Architectural Design for Data Security in Cloud-based Big Data Systems

Authors

  • Mujeeb-ur-Rehman Jamali Emaan Institute of Management & Sciences, Karachi Sindh, Pakistan https://orcid.org/0009-0003-8746-8692
  • Najma Imtiaz Ali Institute of Mathematics and Computer Science, University of Sindh, Jamshoro, Pakistan.
  • Abdul Ghafoor Memon 1Emaan Institute of Management & Sciences, Karachi Sindh, Pakistan
  • Mujeeb-u-Rehman Maree Institute of Mathematics and Computer Science, University of Sindh, Jamshoro, Pakistan.
  • Aadil Jamali Institute of Mathematics and Computer Science, University of Sindh, Jamshoro, Pakistan. https://orcid.org/0009-0003-0569-7433

DOI:

https://doi.org/10.21123/bsj.2024.8722

Keywords:

Big Data, Cloud Computing, Cryptography, Security, Software Architecture

Abstract

Architecture design of system is creative process after all. Non-functional requirements and software architecture have a strong relationship. Security of system is one of great concern and it is a non-functional need and requirement. The architectural style and structure chosen for a system should be based on the non-functional system requirements. Big Data technologies are used to store handles huge amounts of operational data in the public domain. Structure and behavior diagrams of the system is proposed that use a secure architectural design for a system that works over the cloud. Different components of Big Data have been investigated in this research work due to the seriousness of security issues focus on privacy and confidentiality. The security of data over the cloud being outsourced is a growing concern. There are outsider and insider malicious database administrators who can gain access and modify private and sensitive data therefore database service provider can be deceitful. Security mechanisms are necessarily required to protect sensitive data residing on public clouds. At the application level, the proposed solution ensures privacy and confidentiality of data at rest over the cloud. Extensive tests have been carried out, and the results of this research work are as follows that the recorded results revealed statistically significant variations in plaintext and multimedia contents (i.e., audio and video) with time measured in milliseconds for small, medium, and large datasets..

References

Shubh S, Vyom S. Component Based Software Engineering, Int J Res Appl Sci Eng Technol. 2021; 9(VIII): 1588-1595. https://doi.org/10.22214/ijraset.2021.37632.

Yunusa A, Mustapha H. Security and Privacy in Cloud Computing: Technical Review. Future Internet. 2022; 14(11): 2-27. https://doi.org/10.3390/fi14010011.

Dan G, Jeremy K, Evan S, Zev W, Dulani W. Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds. IEEE Trans. Cloud Comput. 2017; 5(3): 523-536. https://doi.org/10.1109/TCC.2015.2415794 .

Zhifeng X, Yang X. Security and Privacy in Cloud Computing. IEEE Commun. Surv. Tutor. 2013; 15(2): 843-859. https://doi.org/10.1109/SURV.2012.060912.00182.

Demchenko Y, Ngo C, de L, Lee C. Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns. IEEE Int Conf Cloud Eng., Boston, USA. 2014: 439-445. https://doi.org/10.1109/IC2E.2014.84.

Kent S. Model Driven Engineering. In: Butler, M., Petre, L., Sere, K. (Eds) Integrated Formal Methods. IFM 2002. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg. 2002; 2335: 286-298. https://doi.org/10.1007/3-540-47884-1_16

Mantas J, Lina C, Rita B. Solidity code generation from UML state Machines in model-driven smart Contract Development. IEEE Access. 2022; 10(2022): 33465-33481. https://doi.org/ 10.1109/ACCESS.2022.3162227

Berdik D, Otoum S, Schmidt N, Porter D, Jararweh Y. A survey on blockchain for information systems management and security. Inf Process Manage. 2021; 58(1): 1-15. https://doi.org/ 10.1016/j.ipm.2020.102397.

Alvarez ML, Sarachaga I, Burgos A, Estevez E, Marcos M. A Methodological Approach to Model-Driven Design and Development of Automation Systems. IEEE Trans. Auto Sci Eng. 2018; 15(1): 67-79. https://doi.org/10.1109/TASE.2016.2574644.

Sitalakshmi V, Ramanathan V. Big data security challenges and strategies. AIMS Math. 2019; 4(3): 860–879. https://doi.org/10.3934/math.2019.3.860

Parra P, Polo OR., Fernandez J, Da Silva A, Sanchez S. Martínez A. A Platform-Aware Model-Driven Embedded Software Engineering Process Based on Annotated Analysis Models. IEEE Trans Emerg Top Comput. 2021; 9(1): 78-89. https://doi.org/10.1109/TETC.2018.2866024.

Samuel P. Automatic Code Generation from UML State Chart Diagrams. IEEE Access. 2019; 7: 8591-8608. https://doi.org/ 10.1109/ACCESS.2018.2890791.

Hou B, Shi Y, Qian K, Tao L. Towards Analyzing MongoDB NoSQL Security and Designing Injection Defense Solution. IEEE 3rd Int. Conf. Big Data Secur. Cloud (bigdatasecurity), IEEE Int Conf Hi. Per Sm Comput. (HPSC) and IEEE Int Conf Intgen Data Secur. (IDS), Beijing, China. 2017: 90-95. https://doi.org/10.1109/BigDataSecurity.2017.29.

Ron Aviv, Alexandra SP, Emanuel B. NoSQL No Injection? Examining NoSQL Security. In Proc of the 9th Workshop on Web 2.0 Secur. Priv. (W2SP). 2015; 1-4. https://doi.org/ 10.48550/arXiv.1506.04082.

Wu G, Mu Y, Susilo W. Threshold privacy-preserving cloud auditing with multiple uploaders. Int J Inf Secur. 2019; 18: 321–331. https://doi.org/10.1007/s10207-018-0420-6.

Samaraweera GD, Chang JM. Security and Privacy Implications on Database Systems in Big Data Era: A Survey. IEEE Trans Knowl Data Eng. 2021; 33: 239-258. https://doi.org/ 10.1109/TKDE.2019.2929794.

Jitender K, Varsha G. Security analysis of unstructured data in NOSQL Mongodb Database. IEEE Int Conf Comput Technol Smt Nat. (IC3TSN). 2018: 300-305. https://doi.org/ 10.1109/IC3TSN.2017.8284495.

Kuntal P. Performance analysis of AES, DES and Blowfish cryptographic algorithms on small and large data files. Springer. Int J Inf Tecnol. 2019; 11, 813–819. https://doi.org/10.1007/s41870-018-0271-4.

Abikoye OC, Adewole KS, Oladipupo AJ. Efficient data hiding system using cryptography and steganography. Int J Appl Inf Syst. 2012; 4(11):6–12. https://doi.org/10.5120/ijais12-450763.

Ikenna RC, Norliza K. A Scoping Study on Lightweight Cryptography Reviews in IoT. Baghdad Sci J. 2021; 18(2): 989-1000. http://doi.org/10.21123/bsj.2021.18.2(Suppl.).0989 .

Shukur WA, Qurban LK, Aljuboori A. Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms. Baghdad Sci J. 2023; 20(4): 1414. https://doi.org/ 10.21123/bsj.2023.7315.

Mujeeb-ur-Rehman J, Abdul GM, Nadeem AK and Mujeeb-u-Rehman M. Data integrity issues and challenges in next generation non-relational document-oriented database outsourced in public cloud, Int J Emerg Tren Eng Res. 2021; 9(4): 416-420. https://doi.org/10.30534/ijeter/2021/13942021.ISSN 2347-3983.

Jamali MR, Memon AG, Maree MR. Security issues in data at rest in a non-relational Document Database. Sindh Univ Res J. (Sci Ser.). 2021; 52 (03): 279-284. http://doi.org/10.26692/sujo/2020.09.41.

Downloads

Issue

Section

article

How to Cite

1.
Architectural Design for Data Security in Cloud-based Big Data Systems. Baghdad Sci.J [Internet]. [cited 2024 Apr. 30];21(9). Available from: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/8722