Load Balancing Using Oblivious RAM for Privacy-Preserving Access to Big Data in Cloud

Authors

  • P. B. Niranjane  Department of Computer Science & Engineering, Babasahe Naik College of Engineering, Pusad, Maharastra, India

DOI:

https://doi.org/10.32628/IJSRST523102140

Keywords:

Big data, Authentication Protocols, Privacy, Security, Encryption, Oblivious RAM, ILB

Abstract

In the era of big data, many users and companies start to move their data to cloud storage to simplify data management and reduce data maintenance cost. However, security and privacy issues become major concerns because third-party cloud service providers are not always trusty. Although data contents can be protected by encryption, the access patterns that contain important information are still exposed to clouds or malicious attackers. To overcome this problem, in this work Oblivious RAM (ORAM) is applied which aims to enable privacy preserving access to big data in cloud. After applying ORAM to big data in cloud the access load balancing problem arises. Iterative Load Balancing algorithm (ILB) is applied to achieve balanced load.

References

  1. D. Beaver, S. Kumar, H. C. Li, J. Sobel, and P. Vajgel, “Finding a needle in haystack: Facebook’s photo storage,” in USENIX OSDI, 2010, pp. 1–8.
  2. M. Islam, M. Kuzu, and M. Kantarcioglu, “Access pattern disclosure on searchable encryption: Ramification, attack and mitigation,” in Network and Distributed System Security Symposium, 2012.
  3. Zhang, F., Q. M. Malluhi, T. Elsayed, S. U. Khan, K. Li, and A. Y. Zomaya.. “CloudFlow: A Data-Aware Programming Model for Cloud Workflow Applications on Modern HPC Systems.” Future Generation Computer Systems 51: 98–110, 2015.
  4. E. Stefanov, M. van Dijk, A. Juels, and A. Oprea, “Iris: A scalable cloud file system with efficient integrity checks,” in Proceedings of the 28th Annual Computer Security Applications Conference, 2012, pp. 229–238.
  5. K. D. Bowers, A. Juels, and A. Oprea, “Hail: A high-availability and integrity layer for cloud storage,” in Proceedings of the 16th ACM Conference on Computer and Communications Security, 2009, pp. 187–198.
  6. C.Z. Xu and F.C.M. Lau. Optimal parameters for load balancing with the diffusion method in mesh–networks. Parallel Processing Letters, 4(2):139–147, 1994.
  7. O. Goldreich and R. Ostrovsky, “Software protection and simulation on oblivious rams,” Journal of the ACM (JACM), vol. 43, no. 3, pp. 431–473, 1996.
  8. Zhan, Z. H., X. F. Liu, Y. J. Gong, J. Zhang, H. S. H. Chung, and Y. Li. “Cloud Computing Resource Scheduling And a Survey of its Evolutionary Approaches.” ACM Computing Surveys (CSUR) 63: 1–33, 2015.
  9. P. Williams and R. Sion, “Single round access privacy on outsourced storage,” in ACM CCS, 2012, pp. 293–304.

Downloads

Published

2023-04-30

Issue

Section

Research Articles

How to Cite

[1]
P. B. Niranjane "Load Balancing Using Oblivious RAM for Privacy-Preserving Access to Big Data in Cloud " International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011,Volume 10, Issue 2, pp.885-889, March-April-2023. Available at doi : https://doi.org/10.32628/IJSRST523102140