SlideShare a Scribd company logo
ENHANCEMENT OF PERFORMANCE AND SECURITY IN
BIGDATA PROCESSING
Aswin Jose 1
1
Final year, M.E, Computer Science And Engineering, Dhaanish Ahmed College of Engineering and
Technology, Chennai - 600045, India,aswin1906@gmail.com
Abstract—in the proposed system, building a Big Data Application with No SQL Database.
Each record and its associated data are usually stored together in a single document
Database, this simplifies data access and reduces the need for joins or complex transactions.
Documents stored are schema free and similar to each other, this flexibility can be
particularly helpful for modelling unstructured data. In this case, Collecting all the sensitive
data and process into server environment for storage in the no-sql database. Before storing
all the sensitive data's encryption will takes place using Proxy Re-Encryption algorithm. It
will allow to encrypt all the sensitive data's and reporting data’s like stream of bytes as
well.No-sql database doesn’t care about the datatype. It will simply store the data in any
format with less storage memory. Its leads to faster data access from multiple access point.
While external user collecting data with proper approval and the user should decrypt the
data using key and if any of the duplicate data exists means it will be filtered based on
mapReduce.mongoDB will store the data based on Value-Key Pair relationship.
Keywords--- NoSQL, Structured Data, Big Data, map-reduce, secure sharing, sensitive data, jwt
authentication, data streaming, proxy re-encryption
I. INTRODUCTION
The Internet and in various news media, it summarize all types of opinions in different media in a real-
time fashion, including updated, cross-referenced discussions by critics. This type of summarization
program is an excellent example for Big Data processing, as the information comes from multiple,
heterogeneous, autonomous sources with complex and evolving relationships, and keeps growing.
Along with the above example, the era of Big Data has arrived. Every day, 2.5 quintillion bytes of data
are created and 90 percent of the data in the world today Ire produced within the past two years.
Capability for data generation has never been so powerful and enormous ever since the invention of
the information technology in the early 19th century. As another example, on 4 October 2012, the first
presidential debate between President Barack Obama and Governor Mitt Romney triggered more than
10 million tweets within 2 hours. Among all these tweets, the specific moments that generated the most
discussions actually revealed the public interests, such as the discussions about Medicare and vouchers.
Such online discussions provide a new means to sense the public interests and generate feedback in
real-time, and are mostly appealing compared to generic media, such as radio or TV broadcasting.
Another example is Flickr, a public picture sharing site, which received 1.8 million photos per day, on
average, from February to March 2012.
Assuming the size of each photo is 2 megabytes (MB), this requires 3.6 terabytes (TB) storage every
single day. Indeed, as an old saying states: “a picture is worth a thousand words,” the billions of
pictures on Flicker are a treasure tank for us to explore the human society, social events, public affairs,
disasters, and so on, only if the power to harness the enormous amount of data. The above examples
demonstrate the rise of Big Data applications where data collection has grown tremendously and is
beyond the ability of commonly used software tools to capture, manage, and process within a “tolerable
elapsed time.” The most fundamental challenge for Big Data applications is to explore the large
volumes of data and extract useful information or knowledge for future actions. In many situations,
the knowledge extraction process has to be very efficient and close to real time because storing all
observed data is nearly infeasible. For example, the square kilometer array (SKA) in radio astronomy
ISBN:978-1534910799
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 20161
consists of 1,000 to 1,500 15-meter dishes in a central 5-km area. It provides 100 times more sensitive
vision than any existing radio telescopes, answering fundamental questions about the Universe
II. RELATED WORK
In this section, we focus on previous work on relevant topics such as encryption, access control,
trusted computing, and data security destruction technology in services. Computation services refer
primarily to operations (such as encrypting data, conversion, or function encryption) on data used
by participants, which can invigorate “dead” data.
We consider user’s preferences as sensitive data. When Alice submits a query (sportswear),
the Search Engine Service Provider (SESP) first looks for Alice’s preference on the big data
platform.
The Regarding encryption technology, the Attribute-Based Encryption (ABE) algorithm
includes Key-Policy ABE (KP-ABE) and Cipher text-Policy ABE (CP- ABE). ABE decryption
rules are contained in the encryption algorithm, avoiding the costs of frequent key distribution
in ciphertext access control. However, when the access control strategy changes dynamically, a data
owner is required to re-encrypt the data. A semi-trusted agent with a proxy key can re-encrypt cipher
text; however, the agent cannot obtain the corresponding plaintext or compute the decryption key
of either party in the authorization process. The FHE mechanism permits a specific algebraic
operation based on cipher text that yields a still encrypted result. More specifically, retrieval
and comparison of the encrypted data produce correct results, but the data are not decrypted
throughout the entire process. The FHE scheme requires very substantial computation, and it is not
always easy to implement with existing technology. In regard to cipher text retrieval with a view
toward data privacy protection in the cloud, cipher text retrieval solutions in the cloud are proposed
.Regarding access control, a new cryptographic access control scheme, Attribute-Based Access
Control for Cloud Storage (AB- ACCS). Each user’s private key is labeled with a set of attributes,
and data is encrypted with an attribute condition restricting the user to be able to decrypt the data
only if their attributes satisfy the data’s condition. Distributed systems with Information Flow
Control (DIFC) use a tag to track data based on a set of simple data tracking rules. DIFC allow
untrusted software to use private data, but use trusted code to control whether the private data
can be revealed. The authors consider the complexity of fine-grained access control for a large
number of users in the cloud and propose a secure and efficient revocation scheme based on a
modified CP-ABE algorithm. This algorithm is used to establish fine-grained access control in which
users are revoked according to Shamir’s theory of secret sharing. With a Single Sign-On (SSO),
any authorized user can log in to the cloud storage system using a standard common application
interface
III.TRUSTED COMPUTING AND PROCESS PROTECT
Trusted Computing Group (TCG) introduced the Trusted Platform Module (TPM) in its
existing architecture, to ensure that a general trusted computing platform using TPM security
features is credible. In academia, the main research idea includes first building a trusted terminal
platform based on a security chip, and then establishing trust between platforms through remote
attestation. Then, trust is extended to the network. Integrity measurement is the primary technical
means of building a trusted terminal platform. Research on virtual platform measurement
technology includes HIMA and Hyper Sentry[13]
metric architecture. Using virtual platform isolation
features, HIMA measures the
ISBN:978-1534910799
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 20162
Integrity of a virtual machine by monitoring the virtual machine’s memory. Hyper Sentry
completes the integrity measurement using a hardware mechanism. TCG issued a Trusted
Network Connection (TNC) architecture specification version 1.0 in 2005, characterized by having
terminal integrity as a decision of network access control. Chinese scholars have conducted
research on trusted network connections based on the TNC architecture. Beginning by establishing
the trust of the terminal platform, Feng et al. proposed a t r u s t w o r t h i ne s s -based t r u s t model
and provided a method of building a trust chain dynamically with information flow. Zhang et al.
[17]
proposed a transparent, backward-compatible approach that protects the privacy and
integrity of customers’ virtual machines on commodity virtualized infrastructures. Dissolver is a
prototype system based on a Xen VMM and a Confidentiality and High-Assurance Equipped
Operating System (CHAOS). It ensures that the user’s text data exist only in a private operating space
and that the user’s key exists only in the memory space of the VMM. Data in the memory and
the user’s key are destroyed at a user-specified time
IV. SENSITIVE DATA STORAGE
H-PRE involves three types of algorithm, traditional identity-based encryption (including
SetupIBE, KeyGenIBE, EncIBE, and DecIBE), re-encryption (including KeyGenRE, ReEnc, and ReDec
functions), and the last one is the traditional public key cryptosystems (including KeyGenPKE,
EncPKE, and DecPKE). The basic H-PRE process is simple. The data owner encrypts sensitive data
using a local security plug-in and then uploads the encrypted data to a big data platform. The
data are transformed into the cipher text that can be decrypted by a specified user after PRE
services. If an SESP is the specified user, then the SESP can decrypt the data using its own private
key to obtain the corresponding clear text. We complete the following steps to implement the H-
PRE algorithm.
The data owner encrypts data locall y, first using the Advanced Encryption Standard (AES)
symmetric encryption algorithm to encrypt the submission data and then using the PRE algorithm to
encrypt the symmetric key of the data. These results are all stored within the distributed data. In the
meantime, if the data owner shares the sensitive data with other users, the data owner must authorize
the sensitive data locally and generate the PRE key, which is stored in the authorization key server.
Let On the big data platform, the PRE server re-encrypts and transforms the original cipher using
the PRE key. Then, PRE cipher text, which can be encrypted by the (authorized) data users, is
generated. If the data user wants to use the data on the big data platform, the data user will send data
requests to the platform and then query whether there is corresponding data in the shared space. If such
data exist, the data user accesses and downloads it. The operation on the big data platform is
independent and transparent to users. Moreover, the computing resources of the big data platform are
more powerful than those of the client. Hence, we can put PRE computational overhead on the big
data platform to improve user experience. The PRE system includes data submission, storage (sharing),
and data extraction
Operations Data extraction operations after receiving the data download request, the
Web browser invokes the security plug-in and provides data download services for the data user,
in accordance with the following detailed steps. The browser (1) queries whether there is
authorization for the data user on the PRE server of the big data platform, and if an authorization
is in effect, proceeds to Step (2); (2) uses the download plug-ins to send data download requests to
the big data platform, which then finds PRE cipher text data in the data center; (3) pushes the
PRE cipher text to the secure data plug-in on the big data platform
ISBN:978-1534910799
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 20163
V. WORKING METHODS
H-PRE involves three types of algorithm, traditional identity-based encryption (including
SetupIBE, KeyGenIBE, EncIBE, and DecIBE), re-encryption (including KeyGenRE, ReEnc, and ReDec
functions), and the last one is the traditional public key cryptosystems (including KeyGenPKE, EncPKE,
and DecPKE). The basic H-PRE process is simple. The data owner encrypts sensitive data using a
local security plug-in and then uploads the encrypted data to a big data platform. The data are
transformed into the cipher text that can be decrypted by a specified user after PRE services. If
an SESP is the specified user, then the SESP can decrypt the data using its own private key to obtain
the corresponding clear text. We complete the following steps to implement the H-PRE algorithm.
5.1. SetupIBE.k/;
Input security parameters k, generate randomly a primary security parameter mk, calculate
the system parameter set params using a bilinear map and hash function.
5.2. KeyGenIBE.mk, params, id/;
When the user requests the private key from the key generation center, the key
generation center obtains the legal identity (id) of the user and generates the public and private
keys (pkid, skid) for the user using params and mk.
5.3. KeyGenPKE.params/;
When a user submits a request, the key management center not only generates the
identity-based public and private keys, but also generates the public and private keys of the traditional
public key system (pkid, skid).
5.4. EncIBE.pkid; skid; params; m /;
When the user encrypts data, the data owner encrypts the clear-text (m) into the
ciphertext (c D .c1; c2/) using the user’s own (pk , sk ) and a random number (r 2 RZ ).
5.5 KeyGenRE.skidi ;skidi
; pkidj
; params /;
When the data owner (user i ) grants user j permissions, using skidi , skidi , and pkidj
user i computes the PRE key (rkidi idj ), completing the transformation from user i to user j.When a
user submits a request, the key management center not only generates the identity-based public and
private keys, but alsogenerates the public and private keys of the traditional public key system
(pkid, skid).
5.6. ReEnc.ci; rkidi idj ; params /;
This is a function for decryptingthePREciphertext.AfterreceivingthePRE ciphertext
(cj D .cj1; cj 2/) from the proxy server of the big data platform, user j determines the clear-text
(m0 D m) of the data using his or her own.
5.6. ReEnc.ci; rkidi idj ; params /;
This is a function for decryptingthePREciphertext.AfterreceivingthePRE ciphertext
(cj D .cj1; cj 2/) from the proxy server of the big data platform, user j determines the clear-
text (m0 D m) of the data using his or her own.
VI. MODULE INTEGRATION
6.1. User Type Creation
Common user will create a profile based on the role. Each user details has been handled
in the mongo database. As requested every user details has been restricted as per their role.so here
the mongo DB will save the data in the JSON format. User details has been handled using node
server. Node server will act like a server to make a communication between client and DB. In this
project designed the User Interface Frame (Angularjs) to communicate the database using the
programming language like Nodejs.
ISBN:978-1534910799
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 20164
6.1. Sensitive Data Creation
The request has been handled by a server side programming called nodejs.Node
package manager is a main kit to handle all the request from the server side end. Internal user
will customize the requested details based on the External request. Internal user doesn't allow
to access all the details requested by External user. Consolidated the requested details in UI
and forward filtered data to admin. Admin is the one who is going to collect all the sensitive
data and update in the documentary database. Before updating data in the database the data
has been encrypted based on the Proxy Re-Encryption
6.1. Mongo Data Customization
Mongo DB allow to store bulk amount of data in the JSON format. It will allow
to handle unstructured data, semi-structured and structured data. It’s have more robustness
and light weight to do manipulation. In this project, customizing the sensitive data and will
collect in the mongo DB for further manipulation. While doing CRUD operation it will filter
the data using unique id based upon the user request. Admin user also will customize the data
for approval that has been also handle in mongo DB.
6.1. Data Collection
External user used to collect all the sensitive data based on the admin approval. He’s
allowed to collect the buffered stream of data .Before fetching the data from documentary database
he should decrypt the data based on the key phrase.
VII. CONCLUSION
In this project, here proposed the data storage has been handled in document type data like mongoDB.
Admin user will collect all the sensitive data in different perspective.Data collection includes PDF
files,json files etc.PDF Files has been collected in the form of stream of bytes.Prior to saving data in
the database admin used to do encryption followed by Proxy Pre-Encryption.External user will collect
the data based on the admin approval using the decryption key.So here the document data can able to
store bulk amount of data with less memory space and collecting the data with asynchronous call to
handle multiple event.
REFERENCES
[1] Guangyan Huang, Jing He, Chi-Hung Chi, Wanlei Zhou, Yanchun Zhang, “A Data as a Product Model for Future
Consumption of Big Stream Data in Clouds”. IEEE International Conference on Year: 2015.
[2] “Kyounghyun Park; Minh Chau Nguyen; Heesun Won”,Web-based collaborative big data analytics on big data as a
service platform,2015
[3] E.Y. Chang, H. Bai, and K. Zhu, “Parallel Algorithms for Mining Large-Scale Rich-Media Data” Proc. 17th ACM
Int’l Conf. Multimedia, (MM ’09,) pp. 917-918, 2009.
[4] L. Bonnet, A. Laurent, M. Sala, B. Laurent, N. Sicard ,“Reduce, It say: What nosql can do for data aggregation and
bi in large repositories.” In Database and Expert Systems Applications (DEXA), 2011
[5] A. Machanavajjhala and J.P. Reiter, “Big Privacy: Protecting Confidentiality in Big Data” ACM Crossroads, vol.
19, no. 1, pp. 20-23, 2012
[6] M. Stonebraker, “Why Enterprises Are Uninterested in NoSQL(MONGO).” [Online] Available at:
http://cacm.acm.org/blogs/blog-cacm/99512-whyenterprises-are-uninterested-in-nosql/fulltext [Accessed: 02 Oct
2010].
[7] Jinxin Huang; Lin Niu; Jie Zhan; Xiaosheng Peng; Junyang Bai; Shijie Cheng,"Technical aspects and case study
of big data based condition monitoring of power apparatuses”. 2014
[8] E. Brewer, “A certain freedom: thoughts on the CAP theorem”[Report], 2010, New York: ACM.
[9] Information week, “Surprise: 44% of Business IT Pros Never Heard of NoSQL.” [Online] Available
ISBN:978-1534910799
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 20165
at:http://www.informationweek.com/software/informationmanagement/surprise-44-of-business-it-pros-never-
he/227500077 [Accessed: 02 Oct 2013].
[10] Oracle, “Oracle: Big Data for the Enterprise.” [White Paper, 2011] Redwood Shores: Oracle.
[11] J. Han, E. Haihong, G. Le, J. Du "Survey on NoSQL database," Pervasive Computing and the Applications
(ICPCA), 2011
[12] Mongodb, “Big Data: Examples and Guidelines for the Enterprise Decision Maker.” [White Paper, 2013] New
York: MongoDB.
[13] S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi,and P. Samarati, “Integrity for join queries in the
cloud,” IEEE Trans. Cloud Comput., vol. 1, no. 2, pp. 187–200, Jul.–Dec. 2013.
[14] J. Pokorny “NoSQL databases: a step to database scalability in web environment” International Journal of Web
Information Systems20139:1, 69-82
[15] E. Birney, “The Making of ENCODE: Lessons for Big-Data Projects,” Nature, vol. 489, pp. 49-51, 2012
[16] Philosophy of Big Data: Expanding the Human-Data Relation with Big DataScience Services. Big Data Computing
Service and Applications (BigDataService), 2015 IEEE First International Conference on Year: 2015
[17] Jie Zhan; Jinxin Huang; Lin Niu; Xiaosheng Peng; Diyuan Deng; Shijie Cheng,"Study of the key technologies of
electric power big data and its application prospects in smart grid”.,2014
ISBN:978-1534910799
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 20166

More Related Content

What's hot (17)

PDF
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
IJERA Editor
 
PDF
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET Journal
 
DOCX
Secure distributed deduplication systems with improved reliability
Pvrtechnologies Nellore
 
PDF
Cloud Data Security and Secure Data Sharing Methods
IJCSIS Research Publications
 
DOCX
Cloud assisted mobile-access of health data with privacy and auditability
Adz91 Digital Ads Pvt Ltd
 
PDF
Cloud assisted mobile-access of health data with privacy and auditability
Shakas Technologies
 
PDF
Cloud Data Security and Secure Data Sharing Methods
IJCSIS Research Publications
 
PDF
Control Cloud Data Access Using Attribute-Based Encryption
paperpublications3
 
PDF
Security Check in Cloud Computing through Third Party Auditor
ijsrd.com
 
PPTX
Cloud assisted mobile-access of health data with privacy and auditability
IGEEKS TECHNOLOGIES
 
PDF
Privacy-Preserving Updates to Anonymous and Confidential Database
ijdmtaiir
 
PDF
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
IOSR Journals
 
PDF
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
 
PDF
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Pvrtechnologies Nellore
 
PDF
Data Partitioning In Cloud Storage Using DESD Crypto Technique
IJCSIS Research Publications
 
PDF
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Swathi Rampur
 
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
IJERA Editor
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET Journal
 
Secure distributed deduplication systems with improved reliability
Pvrtechnologies Nellore
 
Cloud Data Security and Secure Data Sharing Methods
IJCSIS Research Publications
 
Cloud assisted mobile-access of health data with privacy and auditability
Adz91 Digital Ads Pvt Ltd
 
Cloud assisted mobile-access of health data with privacy and auditability
Shakas Technologies
 
Cloud Data Security and Secure Data Sharing Methods
IJCSIS Research Publications
 
Control Cloud Data Access Using Attribute-Based Encryption
paperpublications3
 
Security Check in Cloud Computing through Third Party Auditor
ijsrd.com
 
Cloud assisted mobile-access of health data with privacy and auditability
IGEEKS TECHNOLOGIES
 
Privacy-Preserving Updates to Anonymous and Confidential Database
ijdmtaiir
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
IOSR Journals
 
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
 
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Pvrtechnologies Nellore
 
Data Partitioning In Cloud Storage Using DESD Crypto Technique
IJCSIS Research Publications
 
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Swathi Rampur
 

Viewers also liked (20)

PDF
Iirdem a novel approach for enhancing security in multi cloud environment
Iaetsd Iaetsd
 
PDF
iaetsd Modern e aid to dementia patients
Iaetsd Iaetsd
 
PDF
4 iaetsd detecting linear structures within the aster satellite image by effe...
Iaetsd Iaetsd
 
PDF
iaetsd Easy tax a user friendly mobile application
Iaetsd Iaetsd
 
PDF
iaetsd Secured multiple keyword ranked search over encrypted databases
Iaetsd Iaetsd
 
PDF
IIirdem mri brain tumour extraction by multi modality magnetic resonance imag...
Iaetsd Iaetsd
 
PDF
iaetsd Second level security using intrusion detection and avoidance system
Iaetsd Iaetsd
 
PDF
Iaetsd emergency recovery control unit using microcontroller
Iaetsd Iaetsd
 
PDF
Iaetsd nano robotics in cancer
Iaetsd Iaetsd
 
PDF
iaetsd Vehicle monitoring and security system
Iaetsd Iaetsd
 
PDF
Iirdem screen less displays – the imminent vanguard
Iaetsd Iaetsd
 
PDF
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
Iaetsd Iaetsd
 
PDF
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
Iaetsd Iaetsd
 
PDF
Iaetsd experimental investigation on self compacting fiber reinforced concret...
Iaetsd Iaetsd
 
PDF
Iaetsd io t based advanced smart health care system
Iaetsd Iaetsd
 
PDF
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd Iaetsd
 
PDF
Business Studies (Marketing Management) Project Class 12th CBSE
Dheeraj Kumar
 
DOC
2.informacionalismo
Hilario Aradiel
 
PPTX
How to create content that will get you loads of links
ffats1
 
PPTX
Internet Marketing Strategy as simple as 123.
ffats1
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iaetsd Iaetsd
 
iaetsd Modern e aid to dementia patients
Iaetsd Iaetsd
 
4 iaetsd detecting linear structures within the aster satellite image by effe...
Iaetsd Iaetsd
 
iaetsd Easy tax a user friendly mobile application
Iaetsd Iaetsd
 
iaetsd Secured multiple keyword ranked search over encrypted databases
Iaetsd Iaetsd
 
IIirdem mri brain tumour extraction by multi modality magnetic resonance imag...
Iaetsd Iaetsd
 
iaetsd Second level security using intrusion detection and avoidance system
Iaetsd Iaetsd
 
Iaetsd emergency recovery control unit using microcontroller
Iaetsd Iaetsd
 
Iaetsd nano robotics in cancer
Iaetsd Iaetsd
 
iaetsd Vehicle monitoring and security system
Iaetsd Iaetsd
 
Iirdem screen less displays – the imminent vanguard
Iaetsd Iaetsd
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
Iaetsd Iaetsd
 
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
Iaetsd Iaetsd
 
Iaetsd experimental investigation on self compacting fiber reinforced concret...
Iaetsd Iaetsd
 
Iaetsd io t based advanced smart health care system
Iaetsd Iaetsd
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd Iaetsd
 
Business Studies (Marketing Management) Project Class 12th CBSE
Dheeraj Kumar
 
2.informacionalismo
Hilario Aradiel
 
How to create content that will get you loads of links
ffats1
 
Internet Marketing Strategy as simple as 123.
ffats1
 
Ad

Similar to Iaetsd enhancement of performance and security in bigdata processing (20)

PDF
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
 
PDF
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
IRJET Journal
 
PDF
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
IJECEIAES
 
PDF
Design of access control framework for big data as a service platform
International Journal of Reconfigurable and Embedded Systems
 
PDF
Ieeepro techno solutions 2011 ieee java project -secure role based data
hemanthbbc
 
PDF
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
ASAITHAMBIRAJAA
 
PPSX
Secure and Privacy-Preserving Big-Data Processing
Shantanu Sharma
 
PDF
Enhancing Security in Dynamic Public Cloud Data Using Encryption
Association of Scientists, Developers and Faculties
 
PDF
Enforcing multi user access policies in cloud computing
IAEME Publication
 
PDF
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
cscpconf
 
PDF
Anonymous Key Based Secure File Encryption in Cloud
IRJET Journal
 
PDF
Analysis of classical encryption techniques in cloud computing
redpel dot com
 
PDF
Secure File Sharing on Cloud
Supriya .
 
PDF
Paper1
Vikas Khairnar
 
PDF
Security issues associated with big data in cloud computing
IJNSA Journal
 
PDF
SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING
IJNSA Journal
 
PDF
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
 
PDF
Isaca journal - bridging the gap between access and security in big data...
Ulf Mattsson
 
PDF
Data security framework for cloud computing networks
IAEME Publication
 
PDF
High level view of cloud security
csandit
 
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
IRJET Journal
 
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
IJECEIAES
 
Design of access control framework for big data as a service platform
International Journal of Reconfigurable and Embedded Systems
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
hemanthbbc
 
Ieeepro techno solutions 2011 ieee dotnet project -secure role based data
ASAITHAMBIRAJAA
 
Secure and Privacy-Preserving Big-Data Processing
Shantanu Sharma
 
Enhancing Security in Dynamic Public Cloud Data Using Encryption
Association of Scientists, Developers and Faculties
 
Enforcing multi user access policies in cloud computing
IAEME Publication
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
cscpconf
 
Anonymous Key Based Secure File Encryption in Cloud
IRJET Journal
 
Analysis of classical encryption techniques in cloud computing
redpel dot com
 
Secure File Sharing on Cloud
Supriya .
 
Security issues associated with big data in cloud computing
IJNSA Journal
 
SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING
IJNSA Journal
 
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
 
Isaca journal - bridging the gap between access and security in big data...
Ulf Mattsson
 
Data security framework for cloud computing networks
IAEME Publication
 
High level view of cloud security
csandit
 
Ad

More from Iaetsd Iaetsd (20)

PDF
iaetsd Survey on cooperative relay based data transmission
Iaetsd Iaetsd
 
PDF
iaetsd Software defined am transmitter using vhdl
Iaetsd Iaetsd
 
PDF
iaetsd Health monitoring system with wireless alarm
Iaetsd Iaetsd
 
PDF
iaetsd Equalizing channel and power based on cognitive radio system over mult...
Iaetsd Iaetsd
 
PDF
iaetsd Economic analysis and re design of driver’s car seat
Iaetsd Iaetsd
 
PDF
iaetsd Design of slotted microstrip patch antenna for wlan application
Iaetsd Iaetsd
 
PDF
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
Iaetsd Iaetsd
 
PDF
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
Iaetsd Iaetsd
 
PDF
Fabrication of dual power bike
Iaetsd Iaetsd
 
PDF
Blue brain technology
Iaetsd Iaetsd
 
PDF
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
Iaetsd Iaetsd
 
PDF
iirdem Surveillance aided robotic bird
Iaetsd Iaetsd
 
PDF
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
Iaetsd Iaetsd
 
PDF
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
Iaetsd Iaetsd
 
PDF
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
Iaetsd Iaetsd
 
PDF
iaetsd Shared authority based privacy preserving protocol
Iaetsd Iaetsd
 
PDF
iaetsd Robots in oil and gas refineries
Iaetsd Iaetsd
 
PDF
iaetsd Modeling of solar steam engine system using parabolic
Iaetsd Iaetsd
 
PDF
iaetsd Isolation of cellulose from non conventional source and its chemical m...
Iaetsd Iaetsd
 
PDF
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...
Iaetsd Iaetsd
 
iaetsd Survey on cooperative relay based data transmission
Iaetsd Iaetsd
 
iaetsd Software defined am transmitter using vhdl
Iaetsd Iaetsd
 
iaetsd Health monitoring system with wireless alarm
Iaetsd Iaetsd
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
Iaetsd Iaetsd
 
iaetsd Economic analysis and re design of driver’s car seat
Iaetsd Iaetsd
 
iaetsd Design of slotted microstrip patch antenna for wlan application
Iaetsd Iaetsd
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
Iaetsd Iaetsd
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
Iaetsd Iaetsd
 
Fabrication of dual power bike
Iaetsd Iaetsd
 
Blue brain technology
Iaetsd Iaetsd
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
Iaetsd Iaetsd
 
iirdem Surveillance aided robotic bird
Iaetsd Iaetsd
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
Iaetsd Iaetsd
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
Iaetsd Iaetsd
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
Iaetsd Iaetsd
 
iaetsd Shared authority based privacy preserving protocol
Iaetsd Iaetsd
 
iaetsd Robots in oil and gas refineries
Iaetsd Iaetsd
 
iaetsd Modeling of solar steam engine system using parabolic
Iaetsd Iaetsd
 
iaetsd Isolation of cellulose from non conventional source and its chemical m...
Iaetsd Iaetsd
 
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...
Iaetsd Iaetsd
 

Recently uploaded (20)

PDF
Basic_Concepts_in_Clinical_Biochemistry_2018كيمياء_عملي.pdf
AdelLoin
 
PPTX
2025 CGI Congres - Surviving agile v05.pptx
Derk-Jan de Grood
 
PPTX
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
PPTX
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
PPTX
Presentation 2.pptx AI-powered home security systems Secure-by-design IoT fr...
SoundaryaBC2
 
PPTX
MATLAB : Introduction , Features , Display Windows, Syntax, Operators, Graph...
Amity University, Patna
 
PDF
Electrical Engineer operation Supervisor
ssaruntatapower143
 
PPTX
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
DOC
MRRS Strength and Durability of Concrete
CivilMythili
 
PDF
Water Industry Process Automation & Control Monthly July 2025
Water Industry Process Automation & Control
 
PPTX
GitOps_Without_K8s_Training_detailed git repository
DanialHabibi2
 
PDF
smart lot access control system with eye
rasabzahra
 
PPTX
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
PPTX
Evaluation and thermal analysis of shell and tube heat exchanger as per requi...
shahveer210504
 
DOCX
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
PDF
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
PPTX
Big Data and Data Science hype .pptx
SUNEEL37
 
PPTX
The Role of Information Technology in Environmental Protectio....pptx
nallamillisriram
 
PPT
Carmon_Remote Sensing GIS by Mahesh kumar
DhananjayM6
 
PPTX
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
Basic_Concepts_in_Clinical_Biochemistry_2018كيمياء_عملي.pdf
AdelLoin
 
2025 CGI Congres - Surviving agile v05.pptx
Derk-Jan de Grood
 
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
Presentation 2.pptx AI-powered home security systems Secure-by-design IoT fr...
SoundaryaBC2
 
MATLAB : Introduction , Features , Display Windows, Syntax, Operators, Graph...
Amity University, Patna
 
Electrical Engineer operation Supervisor
ssaruntatapower143
 
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
MRRS Strength and Durability of Concrete
CivilMythili
 
Water Industry Process Automation & Control Monthly July 2025
Water Industry Process Automation & Control
 
GitOps_Without_K8s_Training_detailed git repository
DanialHabibi2
 
smart lot access control system with eye
rasabzahra
 
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
Evaluation and thermal analysis of shell and tube heat exchanger as per requi...
shahveer210504
 
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
Big Data and Data Science hype .pptx
SUNEEL37
 
The Role of Information Technology in Environmental Protectio....pptx
nallamillisriram
 
Carmon_Remote Sensing GIS by Mahesh kumar
DhananjayM6
 
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 

Iaetsd enhancement of performance and security in bigdata processing

  • 1. ENHANCEMENT OF PERFORMANCE AND SECURITY IN BIGDATA PROCESSING Aswin Jose 1 1 Final year, M.E, Computer Science And Engineering, Dhaanish Ahmed College of Engineering and Technology, Chennai - 600045, India,[email protected] Abstract—in the proposed system, building a Big Data Application with No SQL Database. Each record and its associated data are usually stored together in a single document Database, this simplifies data access and reduces the need for joins or complex transactions. Documents stored are schema free and similar to each other, this flexibility can be particularly helpful for modelling unstructured data. In this case, Collecting all the sensitive data and process into server environment for storage in the no-sql database. Before storing all the sensitive data's encryption will takes place using Proxy Re-Encryption algorithm. It will allow to encrypt all the sensitive data's and reporting data’s like stream of bytes as well.No-sql database doesn’t care about the datatype. It will simply store the data in any format with less storage memory. Its leads to faster data access from multiple access point. While external user collecting data with proper approval and the user should decrypt the data using key and if any of the duplicate data exists means it will be filtered based on mapReduce.mongoDB will store the data based on Value-Key Pair relationship. Keywords--- NoSQL, Structured Data, Big Data, map-reduce, secure sharing, sensitive data, jwt authentication, data streaming, proxy re-encryption I. INTRODUCTION The Internet and in various news media, it summarize all types of opinions in different media in a real- time fashion, including updated, cross-referenced discussions by critics. This type of summarization program is an excellent example for Big Data processing, as the information comes from multiple, heterogeneous, autonomous sources with complex and evolving relationships, and keeps growing. Along with the above example, the era of Big Data has arrived. Every day, 2.5 quintillion bytes of data are created and 90 percent of the data in the world today Ire produced within the past two years. Capability for data generation has never been so powerful and enormous ever since the invention of the information technology in the early 19th century. As another example, on 4 October 2012, the first presidential debate between President Barack Obama and Governor Mitt Romney triggered more than 10 million tweets within 2 hours. Among all these tweets, the specific moments that generated the most discussions actually revealed the public interests, such as the discussions about Medicare and vouchers. Such online discussions provide a new means to sense the public interests and generate feedback in real-time, and are mostly appealing compared to generic media, such as radio or TV broadcasting. Another example is Flickr, a public picture sharing site, which received 1.8 million photos per day, on average, from February to March 2012. Assuming the size of each photo is 2 megabytes (MB), this requires 3.6 terabytes (TB) storage every single day. Indeed, as an old saying states: “a picture is worth a thousand words,” the billions of pictures on Flicker are a treasure tank for us to explore the human society, social events, public affairs, disasters, and so on, only if the power to harness the enormous amount of data. The above examples demonstrate the rise of Big Data applications where data collection has grown tremendously and is beyond the ability of commonly used software tools to capture, manage, and process within a “tolerable elapsed time.” The most fundamental challenge for Big Data applications is to explore the large volumes of data and extract useful information or knowledge for future actions. In many situations, the knowledge extraction process has to be very efficient and close to real time because storing all observed data is nearly infeasible. For example, the square kilometer array (SKA) in radio astronomy ISBN:978-1534910799 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 20161
  • 2. consists of 1,000 to 1,500 15-meter dishes in a central 5-km area. It provides 100 times more sensitive vision than any existing radio telescopes, answering fundamental questions about the Universe II. RELATED WORK In this section, we focus on previous work on relevant topics such as encryption, access control, trusted computing, and data security destruction technology in services. Computation services refer primarily to operations (such as encrypting data, conversion, or function encryption) on data used by participants, which can invigorate “dead” data. We consider user’s preferences as sensitive data. When Alice submits a query (sportswear), the Search Engine Service Provider (SESP) first looks for Alice’s preference on the big data platform. The Regarding encryption technology, the Attribute-Based Encryption (ABE) algorithm includes Key-Policy ABE (KP-ABE) and Cipher text-Policy ABE (CP- ABE). ABE decryption rules are contained in the encryption algorithm, avoiding the costs of frequent key distribution in ciphertext access control. However, when the access control strategy changes dynamically, a data owner is required to re-encrypt the data. A semi-trusted agent with a proxy key can re-encrypt cipher text; however, the agent cannot obtain the corresponding plaintext or compute the decryption key of either party in the authorization process. The FHE mechanism permits a specific algebraic operation based on cipher text that yields a still encrypted result. More specifically, retrieval and comparison of the encrypted data produce correct results, but the data are not decrypted throughout the entire process. The FHE scheme requires very substantial computation, and it is not always easy to implement with existing technology. In regard to cipher text retrieval with a view toward data privacy protection in the cloud, cipher text retrieval solutions in the cloud are proposed .Regarding access control, a new cryptographic access control scheme, Attribute-Based Access Control for Cloud Storage (AB- ACCS). Each user’s private key is labeled with a set of attributes, and data is encrypted with an attribute condition restricting the user to be able to decrypt the data only if their attributes satisfy the data’s condition. Distributed systems with Information Flow Control (DIFC) use a tag to track data based on a set of simple data tracking rules. DIFC allow untrusted software to use private data, but use trusted code to control whether the private data can be revealed. The authors consider the complexity of fine-grained access control for a large number of users in the cloud and propose a secure and efficient revocation scheme based on a modified CP-ABE algorithm. This algorithm is used to establish fine-grained access control in which users are revoked according to Shamir’s theory of secret sharing. With a Single Sign-On (SSO), any authorized user can log in to the cloud storage system using a standard common application interface III.TRUSTED COMPUTING AND PROCESS PROTECT Trusted Computing Group (TCG) introduced the Trusted Platform Module (TPM) in its existing architecture, to ensure that a general trusted computing platform using TPM security features is credible. In academia, the main research idea includes first building a trusted terminal platform based on a security chip, and then establishing trust between platforms through remote attestation. Then, trust is extended to the network. Integrity measurement is the primary technical means of building a trusted terminal platform. Research on virtual platform measurement technology includes HIMA and Hyper Sentry[13] metric architecture. Using virtual platform isolation features, HIMA measures the ISBN:978-1534910799 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 20162
  • 3. Integrity of a virtual machine by monitoring the virtual machine’s memory. Hyper Sentry completes the integrity measurement using a hardware mechanism. TCG issued a Trusted Network Connection (TNC) architecture specification version 1.0 in 2005, characterized by having terminal integrity as a decision of network access control. Chinese scholars have conducted research on trusted network connections based on the TNC architecture. Beginning by establishing the trust of the terminal platform, Feng et al. proposed a t r u s t w o r t h i ne s s -based t r u s t model and provided a method of building a trust chain dynamically with information flow. Zhang et al. [17] proposed a transparent, backward-compatible approach that protects the privacy and integrity of customers’ virtual machines on commodity virtualized infrastructures. Dissolver is a prototype system based on a Xen VMM and a Confidentiality and High-Assurance Equipped Operating System (CHAOS). It ensures that the user’s text data exist only in a private operating space and that the user’s key exists only in the memory space of the VMM. Data in the memory and the user’s key are destroyed at a user-specified time IV. SENSITIVE DATA STORAGE H-PRE involves three types of algorithm, traditional identity-based encryption (including SetupIBE, KeyGenIBE, EncIBE, and DecIBE), re-encryption (including KeyGenRE, ReEnc, and ReDec functions), and the last one is the traditional public key cryptosystems (including KeyGenPKE, EncPKE, and DecPKE). The basic H-PRE process is simple. The data owner encrypts sensitive data using a local security plug-in and then uploads the encrypted data to a big data platform. The data are transformed into the cipher text that can be decrypted by a specified user after PRE services. If an SESP is the specified user, then the SESP can decrypt the data using its own private key to obtain the corresponding clear text. We complete the following steps to implement the H- PRE algorithm. The data owner encrypts data locall y, first using the Advanced Encryption Standard (AES) symmetric encryption algorithm to encrypt the submission data and then using the PRE algorithm to encrypt the symmetric key of the data. These results are all stored within the distributed data. In the meantime, if the data owner shares the sensitive data with other users, the data owner must authorize the sensitive data locally and generate the PRE key, which is stored in the authorization key server. Let On the big data platform, the PRE server re-encrypts and transforms the original cipher using the PRE key. Then, PRE cipher text, which can be encrypted by the (authorized) data users, is generated. If the data user wants to use the data on the big data platform, the data user will send data requests to the platform and then query whether there is corresponding data in the shared space. If such data exist, the data user accesses and downloads it. The operation on the big data platform is independent and transparent to users. Moreover, the computing resources of the big data platform are more powerful than those of the client. Hence, we can put PRE computational overhead on the big data platform to improve user experience. The PRE system includes data submission, storage (sharing), and data extraction Operations Data extraction operations after receiving the data download request, the Web browser invokes the security plug-in and provides data download services for the data user, in accordance with the following detailed steps. The browser (1) queries whether there is authorization for the data user on the PRE server of the big data platform, and if an authorization is in effect, proceeds to Step (2); (2) uses the download plug-ins to send data download requests to the big data platform, which then finds PRE cipher text data in the data center; (3) pushes the PRE cipher text to the secure data plug-in on the big data platform ISBN:978-1534910799 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 20163
  • 4. V. WORKING METHODS H-PRE involves three types of algorithm, traditional identity-based encryption (including SetupIBE, KeyGenIBE, EncIBE, and DecIBE), re-encryption (including KeyGenRE, ReEnc, and ReDec functions), and the last one is the traditional public key cryptosystems (including KeyGenPKE, EncPKE, and DecPKE). The basic H-PRE process is simple. The data owner encrypts sensitive data using a local security plug-in and then uploads the encrypted data to a big data platform. The data are transformed into the cipher text that can be decrypted by a specified user after PRE services. If an SESP is the specified user, then the SESP can decrypt the data using its own private key to obtain the corresponding clear text. We complete the following steps to implement the H-PRE algorithm. 5.1. SetupIBE.k/; Input security parameters k, generate randomly a primary security parameter mk, calculate the system parameter set params using a bilinear map and hash function. 5.2. KeyGenIBE.mk, params, id/; When the user requests the private key from the key generation center, the key generation center obtains the legal identity (id) of the user and generates the public and private keys (pkid, skid) for the user using params and mk. 5.3. KeyGenPKE.params/; When a user submits a request, the key management center not only generates the identity-based public and private keys, but also generates the public and private keys of the traditional public key system (pkid, skid). 5.4. EncIBE.pkid; skid; params; m /; When the user encrypts data, the data owner encrypts the clear-text (m) into the ciphertext (c D .c1; c2/) using the user’s own (pk , sk ) and a random number (r 2 RZ ). 5.5 KeyGenRE.skidi ;skidi ; pkidj ; params /; When the data owner (user i ) grants user j permissions, using skidi , skidi , and pkidj user i computes the PRE key (rkidi idj ), completing the transformation from user i to user j.When a user submits a request, the key management center not only generates the identity-based public and private keys, but alsogenerates the public and private keys of the traditional public key system (pkid, skid). 5.6. ReEnc.ci; rkidi idj ; params /; This is a function for decryptingthePREciphertext.AfterreceivingthePRE ciphertext (cj D .cj1; cj 2/) from the proxy server of the big data platform, user j determines the clear-text (m0 D m) of the data using his or her own. 5.6. ReEnc.ci; rkidi idj ; params /; This is a function for decryptingthePREciphertext.AfterreceivingthePRE ciphertext (cj D .cj1; cj 2/) from the proxy server of the big data platform, user j determines the clear- text (m0 D m) of the data using his or her own. VI. MODULE INTEGRATION 6.1. User Type Creation Common user will create a profile based on the role. Each user details has been handled in the mongo database. As requested every user details has been restricted as per their role.so here the mongo DB will save the data in the JSON format. User details has been handled using node server. Node server will act like a server to make a communication between client and DB. In this project designed the User Interface Frame (Angularjs) to communicate the database using the programming language like Nodejs. ISBN:978-1534910799 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 20164
  • 5. 6.1. Sensitive Data Creation The request has been handled by a server side programming called nodejs.Node package manager is a main kit to handle all the request from the server side end. Internal user will customize the requested details based on the External request. Internal user doesn't allow to access all the details requested by External user. Consolidated the requested details in UI and forward filtered data to admin. Admin is the one who is going to collect all the sensitive data and update in the documentary database. Before updating data in the database the data has been encrypted based on the Proxy Re-Encryption 6.1. Mongo Data Customization Mongo DB allow to store bulk amount of data in the JSON format. It will allow to handle unstructured data, semi-structured and structured data. It’s have more robustness and light weight to do manipulation. In this project, customizing the sensitive data and will collect in the mongo DB for further manipulation. While doing CRUD operation it will filter the data using unique id based upon the user request. Admin user also will customize the data for approval that has been also handle in mongo DB. 6.1. Data Collection External user used to collect all the sensitive data based on the admin approval. He’s allowed to collect the buffered stream of data .Before fetching the data from documentary database he should decrypt the data based on the key phrase. VII. CONCLUSION In this project, here proposed the data storage has been handled in document type data like mongoDB. Admin user will collect all the sensitive data in different perspective.Data collection includes PDF files,json files etc.PDF Files has been collected in the form of stream of bytes.Prior to saving data in the database admin used to do encryption followed by Proxy Pre-Encryption.External user will collect the data based on the admin approval using the decryption key.So here the document data can able to store bulk amount of data with less memory space and collecting the data with asynchronous call to handle multiple event. REFERENCES [1] Guangyan Huang, Jing He, Chi-Hung Chi, Wanlei Zhou, Yanchun Zhang, “A Data as a Product Model for Future Consumption of Big Stream Data in Clouds”. IEEE International Conference on Year: 2015. [2] “Kyounghyun Park; Minh Chau Nguyen; Heesun Won”,Web-based collaborative big data analytics on big data as a service platform,2015 [3] E.Y. Chang, H. Bai, and K. Zhu, “Parallel Algorithms for Mining Large-Scale Rich-Media Data” Proc. 17th ACM Int’l Conf. Multimedia, (MM ’09,) pp. 917-918, 2009. [4] L. Bonnet, A. Laurent, M. Sala, B. Laurent, N. Sicard ,“Reduce, It say: What nosql can do for data aggregation and bi in large repositories.” In Database and Expert Systems Applications (DEXA), 2011 [5] A. Machanavajjhala and J.P. Reiter, “Big Privacy: Protecting Confidentiality in Big Data” ACM Crossroads, vol. 19, no. 1, pp. 20-23, 2012 [6] M. Stonebraker, “Why Enterprises Are Uninterested in NoSQL(MONGO).” [Online] Available at: http://cacm.acm.org/blogs/blog-cacm/99512-whyenterprises-are-uninterested-in-nosql/fulltext [Accessed: 02 Oct 2010]. [7] Jinxin Huang; Lin Niu; Jie Zhan; Xiaosheng Peng; Junyang Bai; Shijie Cheng,"Technical aspects and case study of big data based condition monitoring of power apparatuses”. 2014 [8] E. Brewer, “A certain freedom: thoughts on the CAP theorem”[Report], 2010, New York: ACM. [9] Information week, “Surprise: 44% of Business IT Pros Never Heard of NoSQL.” [Online] Available ISBN:978-1534910799 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 20165
  • 6. at:http://www.informationweek.com/software/informationmanagement/surprise-44-of-business-it-pros-never- he/227500077 [Accessed: 02 Oct 2013]. [10] Oracle, “Oracle: Big Data for the Enterprise.” [White Paper, 2011] Redwood Shores: Oracle. [11] J. Han, E. Haihong, G. Le, J. Du "Survey on NoSQL database," Pervasive Computing and the Applications (ICPCA), 2011 [12] Mongodb, “Big Data: Examples and Guidelines for the Enterprise Decision Maker.” [White Paper, 2013] New York: MongoDB. [13] S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi,and P. Samarati, “Integrity for join queries in the cloud,” IEEE Trans. Cloud Comput., vol. 1, no. 2, pp. 187–200, Jul.–Dec. 2013. [14] J. Pokorny “NoSQL databases: a step to database scalability in web environment” International Journal of Web Information Systems20139:1, 69-82 [15] E. Birney, “The Making of ENCODE: Lessons for Big-Data Projects,” Nature, vol. 489, pp. 49-51, 2012 [16] Philosophy of Big Data: Expanding the Human-Data Relation with Big DataScience Services. Big Data Computing Service and Applications (BigDataService), 2015 IEEE First International Conference on Year: 2015 [17] Jie Zhan; Jinxin Huang; Lin Niu; Xiaosheng Peng; Diyuan Deng; Shijie Cheng,"Study of the key technologies of electric power big data and its application prospects in smart grid”.,2014 ISBN:978-1534910799 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 20166