A Novel Inconsequential Encryption Algorithm for Big Data in Cloud Computing
Article Sidebar
Open full text
Issue Vol. 23 (2022)
-
Comparative analysis of selected programming frameworks of Java-based web applications
Radosław Książek, Beata Pańczyk66-70
-
Preferences of modern mobile app users
Kamil Kasztelan, Jakub Smołka71-76
-
Web application performance analysis using Angular, React and Vue.js frameworks
Konrad Bielak, Bartłomiej Borek, Małgorzata Plechawska-Wójcik77-83
-
Comparative analysis of software for smart homes
Mateusz Woliński, Tomasz Szymczyk84-88
-
Comparative analysis of message brokers
Mateusz Kaczor, Paweł Powroźnik89-96
-
Comparison of virtualization methods at operating system level
Łukasz Grula, Paweł Powroźnik97-104
-
Detrimental Starfish Detection on Embedded System: A Case Study of YOLOv5 Deep Learning Algorithm and TensorFlow Lite framework
Quoc Toan Nguyen105-111
-
An Analysis of the Knowledge about the Aspects of Cybersecurity and Two-Factor Logging in the Society
Kamil Piłat, Michał Tomasz Pawłowski, Grzegorz Kozieł112-117
-
Analysis of the application of brain-computer interfaces of a selected paradigm in everyday life
Katarzyna Mróz, Małgorzata Plechawska-Wójcik118-122
-
Performance Comparison of Unit Test Isolation Frameworks
Mateusz Domański, Michał Dołęga, Grzegorz Kozieł123-127
-
Comparative analysis of frameworks using TypeScript to build server applications
Marcin Golec, Małgorzata Plechawska-Wójcik128-134
-
C++ and Java performance on the Android platform
Paweł Wlazło, Jakub Smołka135-139
-
A Novel Inconsequential Encryption Algorithm for Big Data in Cloud Computing
Ravi Kanth Motupalli, Krishna Prasad K.140-144
-
Comparison of LeNet-5, AlexNet and GoogLeNet models in handwriting recognition
Bartosz Michalski, Małgorzata Plechawska-Wójcik145-151
-
Comparative study of scaling parameters and research output of selected highly- and moderately-cited individual authors
Keshra Sangwal152-164
-
Analysis of the performance of iOS applications developed using native and cross-platform technology.
Marcin Michałowski, Maria Skublewska-Paszkowska165-171
Main Article Content
DOI
Authors
Abstract
In the digitalized era of the information technology the expansion of the data usage is very high accounting for about enormous data transaction in day to day life. Data from different sources like sensors, mobile phones, satellite, social media and networks, logical transaction and ventures, etc add an gigantic pile to the existing stack of data. One of the best way to handle this exponential data production is the Hadoop network. Thus in the current scenario big industries and organizations rely on the Hadoop network for the production of their essential data. Focusing on the data generation and organization, data security one of the most primary important consideration was left unnoticed making data vulnerable to cyber attacks and hacking. Hence this article proposes an effective mixed algorithm concept with the Salsa20 and AES algorithm to enhance the security of the transaction against unauthorised access and validates the quick data transaction with minimal encryption and decryption time. High throughput obtained in this hybrid framework demonstrates the effectiveness of the proposed algorithmic structure over the existing systems
Keywords:
References
Big Data market revenue forecast worldwide 2011-2027, by Wikibon; Silicon ANGLE Available: https://www.statista.com/statistics/254266/global-big-data-market-forecast/ [04.02.2019].
Apache Hadoop 3.2.0-Hdfs Architecture, Available: https://hadoop.apache.org/docs/r3.2.0/hadoop-project-dist/hadoop-hdfs/HdfsDesign [04.01.2019].
D. Borthakur, The Hadoop distributed file system: Architecture and design, Hadoop Project Website 11 (2007) 21.
M. Dhatrak, H. Panadiwal, Privacy-Preserving Mining using Data Encryption scheme for Hadoop Ecosystem, In International Journal of Advanced Research in Science, Engineering and Technology 5(4) (2018) 5578-5585.
S. Singh, M. Sharma, The Prototype for Implementation of Security Issue in Big Data Application using Hadoop Server, International Journal of Computer Applications 145(13) (2016) 9-13. DOI: https://doi.org/10.5120/ijca2016910844
S. Ghemawat, J. Dean, MapReduce: Simplified data processing on large clusters, ACM Commun. Mag. 51(1) (2008) 107-113. DOI: https://doi.org/10.1145/1327452.1327492
Y. Kumar, R. Munjal, H. Sharma, Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures, (IJAFRC) 1:6 (2014) 2348-4853.
B.H. Lee, E.K. Dewi, M.F. Wajdi, Data security in cloud computing using AES under HEROKU cloud, In The 27th Wireless and Optical Communications Conference (WOCC2018) (2018) 1-5. DOI: https://doi.org/10.1109/WOCC.2018.8372705
P. Mahajan, A. Sachdeva, A Study of Encryption Algorithms AES, DES, and RSA for Security, Global Journal of Computer Science and Technology Network, Web & Security 13(15) (2013) 15-22.
H.Y. Lin, S.T. Shen, W.G. Tzeng, B.S.P. Lin, Toward data confidentiality via integrating hybrid encryption schemes and Hadoop Distributed File System, in the Proceedings of the 2012 IEEE 26th International Conference on Advanced Information Networking and Applications (AINA) (2012) 740-747. DOI: https://doi.org/10.1109/AINA.2012.28
J. Cohen, S. Acharya, Towards a Trusted Hadoop Storage Platform: Design Considerations of an AES Based Encryption Scheme with TPM Rooted Key Protections,” IEEE 10th International Conference on and Autonomic and Trusted Computing (UIC/ATC), Ubiquitous Intelligence and Computing (2013) 444-451. DOI: https://doi.org/10.1109/UIC-ATC.2013.57
J. Tang, Y. Cui, Q. Li, K. Ren, J. Liu, R. Buyya, Ensuring security and privacy preservation for cloud data services, ACM Computing Surveys 49(1) (2016) 1-39. DOI: https://doi.org/10.1145/2906153
W. Song, B. Wang, Q. Wang, Z. Peng, W. Lou, Y. Cui, A privacy preserved full-text retrieval algorithm over encrypted data for cloud storage applications, Journal of Parallel and Distributed Computing 99 (2017) 14-27. DOI: https://doi.org/10.1016/j.jpdc.2016.05.017
P.V. Bharati, T. Sita Mahalakshmi, Data storage security in cloud using a functional encryption algorithm, In Emerging Research in Computing, Information, Communication and Applications, Springer Singapore (2016) 201-212. DOI: https://doi.org/10.1007/978-981-10-0287-8_18
K.N. Prasetyo, Y. Purwanto, D. Darlis, An Implementation of data encryption for internet of things using blowfish algorithm on FPGA. International Conference on Information and Communication Technology (2014) 75-79. DOI: https://doi.org/10.1109/ICoICT.2014.6914043
A. Abo-alian, N. L. Badr, M. F. Tolba, Data Storage Security Service in Cloud Computing: Challenges and Solutions, In Multimedia Forensics and Security, Springer International Publishing (2017) 25-57. DOI: https://doi.org/10.1007/978-3-319-44270-9_2
H. Bagheri, A.A. Shaltooki, Big Data: Challenges, Opportunities and Cloud Based Solutions, International Journal of Electrical and Computer Engineering (IJECE) 5(2) (2015) 340-343. DOI: https://doi.org/10.11591/ijece.v5i2.pp340-343
S.A. Thanekar, K. Subrahmanyam, A.B. Bagwan, A Study on MapReduce: Challenges and Trends, Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 4(1) (2016) 176-183. DOI: 10.11591/ijeecs.v4.i1.pp176-183. DOI: https://doi.org/10.11591/ijeecs.v4.i1.pp176-183
I. Bhargavi, D. Veeraiah, T.M. Padmaja, Securing BIG DATA: A Comparative Study Across RSA, AES, DES, EC and ECDH, In Computer Communication, Networking and Internet Security. Lecture Notes in Networks and Systems 5 (2017) 355-362. DOI: https://doi.org/10.1007/978-981-10-3226-4_36
S. Aditham, N. Ranganathan, A System Architecture for the Detection of Insider Attacks in Big Data Systems. IEEE Transactions on Dependable and Secure Computing (2017) 1–1. doi:10.1109/tdsc.2017.2768533. DOI: https://doi.org/10.1109/TDSC.2017.2768533
Y. Reddy, Big Data Processing and Access Controls in Cloud Environment. 2018 IEEE 4th International Conference on Big Data Security on Cloud (Big Data Security), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS). doi:10.1109/bds/hpsc/ ids18.2018.00019. DOI: https://doi.org/10.1109/BDS/HPSC/IDS18.2018.00019
D. J. Bernstein, The Salsa20 family of stream ciphers, In New Stream Cipher Designs. Berlin, Germany: Springer, (2008) 84–97. DOI: https://doi.org/10.1007/978-3-540-68351-3_8
S. Potteti, N. Parati, Secured Data Transfer For Cloud Using Blowfish, International Journal Of Advances In Computer Science And Cloud Computing 3(2) (2015) 17-22.
P. Ghosh, V. Thakor, P. Bhathawala, Data Security and Privacy in Cloud Computing Using Different Encryption Algorithms, International Journal of Advanced Research in Computer Science and Software Engineering 7(5) (2017) 469-471. DOI: https://doi.org/10.23956/ijarcsse/V7I5/0109
K.Sekar, M Padmavathamma, Comparative Study of Encryptio Algorithm over Big Data in Cloud Systems, International conference on Computing for Sustainable Global Development (INDIACom) (2016) 1571-1574.
B.T. Reddy, K.B. Chowdappa, S.R. Reddy, Cloud Security using Blowfish and Key Management Encryption Algorithm, International Journal of Engineering and Applied Sciences (IJEAS) 2(6) (2015) 59-62.
G. Saini, N. Sharma, Triple security of data in cloud computing, International Journal of Computer Science and Information Technologies 5(4) (2014) 5825-5827.
D.S. Elminaam, H.M. Abdual-Kader, M.M. Hadhoud, Evaluating the performance of symmetric encryption algorithms, Int. J. Netw. Secur. 10(3) (2010) 216-222.
Article Details
Abstract views: 249
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
