Abstract

Abstract

CRT-BASED ACCESS CONTROL IN BIG DATA

Aliyu Danladi Hina*, Abdullahi Mohammed Auwal**, Rakiya M. K. Adamu***


ABSTRACT Cloud computing paradigm offers on-demand, cost-effective computing and storage resources. However, preserving privacy of data outsourced to the Big Data (BD) and giving the clients more control over the security of their data are required. BD users are to manage the privacy and integrity protections for their data without relying on the trustworthiness of the provider. Moreover, the users manage the access control policies for their data without revealing them to the provider. A cryptographic solution aiming at general access control, by increasing the security of data through allowing users to encrypt each file, before outsourced to the BD, with a unique symmetric key without an additional overhead to manage these keys is presented. Our solution is based on Chinese Remainder Theorem (CRT). The method provides the flexibility to deal individually with each protected file, which is expected to be more suitable for the cloud environment. Keywords - Access control, Big Data, Chinese Remainder Theorem, Symmetric and Asymmetric keys.

PDF