ENHANCING APPROACH USING HYBRID PAILLER AND RSA FOR INFORMATION SECURITY IN BIGDATA
Article Sidebar
Open full text
Issue Vol. 15 No. 4 (2019)
-
A DECLARATIVE APPROACH TO SHOP ORDERS OPTIMIZATION
Jarosław WIKAREK, Paweł SITEK, Mieczysław JAGODZIŃSKI5-15
-
NUMERICAL MODELLING OF RESINS USED IN STEREOLITOGRAPHY RAPID PROTOTYPING
Danuta MIEDZIŃSKA, Ewelina MAŁEK, Arkadiusz POPŁAWSKI16-26
-
CUSTOMIZING AUDIO FADES WITH A VIEW TO REAL-TIME PROCESSING
Lucian LUPŞA-TĂTARU27-36
-
DEVELOPMENT OF INTEGRATED MANAGEMENT INFORMATION SYSTEMS IN THE CONTEXT OF INDUSTRY 4.0
Bartosz CIEŚLA, Grzegorz GUNIA37-48
-
THE SPECTROPHOTOMETRIC ANALYSIS OF ANTIOXIDANT PROPERTIES OF SELECTED HERBS IN VISION-PRO™ UV-VIS
Karolina FERYSIUK, Karolina M. WÓJCIAK49-62
-
ENHANCING APPROACH USING HYBRID PAILLER AND RSA FOR INFORMATION SECURITY IN BIGDATA
Shadan Mohammed Jihad ABDALWAHID, Raghad Zuhair YOUSIF, Shahab Wahhab KAREEM63-74
-
AN OVERVIEW OF DEEP LEARNING TECHNIQUES FOR SHORT-TERM ELECTRICITY LOAD FORECASTING
Saheed ADEWUYI, Segun AINA, Aderonke LAWAL, Adeniran OLUWARANTI, Moses UZUNUIGBE75-92
-
APPLICATION OF WAVELET – NEURAL METHOD TO DETECT BACKLASH ZONE IN ELECTROMECHANICAL SYSTEMS GENERATING NOISES
Michał TOMCZYK, Anna PLICHTA, Mariusz MIKULSKI93-108
Archives
-
Vol. 17 No. 4
2021-12-30 8
-
Vol. 17 No. 3
2021-09-30 8
-
Vol. 17 No. 2
2021-06-30 8
-
Vol. 17 No. 1
2021-03-30 8
-
Vol. 16 No. 4
2020-12-30 8
-
Vol. 16 No. 3
2020-09-30 8
-
Vol. 16 No. 2
2020-06-30 8
-
Vol. 16 No. 1
2020-03-30 8
-
Vol. 15 No. 4
2019-12-30 8
-
Vol. 15 No. 3
2019-09-30 8
-
Vol. 15 No. 2
2019-06-30 8
-
Vol. 15 No. 1
2019-03-30 8
-
Vol. 14 No. 4
2018-12-30 8
-
Vol. 14 No. 3
2018-09-30 8
-
Vol. 14 No. 2
2018-06-30 8
-
Vol. 14 No. 1
2018-03-30 7
-
Vol. 13 No. 4
2017-12-30 8
-
Vol. 13 No. 3
2017-09-30 8
-
Vol. 13 No. 2
2017-06-30 8
-
Vol. 13 No. 1
2017-03-30 8
Main Article Content
DOI
Authors
Abstract
The amount of data processed and stored in the cloud is growing dramatically. The traditional storage devices at both hardware and software levels cannot meet the requirement of the cloud. This fact motivates the need for a plat¬form which can handle this problem. Hadoop is a deployed platform proposed to overcome this big data problem which often uses MapReduce architecture to process vast amounts of data of the cloud system. Hadoop has no strategy to assure the safety and confidentiality of the files saved inside the Hadoop distributed File system (HDFS). In the cloud, the protection of sensitive data is a critical issue in which data encryption schemes plays avital rule. This research proposes a hybrid system between two well-known asymmetric key cryptosystems (RSA, and Paillier) to encrypt the files stored in HDFS. Thus before saving data in HDFS, the proposed cryptosystem is utilized for encrypting the data. Each user of the cloud might upload files in two ways, non-safe or secure. The hybrid system shows higher computational complexity and less latency in comparison to the RSA cryptosystem alone.
Keywords:
References
Bhardwaj, A., Singh, V. K., Vanraj, & Narayan, Y. (2015). Analyzing BigData with Hadoop Cluster in HDInsight Azure Cloud. Annual IEEE India Conference (INDICON). India: IEEE. https://doi.org/10.1109/INDICON.2015.7443472 DOI: https://doi.org/10.1109/INDICON.2015.7443472
Ahamad, D., Akhtar, M., & Hameed, S. A. (2019). A Review and Analysis of Big Data and MapReduce. International Journal of Advanced Trends in Computer Science and Engineering, 8(1), 1–3. DOI: https://doi.org/10.30534/ijatcse/2019/01812019
Amrulla, G., Mourya, M., Sanikommu, R. R., & Afroz, A. A. (2018). A Survey of : Securing Cloud Data under Key Exposure. International Journal of Advanced Trends in Computer Science and Engineering, 7(3), 30–33. DOI: https://doi.org/10.30534/ijatcse/2018/01732018
Bhandarkar, M. (2010). MapReduce programming with apache Hadoop. International Symposium on Parallel & Distributed Processing (IPDPS) (pp. 1-2). Atlanta: IEEE . DOI: https://doi.org/10.1109/IPDPS.2010.5470377
Chandra, S., Alam, S. S., Paira, S., & Sanyal, G. (2014). A comparative survey of symmetric and asymmetric key cryptography. International Conference on Electronics, Communication and Computational Engineering (ICECCE) (pp. 83–93). IEEE. DOI: https://doi.org/10.1109/ICECCE.2014.7086640
Chandra, S., Bhattacharyya, S., Paira, S., & Alam, S. S. (2014). A Study and Analysis on Symmetric Cryptography. ICSEMR (pp. 1–8). IEEE. DOI: https://doi.org/10.1109/ICSEMR.2014.7043664
Dean, J., & Ghemawat, S. (2008). MapReduce: Simplified Data Processing on Large Clusters. 6th Symposium on Operating Systems Design and Implementation (pp. 107–113). ACM. DOI: https://doi.org/10.1145/1327452.1327492
Dubey, A. K., Jain, V., & Mittal, A. P. (2015). Stock Market Prediction using Hadoop Map-Reduce Ecosystem. 2nd International Conference on Computing for Sustainable Global Development (pp. 616–621). IEEE.
Hilbert, M. (2016). Big Data for Development: A Review of Promises and Challenges. Development Policy Review, 34(1), 135–174. DOI: https://doi.org/10.1111/dpr.12142
Inukollu, V. N., Arsi, S., & Ravuri, S. R. (2014). Security Issues Associted With big Data In Cloud Computing. International Journal of Network Security & Its Applications (IJNSA), 6(3), 45–56. DOI: https://doi.org/10.5121/ijnsa.2014.6304
Ismael, R. S., Youail, R. S., & Kareem, S. W. (2014). Image Encryption by Using RC4 Algorithm. European Academic Research, II(4), 5833–5839.
Jam, M. R., Khanli, L. M., Akbari, M. K., & Javan, M. S. (2014 ). A Survey on Security of Hadoop. 4th International Conference on Computer and Knowledge Engineering (ICCKE) (pp. 716–721). IEEE. DOI: https://doi.org/10.1109/ICCKE.2014.6993455
Kareem, S. W. (2009). Hybrid Public Key Encryption Algorithms For E-Commerce. Erbil: University of Salahaddin–Hawler.
Kareem, S. W., & Hussein, Y. T. (2017). Survey and New Security methodology of Routing Protocol in AD-Hoc Network. The 1st International Conference on Information Technology (pp. 452–464). Erbil. DOI: https://doi.org/10.25212/ICoIT17.043
Li, B., Wang, M., Zhao, Y., Pu, G., Zhu, H., & Song, F. (2015). Modeling and Verifying Google File System Modeling and Verifying Google File System. 16th International Symposium on High Assurance Systems Engineering (pp. 207–214). IEEE. DOI: https://doi.org/10.1109/HASE.2015.38
Mahmoud, H., Hegazy, A., & Khafagy, M. H. (2018). An approach for Big Data Security based on Hadoop Distributed File system. International Conference on Innovative Trends in Computer Engineering (ITCE 2018). Aswan: Aswan University. DOI: https://doi.org/10.1109/ITCE.2018.8316608
Merla, P., & Liang, Y. (2017). Data analysis using hadoop MapReduce environment. IEEE International Conference on Big Data (Big Data) (pp. 4783–4785). Boston: IEEE. DOI: https://doi.org/10.1109/BigData.2017.8258541
Motoyama, M., McCoy, D., Levchenko, K., Savage, S., & Voelker, G. M. (2011). An analysis of underground forums. ACM SIG- COMM Conference on Internet Measurement Conference IMC '11 (pp. 71–80). New York: ACM. DOI: https://doi.org/10.1145/2068816.2068824
Park, S., & Lee, Y. (2013). Secure Hadoop with Encrypted HDFS. International Conference on Grid and Pervasive Computing (pp. 134–141). Springer. DOI: https://doi.org/10.1007/978-3-642-38027-3_14
Parmar, R. R., Roy, S., Bhattacharyya, D., Bandyopadhyay, S. K., & Kim, T.-H. (2017). Large-scale encryption in the Hadoop environment: Challenges and solutions. IEEE Access, 5, 7156–7163. DOI: https://doi.org/10.1109/ACCESS.2017.2700228
Raghad, Z. Y., Kareem, S. W., & Hasan, A. O. (2016). Design Security System Based on AES and MD5 for Smart Card. Sulaimanyia: Charmo university.
Shetty, M. M., & Manjaiah, D. H. (2016). Data security in Hadoop distributed file system. IEEE Int. Conf. Emerg. Technol. Trends Comput. Commun. Electr. Eng. ICETT 2016 (pp. 939–944). IEEE. DOI: https://doi.org/10.1109/ICETT.2016.7873697
Usama, M., & Zakaria, N. (2017). Chaos-Based Simultaneous Compression and Encryption for Hadoop. PLoS One. DOI: https://doi.org/10.1371/journal.pone.0168207
Yang, Ch., Lin, W., & Liu, M. (2013). A Novel Triple Encryption Scheme for Hadoop-based Cloud Data Security. Fourth International Conference on Emerging Intelligent Data and Web Technologies (pp. 437–442). IEEE. DOI: https://doi.org/10.1109/EIDWT.2013.80
Zhou, H., & Wen, Q. (2014). A new solution of data security accessing for Hadoop based on CP-ABE. 5th International Conference on Software Engineering and Service Science (pp. 525–528). IEEE. DOI: https://doi.org/10.1109/ICSESS.2014.6933621
Article Details
Abstract views: 275
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
All articles published in Applied Computer Science are open-access and distributed under the terms of the Creative Commons Attribution 4.0 International License.
