A Novel Inconsequential Encryption Algorithm for Big Data in Cloud Computing
Abstract
In the digitalized era of the information technology the expansion of the data usage is very high accounting for about enormous data transaction in day to day life. Data from different sources like sensors, mobile phones, satellite, social media and networks, logical transaction and ventures, etc add an gigantic pile to the existing stack of data. One of the best way to handle this exponential data production is the Hadoop network. Thus in the current scenario big industries and organizations rely on the Hadoop network for the production of their essential data. Focusing on the data generation and organization, data security one of the most primary important consideration was left unnoticed making data vulnerable to cyber attacks and hacking. Hence this article proposes an effective mixed algorithm concept with the Salsa20 and AES algorithm to enhance the security of the transaction against unauthorised access and validates the quick data transaction with minimal encryption and decryption time. High throughput obtained in this hybrid framework demonstrates the effectiveness of the proposed algorithmic structure over the existing systems
Keywords:
Hadoop network, data security, cyber-attacks, and hacking, Salsa20, and AESReferences
Big Data market revenue forecast worldwide 2011-2027, by Wikibon; Silicon ANGLE Available: https://www.statista.com/statistics/254266/global-big-data-market-forecast/ [04.02.2019].
Google Scholar
Apache Hadoop 3.2.0-Hdfs Architecture, Available: https://hadoop.apache.org/docs/r3.2.0/hadoop-project-dist/hadoop-hdfs/HdfsDesign [04.01.2019].
Google Scholar
D. Borthakur, The Hadoop distributed file system: Architecture and design, Hadoop Project Website 11 (2007) 21.
Google Scholar
M. Dhatrak, H. Panadiwal, Privacy-Preserving Mining using Data Encryption scheme for Hadoop Ecosystem, In International Journal of Advanced Research in Science, Engineering and Technology 5(4) (2018) 5578-5585.
Google Scholar
S. Singh, M. Sharma, The Prototype for Implementation of Security Issue in Big Data Application using Hadoop Server, International Journal of Computer Applications 145(13) (2016) 9-13.
DOI: https://doi.org/10.5120/ijca2016910844
Google Scholar
S. Ghemawat, J. Dean, MapReduce: Simplified data processing on large clusters, ACM Commun. Mag. 51(1) (2008) 107-113.
DOI: https://doi.org/10.1145/1327452.1327492
Google Scholar
Y. Kumar, R. Munjal, H. Sharma, Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures, (IJAFRC) 1:6 (2014) 2348-4853.
Google Scholar
B.H. Lee, E.K. Dewi, M.F. Wajdi, Data security in cloud computing using AES under HEROKU cloud, In The 27th Wireless and Optical Communications Conference (WOCC2018) (2018) 1-5.
DOI: https://doi.org/10.1109/WOCC.2018.8372705
Google Scholar
P. Mahajan, A. Sachdeva, A Study of Encryption Algorithms AES, DES, and RSA for Security, Global Journal of Computer Science and Technology Network, Web & Security 13(15) (2013) 15-22.
Google Scholar
H.Y. Lin, S.T. Shen, W.G. Tzeng, B.S.P. Lin, Toward data confidentiality via integrating hybrid encryption schemes and Hadoop Distributed File System, in the Proceedings of the 2012 IEEE 26th International Conference on Advanced Information Networking and Applications (AINA) (2012) 740-747.
DOI: https://doi.org/10.1109/AINA.2012.28
Google Scholar
J. Cohen, S. Acharya, Towards a Trusted Hadoop Storage Platform: Design Considerations of an AES Based Encryption Scheme with TPM Rooted Key Protections,” IEEE 10th International Conference on and Autonomic and Trusted Computing (UIC/ATC), Ubiquitous Intelligence and Computing (2013) 444-451.
DOI: https://doi.org/10.1109/UIC-ATC.2013.57
Google Scholar
J. Tang, Y. Cui, Q. Li, K. Ren, J. Liu, R. Buyya, Ensuring security and privacy preservation for cloud data services, ACM Computing Surveys 49(1) (2016) 1-39.
DOI: https://doi.org/10.1145/2906153
Google Scholar
W. Song, B. Wang, Q. Wang, Z. Peng, W. Lou, Y. Cui, A privacy preserved full-text retrieval algorithm over encrypted data for cloud storage applications, Journal of Parallel and Distributed Computing 99 (2017) 14-27.
DOI: https://doi.org/10.1016/j.jpdc.2016.05.017
Google Scholar
P.V. Bharati, T. Sita Mahalakshmi, Data storage security in cloud using a functional encryption algorithm, In Emerging Research in Computing, Information, Communication and Applications, Springer Singapore (2016) 201-212.
DOI: https://doi.org/10.1007/978-981-10-0287-8_18
Google Scholar
K.N. Prasetyo, Y. Purwanto, D. Darlis, An Implementation of data encryption for internet of things using blowfish algorithm on FPGA. International Conference on Information and Communication Technology (2014) 75-79.
DOI: https://doi.org/10.1109/ICoICT.2014.6914043
Google Scholar
A. Abo-alian, N. L. Badr, M. F. Tolba, Data Storage Security Service in Cloud Computing: Challenges and Solutions, In Multimedia Forensics and Security, Springer International Publishing (2017) 25-57.
DOI: https://doi.org/10.1007/978-3-319-44270-9_2
Google Scholar
H. Bagheri, A.A. Shaltooki, Big Data: Challenges, Opportunities and Cloud Based Solutions, International Journal of Electrical and Computer Engineering (IJECE) 5(2) (2015) 340-343.
DOI: https://doi.org/10.11591/ijece.v5i2.pp340-343
Google Scholar
S.A. Thanekar, K. Subrahmanyam, A.B. Bagwan, A Study on MapReduce: Challenges and Trends, Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 4(1) (2016) 176-183. DOI: 10.11591/ijeecs.v4.i1.pp176-183.
DOI: https://doi.org/10.11591/ijeecs.v4.i1.pp176-183
Google Scholar
I. Bhargavi, D. Veeraiah, T.M. Padmaja, Securing BIG DATA: A Comparative Study Across RSA, AES, DES, EC and ECDH, In Computer Communication, Networking and Internet Security. Lecture Notes in Networks and Systems 5 (2017) 355-362.
DOI: https://doi.org/10.1007/978-981-10-3226-4_36
Google Scholar
S. Aditham, N. Ranganathan, A System Architecture for the Detection of Insider Attacks in Big Data Systems. IEEE Transactions on Dependable and Secure Computing (2017) 1–1. doi:10.1109/tdsc.2017.2768533.
DOI: https://doi.org/10.1109/TDSC.2017.2768533
Google Scholar
Y. Reddy, Big Data Processing and Access Controls in Cloud Environment. 2018 IEEE 4th International Conference on Big Data Security on Cloud (Big Data Security), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS). doi:10.1109/bds/hpsc/ ids18.2018.00019.
DOI: https://doi.org/10.1109/BDS/HPSC/IDS18.2018.00019
Google Scholar
D. J. Bernstein, The Salsa20 family of stream ciphers, In New Stream Cipher Designs. Berlin, Germany: Springer, (2008) 84–97.
DOI: https://doi.org/10.1007/978-3-540-68351-3_8
Google Scholar
S. Potteti, N. Parati, Secured Data Transfer For Cloud Using Blowfish, International Journal Of Advances In Computer Science And Cloud Computing 3(2) (2015) 17-22.
Google Scholar
P. Ghosh, V. Thakor, P. Bhathawala, Data Security and Privacy in Cloud Computing Using Different Encryption Algorithms, International Journal of Advanced Research in Computer Science and Software Engineering 7(5) (2017) 469-471.
DOI: https://doi.org/10.23956/ijarcsse/V7I5/0109
Google Scholar
K.Sekar, M Padmavathamma, Comparative Study of Encryptio Algorithm over Big Data in Cloud Systems, International conference on Computing for Sustainable Global Development (INDIACom) (2016) 1571-1574.
Google Scholar
B.T. Reddy, K.B. Chowdappa, S.R. Reddy, Cloud Security using Blowfish and Key Management Encryption Algorithm, International Journal of Engineering and Applied Sciences (IJEAS) 2(6) (2015) 59-62.
Google Scholar
G. Saini, N. Sharma, Triple security of data in cloud computing, International Journal of Computer Science and Information Technologies 5(4) (2014) 5825-5827.
Google Scholar
D.S. Elminaam, H.M. Abdual-Kader, M.M. Hadhoud, Evaluating the performance of symmetric encryption algorithms, Int. J. Netw. Secur. 10(3) (2010) 216-222.
Google Scholar
Statistics
Abstract views: 159PDF downloads: 144
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.