
Aldossary, S., & Allen, W. (2016). Data security, privacy, availability and integrity in cloud computing: Issues and current solutions. International Journal of Advanced Computer Science and Applications, 7(4), 485–498.
Sarkar, M., Banerjee, S., Badr, Y., & Sangaiah, A. K. (2017). Configuring a trusted cloud service model for smart city exploration using hybrid intelligence. International Journal of Ambient Computing and Intelligence IGI Global, 8(3), 1–21.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., et al. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371–386.
Sevis, K. N., & Seker, E. (2016). Survey on data integrity in cloud. In IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), Beijing, China, 25–27 June 2016. https://doi.org/10.1109/cscloud.2016.35.
Zhang, Y., Chunxiang, X., Liang, X., Li, H., Yi, M., & Zhang, X. (2017). Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation. IEEE Transactions on Information Forensics and Security, 12(3), 676–688.
Sarkar, M., Banerjee, S., & Hassanieen, A. E. (2015). Evaluating the degree of trust for a context sensitive relational database model: Through a hybrid intelligent approach. International Journal of Rough Sets and Data Analysis (IJRSDA), 2(1), 1–21.
Oracle Partitioning Policy, Oracle Corporation, November 6, 2013.
Grosskreutz, H., Lemmen, B., & Ruping, S. (2011). Secure Distributed Subgroup Discovery in Horizontally Partitioned Data. Transactions on Data pPrivacy, 4, 147–165.
Nehme, R., & Bruno, N. (2011). Automated partitioning design in parallel database systems. In ACM.
Becker, B. A. (2011). High-level data partitioning for parallel computing on heterogeneous hierarchical HPC platforms. Technical report UCD-CSI-2011-10.
Hunyadi, L., & Vajk, I. (2013). Modeling by fitting a union of polynomial functions to data in an errors-in-variables context. International Journal of Pattern Recognition and Artificial Intelligence, 27(2), 1350004.
Monagan, M., & Pearce, R. (2012). POLY: A new polynomial data structure for Maple 17. ACM Communications in Computer Algebra, 46(182), 1–22.
Hansen, S. L. & Mukherjee, S. (2003). A polynomial algorithm for optimal univariate microaggregation. IEEE Transactions on Knowledge and Data Engineering, 15(4), 1043–1044.
Cormen, T. H., Leiserson, C. E., Rivest, R. L., & Stein, C. (2009). Introduction to algorithms, 2nd Edn. New Delhi: PHI Learning Pvt. Ltd. ISBN-978-81-203-2141-0, 2009.
Katz, J., Sahai, A., & Waters, B. (2008). Predicate Encryption supporting disjunctions, polynomial equations, and inner products. In Advances in Cryptology – EUROCRYPT 2008. EUROCRYPT 2008. Lecture Notes in Computer Science (Vol 4965, pp. 146–162). Berlin: Springer.
Chen, Q., Tang, Z., Li, Y., Niu, Y., & Mo, J. (2011). Research on encryption algorithm of data security for wireless sensor network. Journal of Computational Information Systems, 7(2), 369–376.
Mohassel, P. (2011). Fast computation on encrypted polynomials and applications. In Cryptology and network security. CANS 2011. Lecture notes in computer science, Vol 7092, pp. 234-254. Berlin: Springer.
Owens, J., & Matthews, J. (2008). A study of passwords and methods used in brute-force SSH attacks. A Thesis of Master of Science, Department of Mathematics and Computer Science, Clarkson University.
Owens, J. P. Jr. (2008). A study of passwords and methods used in brute-force SSH attacks. A thesis, March 20, 2008.
Dzitac, I., & Barbat, B. E. (2009). Artificial intelligence + distributed systems = agents. International Journal of Computers, Communications and Control, IV(1), 17–26 ISSN 1841-9836, E-ISSN 1841-9844.
Firdhous, M. (2011). Implementation of security in distributed systems—A comparative study. International Journal of Computer Information Systems, 2(2), 1–6.
Hamlen, K., Kantarcioglu, M., Khan, L., & Thuraisingham, B. (2010). Security issues for cloud computing. International Journal of Information Security and Privacy, 4(2), 39–51.
Hashizume, K., Rosado, D. G., Fernandez-Medina, E., & Fernandez, E. B. (2013) An analysis of security issues for cloud computing. Journal of Internet Services and Applications 4(5), 1–13.
Aikebaier, A., Enokido, T., & Takizawa, M. (2011). Human-centric Computing and Information Sciences, 1(6).
Parakh, A., & Kak, S. (2009). Online data storage using implicit security. Information Sciences, 179, 3323–3331.
Kaufmann, M. (2019). Big data management canvas: A reference modelfor value creation from data. Big data and Cognitive Computing, 3(1), 1–18. https://doi.org/10.3390/bdcc3010019.
Sawant, M., Kinage, K., Pilankar, P., & Chaudhari, N. (2013). Database partitioning: a review paper. International Journal of Innovative Technology and Exploring Engineering, 3(5), October 2013. ISSN: 2278-3075.
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information Sciences, 305, 357–383.
Lee, K., Liu, L., Tang, Y., Zhang, Q., & Zhou, Y. Efficient and customizable data partitioning framework for distributed big RDF data processing in the cloud.
Karr, A. F., Lin, X., Sanil, A. P., & Reiter, J. P. (2009). Privacy-preserving analysis of vertically partitioned data using secure matrix products. Journal of Official Statistics, 25(1), 125–138.
Grosskreutz, H., Lemmen, B., & Uping, S. R. (2011). Secure distributed subgroup discovery in horizontally partitioned data. Transactions on Data Privacy, 4, 147–165.
Inan, A., Saygın, Y., Savas, E., Hintoglu, A. A., & Levi, A. (2006) Privacy preserving clustering on horizontally partitioned data. In Proceedings of the 22nd International Conference on Data Engineering Workshops (ICDEW’06), IEEE 2006.
Lakshmipathi Raju, N. V. S., Seetaramanath, M. N., Srinivasa Rao, P., & Nandini, G. (2013, November). Rough set based privacy preserving attribute reduction on horizontally partitioned data and generation of Rules. International Journal of Advanced Research in Computer and Communication Engineering, 2(11), 2278–1021 ISSN (Online).
Pavlo, A., Curino, C., & Zdonik, S. (2012) Skew-aware automatic database partitioning in shared-nothing. In Parallel OLTP systems, ACM.
Khalifa, S., Martin, P., & Young, R. (2019). Label-aware distributed ensemble learning: A simplified distributed classifier training model for big data. Big DataResearch, 15(2019), 1–11. https://doi.org/10.1016/j.bdr.2018.11.001.
Zheng, L., Chong, S., Myers, A. C., & Zdancewic, S. (2003). Using replication and partitioning to build secure distributed systems. In Proceedings of the 2003 IEEE symposium on security and privacy, pp. 236–250.
Siddiqui, I. F., Qureshi, N. M. F., Shankar Chowdhry, B., & Aslam Uqaili, M. (2019). Edge-node-aware adaptive data processing framework for smart grid. Wireless Personal Communications, 106(1), 179–189.
Konur, D., Campbell, J. F., & Monfared, S. A. (2017). “Economic and environmental considerations in a stochastic inventory control model with order splitting under different delivery schedules among suppliers. Omega, 71, 46–65.
Yao, J. (2017). Optimisation of one-stop delivery scheduling in online shopping based on the physical Internet. International Journal of Production Research, 55(2), 358–376.
Grunder, O., Hammoudan, Z., & Moudni, A. E. (2016). Production and delivery scheduling problem with delivery time and costs dependent on batch-size. International Journal of Logistics Systems and Management, 24(3), 333–355.
Patier, D., David, B., Chalon, R., et al. (2014). A new concept for urban logistics delivery area booking. Procedia- Social and Behavioral Sciences, 125, 99–110.
Zhu, D. (2018). IOT and big data based cooperative logistical delivery scheduling method and cloud robot system. Future Generation Computer Systems, 86, 709–715. https://doi.org/10.1016/j.future.2018.04.081.
Conti, M., Dehghantanha, A., & KatrinFranke, S. W. (2018). Internet of things security and forensics: Challenges andopportunities. Future Generation Computer Systems, 78, 544–546.
Osman, A. M. S. (2019). A novel big data analytics framework for smart cities. Future Generation Computer Systems, 91, 620–633.
Lenda, G. (2008). The application of least-squares method for approximating the surfaces of engineering structures. Geomatics and Environmental Engineering, 2(1), 50–56.
Cui, Q., Li, Q., Li, G., Li, Z., Han, X., Lee, H. P., et al. (2017). Globally-optimal prediction-based adaptive mutation particle swarm optimization. Information Sciences, 418–419, 186–217.
Leskovec, J., Huttenlocher, D., & Kleinberg, J. (2010). Governance in social media: A case study of the {Wikipedia} promotion process. In: Proceedings of the international conference on weblogs and social media, 2010 (pp. 98–105). http://snap.stanford.edu/data/wiki-Vote.html
Kaur, S., & Singh, C. (2016). Comparative study of data clustering techniques. International Journal of Engineering Development and Research, 4(4), 309–312.
Priyono, A., Ridwan, M., Alias, J. A., Rahmat, R. A. O. K., Hassan, A., Alauddin, Mohd., et al. (2005). Generation of fuzzy rules with subtractive clustering. Jurnal Teknologi, 43(1), 143–153.
Berneti, S. M. (2011). Design of fuzzy subtractive clustering model using particle swarm optimization for the permeability prediction of the reservoir. International Journal of Computer Applications, 29(11), 33–37.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix: Program Output
Rights and permissions
About this article
Cite this article
Sarkar, M., Hassanien, A.E. Exploring New Vista of Secured and Optimized Data Slicing for Big Data: An IOT Paradigm. Wireless Pers Commun 116, 601–628 (2021). https://doi.org/10.1007/s11277-020-07730-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07730-3