Advertisement

Formulating models to survive multimedia big content from integrity violation

  • Shadi A. Aljawarneh
Original Research
  • 20 Downloads

Abstract

With exponential growth in social media sites and high penetration of Internet access and digital computing devices, there are humongous amounts of public data being generated on a day-to-day basis. Almost real-time information regarding the emerging trends can be gained through efficient techniques/algorithms to examine this enormous amount of data, which also gives hint about early warning if there is an imminent emergency case. Also, numerous helpful indicators regarding political and socioeconomic events can be seen through by carefully mining these data, which also aid in establishing efficient public policies. However, web services and data security—protection of systems and key data to avoid unauthorised tampering—is considered to be a non-trivial real-time issue. Moreover, security issue has always been a grave issue since there is frequent conflict of service availability with the security constraints should there be a change in the service media channels. The paper’s primary focus is on new mathematical models that help in simplifying and enhancing protection for multimedia big content against unauthorised tampering by examining elements of multimedia objects. Furthermore, a multimedia big data security framework is presented in this paper. This framework, built on the basis of the proposed models, will be employed to confirm the on-fly multimedia content for a requested service/page. It is believed that such type of a framework provides a higher level of service survivability as well as user confidence.

Keywords

Big data Multimedia SaaS Integrity Survivability Security 

Notes

References

  1. Ali A, Qadir J, Rasool R, Sathiaseelan A, Zwitter A, Crowcroft J (2016) Big data for development: applications and techniques. Big Data Anal 1(1):2–8CrossRefGoogle Scholar
  2. Aljawarneh SA, Vangipuram R (2018) GARUDA: Gaussian dissimilarity measure for feature representation and anomaly detection in internet of things. J Supercomput.  https://doi.org/10.1007/s11227-018-2397-3 CrossRefGoogle Scholar
  3. Aljawarneh SA, Vangipuram R, Puligadda VK, Vinjamuri J (2017) G-SPAMINE: an approach to discover temporal association patterns and trends in internet of things. Future Gener Comput Syst 74:430–443CrossRefGoogle Scholar
  4. Aljawarneh SA, Alawneh A, Jaradat R (2018) Cloud security engineering. Future Gener Comput Syst 74:385–392.  https://doi.org/10.1016/j.future.2016.10.005 CrossRefGoogle Scholar
  5. Babar M, Arif F (2018) Real-time data processing scheme using big data analytics in internet of things based smart transportation environment. J Ambient Intell Humaniz Comput.  https://doi.org/10.1007/s12652-018-0820-5 CrossRefGoogle Scholar
  6. Barik RK, Dubey H, Mankodiya K, Sasane SA, Misra C (2018) GeoFog4Health: a fog-based SDI framework for geospatial health big data analysis. J Ambient Intell Humaniz Comput.  https://doi.org/10.1007/s12652-018-0702-x CrossRefGoogle Scholar
  7. CERT (2006) CERT statistics 1988–2006 [online], Report T. http://www.cert.org/stats. Accessed 10 July 2015
  8. Erdélyi A, Winkler T, Rinner B (2018) Privacy protection vs. utility in visual data. Multimed Tools Appl 77(2):2285–2312CrossRefGoogle Scholar
  9. Gehling B, Stankard D (2005) eCommerce Security. In: Proceedings of information security curriculum development (InfoSecCD) conference’05, Kennesaw, GA, USA, pp 32–37Google Scholar
  10. Hassinen M, Mussalo P (2015) Client controlled security for web applications. In: Werner B (ed) The IEEE conference on local computer networks. 30th Anniversary. IEEE Computer Society, Cal, pp 810–816Google Scholar
  11. Hu H, Ahn G, Jorgensen J (2013) Multiparty access control for online social networks: model and mechanisms. IEEE Trans Knowl Data Eng 25(7):1614–1627CrossRefGoogle Scholar
  12. Kuphaldt TR (2006) Lessons in electric circuits: volume Iv-digital [online], 4th edn. http://www.ibiblio.org/obp/electricCircuits/Digital/. Accessed 10 July 2015
  13. Li Y, Gai K, Ming Z, Zhao H, Qiu M (2016) Intercrossed access controls for secure financial services on multimedia big data in cloud systems. ACM Trans Multimed Comput Commun Appl (TOMM) 12(4 s):67–72Google Scholar
  14. Martin K, Plataniotis KN (2008) Privacy protected surveillance using secure visual object coding. IEEE Trans Circuits Syst Video Technol 18(8):1152–1162CrossRefGoogle Scholar
  15. Mendoza C, Kleinschmidt J (2015) Mitigating on-off attacks in the internet of things using a distributed trust management scheme. Int J Distrib Sens Netw 11:1–8CrossRefGoogle Scholar
  16. Meng S, Dou W, Zhang X, Chen J (2014) KASR: a keyword-aware service recommendation method on MapReduce for big data application. IEEE Trans Parallel Distrib Syst 25(12):3221–3231CrossRefGoogle Scholar
  17. Offutt J, Wu Y, Du X, Huang H (2004) Bypass testing of web applications. In: IEEE on software engineering, France, pp 187–197Google Scholar
  18. Premkamal PK, Pasupuleti SK, Alphonse PJA (2018) A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud. J Ambient Intell Humaniz Comput.  https://doi.org/10.1007/s12652-018-0967-0 CrossRefGoogle Scholar
  19. Ramani R, Selvaraju S, Valarmathy S, Niranjan P (2012) Bank locker security system based on RFID and GSM technology. Int J Comput Appl 57(18):15–20Google Scholar
  20. Sanchez R, Almenares F, Arias P, Dıaz-Sanchez D, Marın A (2012) Enhancing privacy and dynamic federation in IdM for consumer cloud computing. IEEE Trans Consum Electron 58(1):220–230CrossRefGoogle Scholar
  21. Sedaghat S, Pieprzyk J, Vossough E (2002) On-the-fly multimedia content integrity checker boots user’s confidence. Commun ACM 45(11):33–37CrossRefGoogle Scholar
  22. Suciu G, Suciu V, Martian A, Craciunescu R, Vulpe A, Marcu I, Fratu O (2015) Big data, internet of things and cloud convergence—an architecture for secure e-health applications. J Med Syst 39(11):141–145CrossRefGoogle Scholar
  23. Sundareswaran S, Squicciarini A, Lin D (2012) Ensuring distributed accountability for data sharing in the cloud. IEEE Trans Dependable Secure Comput 9(4):556–568CrossRefGoogle Scholar
  24. Terzi DS, Terzi R, Sagiroglu S (2015) A survey on security and privacy issues in big data. In: 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp 202–207Google Scholar
  25. Xu J, Ota K, Dong M (2018) Real-time awareness scheduling for multimedia big data oriented in-memory computing. IEEE Internet of Things J.  https://doi.org/10.1109/JIOT.2018.2802913 CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Faculty of Computer and Information TechnologyJordan University of Science and TechnologyIrbidJordan

Personalised recommendations