Open Access Open Access  Restricted Access Subscription or Fee Access

A Review of Techniques for Securing Big Data Integrated with Cloud

Chetan ., A. Khadar, Mohammed Rafi




In the era of big data and cloud computing, which are the most sophisticated technologies individually with enormous potential; these technologies when integrated can extend themselves seamlessly to solve complicated problems of day-today life. We generate enormous amount of precious data every second related to personal, business to professional field through our digital lives. Big data perfectly fits in this scenario to help us to store, process and manage this massive data. Cloud computing on the other hand is a technology with its characteristic features like on-demand service, flexibility, rapid scalability, metered usage etc. are very useful in storing and managing big data by catering the needs of broad spectrum of users ranging from individuals, medium scale enterprises to large scale organizations. Cloud computing is bundled with benefits like low cost implementation, globally advanced in technological services with zero maintenance overhead for users. With these alluring benefits there are some issues which we need to focus and fix, like security and privacy of the big data stored and accessed in cloud in order to create foolproof secure solutions. In this study we focus on surveying recently proposed techniques for securing big data over the cloud by iterating through techniques in order to find their intricacies.


Keywords: Big data, cloud computing, security, privacy, encryption


Big Data, Cloud Computing, Security, Privacy, Encryption

Full Text:



Wo L. Chang, Nancy Grady, NBD-PWG NIST Big Data Public Working Group, NIST Big Data Interoperability Framework: Definitions, NIST Special Publication 2018; 1(2):43p.

Peter M. Mell, Timothy Grance.The NIST Definition of Cloud Computing.NIST Special Publication 800-145 2011; 7p.

NIST Big Data Public Working Group (NBD-PWG).NIST Big Data Interoperability Framework: Volume 4, Security and Privacy Version 3.NIST Special Publication 1500-4r2 2019; 176p.

Bhushan, K. and Gupta, B.B. Security challenges in cloud computing: state-of-art. Int. J. Big Data Intelligence 2017; 4(2):81–26p.

Yibin Li, Keke Gai, Longfei Qiu, Meikang Qiu, Hui Zhao, Intelligent cryptography approach for secure distributed big data storage in cloud computing, Information Sciences 2017;387-103-12p.

Jian Shen, Dengzhi Liu, Jun Shen, Qi Liu, Xingming Sun. A secure cloud-assisted urban data sharing framework for ubiquitous-cities. Pervasive and Mobile Computing 2017; 41:219-11p.

A. El-Yahyaoui and M. D. Ech-Chrif El Kettani, A verifiable fully homomorphic encryption scheme to secure big data in cloud computing. 2017 International Conference on Wireless Networks and Mobile Communications (WINCOM); 01-11-2017; Rabat, 1-4p.

H. A. Al Hamid, S. M. M. Rahman, M. S. Hossain, A. Almogren and A. Alamri. A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility with Pairing-Based Cryptography. In IEEE Access 2017; 5:22313-15p.

K. Gai, M. Qiu and H. Zhao, Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing. In IEEE Transactions on Big Data 2017; 12p.

Stergiou Christos, Psannis Kostas E. Efficient and secure BIG data delivery in Cloud Computing. Multimedia Tools and Applications 2017; 76(21):22803-20p.

Christos Stergiou, Kostas E. Psannis, Brij B. Gupta, Yutaka Ishibashi, Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT,Sustainable Computing: Informatics and Systems 2018;19:174-10p.

Flora Amato, Francesco Moscato, Vincenzo Moscato, Francesco Colace, Improving security in cloud by formal modeling of IaaS resources, Future Generation Computer Systems 2018; 87: 754-10p

D. Das. Secure cloud computing algorithm using homomorphic encryption and multi-party computation. 2018 International Conference on Information Networking (ICOIN); 10-01-2018, Chiang Mai.2018. 391-5p.

A. Modak, S. D. Chaudhary, P. S. Paygude and S. R. Ldate. Techniques to Secure Data on Cloud: Docker Swarm or Kubernetes? Second International Conference on Inventive Communication and Computational Technologies (ICICCT); 20-04-2018; Coimbatore.2018. 7-5p.



  • There are currently no refbacks.