Big data is the current trend and it gradually become a widely preferred topic of scientific
research and is used in many industries like private and public sectors, enterprises, businesses,
and domains where abundant data is used. As big data is used in many domains, securing
big data and effective analytics capability are increasingly concerned. Cloud computing
is an extremely realistic technology and draw the interest of huge number of investigators
to analyze it and to apply it in big data frameworks. Nowadays, cloud computing become
inevitable for big data storage and analytics and so the traditional cryptographic mechanisms
are inadequate or not suited for processing huge volume of big data outsourced to cloud.
Technological advancements are common in cloud technology because of its elastic properties
and metered services. This new model of cloud computing is efficient, since it provides cost
effective architectures that facilitates data submission, data storage, and computations over
data transmission, storage, and intensive computing of data. Though an organization benefits
by adopting cloud technology for analytics, this leads to security and privacy breaches. The
security issues are the barriers in adopting cloud computing for big data analytics. Also,
the cloud storage facilitates large amount of data storage and it also results in data leakage
and exposure of sensitive data. The responsibility of safeguarding data on cloud belongs
to cloud service provider. Though cloud provides efficient techniques, many challenging
scalability, computation, and communication issues arise due to loss of data control. Cloud
computing provides pool of resources that can be shared among multiple cloud tenants. This
co-existence of tenants can also results in security issues. The impacts of security breaches
affect both the data owner and the cloud service provider. The threat to data in cloud storage
results in losing trust of customers and service providers will lose their clients. If the data
owner loses his valuable sensitive data then it results in irrecoverable damage. In order
to protect user's sensitive data over cloud and to self-destruct it after specified time period
mechanisms is needed. This work concentrates on providing full life cycle protection of
sensitive data stored on cloud.
1