An Architecture for Security and Protection of Big Data

Authors

1 Department of Information Technology Engineering, College of Engineering, South Tehran Branch, Islamic Azad University, Tehran, Iran

2 Department of Industrial Engineering, Information Technology Group, K. N.Toosi University of Technology, Tehran, Iran

Abstract

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computing. One of the cases where data privacy is of great importance is the authentication and protection of ownership data. In this paper, this privacy issue is analyzed by Petri net modeling. What today’s organizations need for their clouds are integrated comprehensive solutions that can deliver security intelligence. Advanced security intelligence solutions can close security gaps by using labor-saving automation to analyze millions of events occurring within the cloud, and discover system vulnerabilities through the normalization and correlation of these events. Using the proposed method, a model of security, including control of user access to databases of big data with RMS, the multiplicity and the virtual machine to prevent internal threats, deleting data, insecure or incomplete data protection and control of a third-party can be provided to improve the operation according to the rules of Petri net modeling and simulation.

Keywords


1.     Hamidi, H. and Daraei, A., "Analysis of pre-processing and post-processing methods and using data mining to diagnose heart diseases", International Journal of Engineering-Transactions A: Basics,  Vol. 29, No. 7, (2016), 921-930.
2.     Hamidi, H. and Hashemzadeh, H., "Using a data mining tool and fp-growth algorithm application for extraction of the rules in two different dataset", International Journal of Engineering (IJE), Transactions C: Aspects,  Vol. 29, No. 6, (2016), 1693-1700.
3.     Gharagozlou, F., Saraji, G.N., Mazloumi, A., Nahvi, A., Nasrabadi, A.M., Foroushani, A.R., Kheradmand, A.A., Ashouri, M. and Samavati, M., "Detecting driver mental fatigue based on eeg alpha power changes during simulated driving", Iranian Journal of Public Health,  Vol. 44, No. 12, (2015), 1693.
4.     Hamidi, H., "A combined fuzzy method for evaluating criteria in enterprise resource planning implementation", International Journal of Intelligent Information Technologies (IJIIT),  Vol. 12, No. 2, (2016), 25-52.
5.     Hamidi, H., "A model for impact of organizational project benefits management and its impact on end user", Journal of Organizational and End User Computing (JOEUC),  Vol. 29, No. 1, (2017), 51-65.
6.     Johnson, R.D., Li, Y. and Dulebohn, J.H., "Unsuccessful performance and future computer self-efficacy estimations: Attributions and generalization to other software applications", Journal of Organizational and End User Computing (JOEUC),  Vol. 28, No. 1, (2016), 1-14.
7.     Kakar, A.S., "A user-centric typology of information system requirements", Journal of Organizational and End User Computing (JOEUC),  Vol. 28, No. 1, (2016), 32-55.
8.     Liu, Y., Tan, C.-H. and Sutanto, J., "Selective attention to commercial information displays in globally available mobile application", Journal of Global Information Management (JGIM),  Vol. 24, No. 2, (2016), 18-38.
9.     DARAEI, A. and HAMIDI, H., "An efficient predictive model for myocardial infarction using cost-sensitive j48 model", Iranian journal of public health,  Vol. 46, No. 5, (2017), 682.
10.   Hamidi, H., Vafaei, A. and Monadjemi, S.A.H., "Analysis and evaluation of a new algorithm based fault tolerance for computing systems", International Journal of Grid and High Performance Computing (IJGHPC),  Vol. 4, No. 1, (2012), 37-51.
11.   Hamidi, H., Vafaei, A. and Monadjemi, S.A., "Analysis and design of an abft and parity-checking technique in high performance computing systems", Journal of Circuits, Systems, and Computers,  Vol. 21, No. 03, (2012), 1250017.
12.   Shadloo, B., Motevalian, A., Rahimi-Movaghar, V., Amin-Esmaeili, M., Sharifi, V., Hajebi, A., Radgoodarzi, R., Hefazi, M. and Rahimi-Movaghar, A., "Psychiatric disorders are associated with an increased risk of injuries: Data from the iranian mental health survey (iranmhs)", Iranian Journal of Public Health,  Vol. 45, No. 5, (2016), 623.630.
13.   Hamidi, H. and Vafaei, A., "Evaluation of fault tolerant mobile agents in distributed systems", International Journal of Intelligent Information Technologies (IJIIT),  Vol. 5, No. 1, (2009), 43-60.
14.   Hamidi, H., Vafaei, A. and Monadjemi, S.A., "Evaluation and check pointing of fault tolerant mobile agents execution in distributed systems", Journal of Networks,  Vol. 5, No. 7, (2010), 800-807.
15.   Nilchi, A.N., Vafaei, A. and Hamidi, H., "Evaluation of security and fault tolerance in mobile agents", in Wireless and Optical Communications Networks,. WOCN'08. 5th IFIP International Conference on, IEEE., (2008), 1-5.
16.   Wu, J., Ding, F., Xu, M., Mo, Z. and Jin, A., "Investigating the determinants of decision-making on adoption of public cloud computing in e-government", Journal of Global Information Management (JGIM),  Vol. 24, No. 3, (2016), 71-89.
17.   Hamidi, H. and Kamankesh, A., "An approach to intelligent traffic management system using a multi-agent system", International Journal of Intelligent Transportation Systems Research,  (2017), 1-13.
18.   Hamidi, H. and Moradi, S., "Analysis of consideration of security parameters by vendors on trust and customer satisfaction in e-commerce", Journal of Global Information Management (JGIM),  Vol. 25, No. 4, (2017), 32-45.
19.   Wang, Y. and Li, D., "Virtual space co-creation: The perspective of user innovation", Journal of Organizational and End User Computing (JOEUC),  Vol. 28, No. 2, (2016), 92-106.
20.   Chevers, D., Mills, A.M., Duggan, E. and Moore, S., "An evaluation of software development practices among small firms in developing countries: A test of a simplified software process improvement model", Journal of Global Information Management (JGIM),  Vol. 24, No. 3, (2016), 45-70.
21.   Bimonte, S., Sautot, L., Journaux, L. and Faivre, B., "Multidimensional model design using data mining: A rapid prototyping methodology", International Journal of Data Warehousing and Mining (IJDWM),  Vol. 13, No. 1, (2017), 1-35.
22.   Esposito, C. and Ficco, M., "Recent developments on security and reliability in large-scale data processing with mapreduce", International Journal of Data Warehousing and Mining (IJDWM),  Vol. 12, No. 1, (2016), 49-68.
23.   Li, H., Yimin, Z., Mengshi, C., Xun, L., Xiulan, L. and Ying LIANG, H.T., "Development and validation of a disease severity scoring model for pediatric sepsis", Iranian Journal of Public Health,  Vol. 45, No. 7, (2016), 875-884.