Efficient Implementation of Big Data Access Control Scheme with Privacy-Preserving Policy
Niranjanamurthy M.1, Esha Jain2, Bhawna Nigam3, Sushmitha M.4

1Dr. Niranjanamurthy M., Department of Computer Applications, M S Ramaiah Institute of Technology, Bangalore, India.
2Dr. Esha Jain, (Corresponding Author), School of Management, The NorthCap University (Formerly ITM University), Gurugram, India.
3Dr. Bhawna Nigam, Department of Information Technology, Institute of Engineering & Technology, Devi Ahilya University, Indore, India.
4Ms. Sushmitha M., Department of Computer Applications, M S Ramaiah Institute of Technology, Bangalore, India.

Manuscript received on 21 August 2019 | Revised Manuscript received on 27 August 2019 | Manuscript published on 30 August 2019 | PP: 3385-3395 | Volume-8 Issue-10, August 2019 | Retrieval Number: J95510881019/2019©BEIESP | DOI: 10.35940/ijitee.J9382.0881019
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In the time of big data, cloud computing, an immense measure of information can be created rapidly from different IT, non-IT related sources. Towards these big data, cloud computing, customary PC frameworks are not up to required skilled to store and process this information. Due to the adaptable and flexible figuring assets, distributed computing is a characteristic fit for putting away and preparing big data. With cloud computing, end-clients store their information into the cloud server and depend on the advanced cloud server to share their information to different clients. To share end-client’s information to just approved clients, it is important to configuration access control systems as indicated by the prerequisites of end clients. When re-appropriating information into the cloud, end-clients free the physical control, virtual physical control of their information. In addition, cloud specialist co-ops are not completely trusted by end-clients, which make the entrance control additionally testing. on the off chance that the conventional access control systems (e.g., Access Control Lists) are connected, the cloud server turns into the judge to assess the entrance approach and settle on access choice. Subsequently, end-clients may stress that the cloud server may settle on wrong access choices purposefully or accidentally and uncover their information to some unapproved clients. To empower end-clients to control the entrance of their own information, a proficient and fine-grained huge information access control plot with protection saving strategy is proposed. In particular, the entire trait (as opposed to just its qualities) in the entrance strategies are scrambled. To help information decoding, encoding, a novel Attribute Bloom Filter is utilized [14][16] to assess whether a characteristic is in the entrance arrangement and find the accurate position in the entrance approach on the off chance that it is in the entrance strategy. Just the clients whose traits fulfill the entrance arrangement are qualified to unscramble the information.
Index Terms: Big Data, System Architecture, Procedural Design, Encryption Module, User Interface Design, MVC Architecture.

Scope of the Article: Big Data