PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

A Novel Inconsequential Encryption Algorithm for Big Data in Cloud Computing

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In the digitalized era of the information technology the expansion of the data usage is very high accounting for about enormous data transaction in day to day life. Data from different sources like sensors, mobile phones, satellite, social media and networks, logical transaction and ventures, etc add an gigantic pile to the existing stack of data. One of the best way to handle this exponential data production is the Hadoop network. Thus in the current scenario big industries and organizations rely on the Hadoop network for the production of their essential data. Focusing on the data generation and organization, data security one of the most primary important consideration was left unnoticed making data vulnerable to cyber attacks and hacking. Hence this article proposes an effective mixed algorithm concept with the Salsa20 and AES algorithm to enhance the security of the transaction against unauthorised access and validates the quick data transaction with minimal encryption and decryption time. High throughput obtained in this hybrid framework demonstrates the effectiveness of the proposed algorithmic structure over the existing systems
Słowa kluczowe
Rocznik
Tom
Strony
140--144
Opis fizyczny
Bibliogr. 28 poz., fig.
Twórcy
  • nstitute of Computer Science & Information Sciences, Srinivas University, Mangalore, Karnataka, India
  • Department of CSE, VNR VJIET, Hyderabad, Telangana, India
  • Institute of Computer Science & Information Sciences, Srinivas University, Mangalore, Karnataka, India
Bibliografia
  • 1. Big Data market revenue forecast worldwide 2011-2027, by Wikibon; Silicon ANGLE Available: https://www.statista.com/statistics/254266/global-big-data-market-forecast/ [04.02.2019].
  • 2. Apache Hadoop 3.2.0-Hdfs Architecture, Available: https://hadoop.apache.org/docs/r3.2.0/hadoop-project-dist/hadoop-hdfs/HdfsDesign [04.01.2019].
  • 3. D. Borthakur, The Hadoop distributed file system: Architecture and design, Hadoop Project Website 11 (2007) 21.
  • 4. M. Dhatrak, H. Panadiwal, Privacy-Preserving Mining using Data Encryption scheme for Hadoop Ecosystem, In International Journal of Advanced Research in Science, Engineering and Technology 5(4) (2018) 5578-5585.
  • 5. S. Singh, M. Sharma, The Prototype for Implementation of Security Issue in Big Data Application using Hadoop Server, International Journal of Computer Applications 145(13) (2016) 9-13.
  • 6. S. Ghemawat, J. Dean, MapReduce: Simplified data processing on large clusters, ACM Commun. Mag. 51(1) (2008) 107-113.
  • 7. Y. Kumar, R. Munjal, H. Sharma, Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures, (IJAFRC) 1:6 (2014) 2348-4853.
  • 8. B.H. Lee, E.K. Dewi, M.F. Wajdi, Data security in cloud computing using AES under HEROKU cloud, In The 27th Wireless and Optical Communications Conference (WOCC2018) (2018) 1-5.
  • 9. P. Mahajan, A. Sachdeva, A Study of Encryption Algorithms AES, DES, and RSA for Security, Global Journal of Computer Science and Technology Network, Web & Security 13(15) (2013) 15-22.
  • 10. H.Y. Lin, S.T. Shen, W.G. Tzeng, B.S.P. Lin, Toward data confidentiality via integrating hybrid encryption schemes and Hadoop Distributed File System, in the Proceedings of the 2012 IEEE 26th International Conference on Advanced Information Networking and Applications (AINA) (2012) 740-747.
  • 11. J. Cohen, S. Acharya, Towards a Trusted Hadoop Storage Platform: Design Considerations of an AES Based Encryption Scheme with TPM Rooted Key Protections,” IEEE 10th International Conference on and Autonomic and Trusted Computing (UIC/ATC), Ubiquitous Intelligence and Computing (2013) 444-451.
  • 12. J. Tang, Y. Cui, Q. Li, K. Ren, J. Liu, R. Buyya, Ensuring security and privacy preservation for cloud data services, ACM Computing Surveys 49(1) (2016) 1-39.
  • 13. W. Song, B. Wang, Q. Wang, Z. Peng, W. Lou, Y. Cui, A privacy preserved full-text retrieval algorithm over encrypted data for cloud storage applications, Journal of Parallel and Distributed Computing 99 (2017) 14-27.
  • 14. P.V. Bharati, T. Sita Mahalakshmi, Data storage security in cloud using a functional encryption algorithm, In Emerging Research in Computing, Information, Communication and Applications, Springer Singapore (2016) 201-212.
  • 15. K.N. Prasetyo, Y. Purwanto, D. Darlis, An Implementation of data encryption for internet of things using blowfish algorithm on FPGA. International Conference on Information and Communication Technology (2014) 75-79.
  • 16. Abo-alian, N. L. Badr, M. F. Tolba, Data Storage Security Service in Cloud Computing: Challenges and Solutions, In Multimedia Forensics and Security, Springer International Publishing (2017) 25-57.
  • 17. H. Bagheri, A.A. Shaltooki, Big Data: Challenges, Opportunities and Cloud Based Solutions, International Journal of Electrical and Computer Engineering (IJECE) 5(2) (2015) 340-343.
  • 18. S.A. Thanekar, K. Subrahmanyam, A.B. Bagwan, A Study on MapReduce: Challenges and Trends, Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 4(1) (2016) 176-183. DOI: 10.11591/ijeecs.v4.i1.pp176-183.
  • 19. Bhargavi, D. Veeraiah, T.M. Padmaja, Securing BIG DATA: A Comparative Study Across RSA, AES, DES, EC and ECDH, In Computer Communication, Networking and Internet Security. Lecture Notes in Networks and Systems 5 (2017) 355-362.
  • 20. S. Aditham, N. Ranganathan, A System Architecture for the Detection of Insider Attacks in Big Data Systems. IEEE Transactions on Dependable and Secure Computing (2017) 1–1. doi:10.1109/tdsc.2017.2768533.
  • 21. Y. Reddy, Big Data Processing and Access Controls in Cloud Environment. 2018 IEEE 4th International Conference on Big Data Security on Cloud (Big Data Security), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS). doi:10.1109/bds/hpsc/ ids18.2018.00019.
  • 22. D. J. Bernstein, The Salsa20 family of stream ciphers, In New Stream Cipher Designs. Berlin, Germany: Springer, (2008) 84–97.
  • 23. S. Potteti, N. Parati, Secured Data Transfer For Cloud Using Blowfish, International Journal Of Advances In Computer Science And Cloud Computing 3(2) (2015) 17-22.
  • 24. P. Ghosh, V. Thakor, P. Bhathawala, Data Security and Privacy in Cloud Computing Using Different Encryption Algorithms, International Journal of Advanced Research in Computer Science and Software Engineering 7(5) (2017) 469-471.
  • 25. K.Sekar, M Padmavathamma, Comparative Study of Encryptio Algorithm over Big Data in Cloud Systems, International conference on Computing for Sustainable Global Development (INDIACom) (2016) 1571-1574.
  • 26. B.T. Reddy, K.B. Chowdappa, S.R. Reddy, Cloud Security using Blowfish and Key Management Encryption Algorithm, International Journal of Engineering and Applied Sciences (IJEAS) 2(6) (2015) 59-62.
  • 27. G. Saini, N. Sharma, Triple security of data in cloud computing, International Journal of Computer Science and Information Technologies 5(4) (2014) 5825-5827.
  • 28. D.S. Elminaam, H.M. Abdual-Kader, M.M. Hadhoud, Evaluating the performance of symmetric encryption algorithms, Int. J. Netw. Secur. 10(3) (2010) 216-222.
Uwagi
Opracowanie rekordu ze środków MEiN, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2022-2023).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-356bd22a-43a3-4c18-9709-8350df11adc8
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.