Skip to main content

Analysis of Novel Hybrid Encryption Algorithm for Providing Security in Big Data

  • Conference paper
  • First Online:
Advanced Informatics for Computing Research (ICAICR 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1076))

  • 601 Accesses

Abstract

The word “SECURITY” play’s an important role in the area of the Database. The massive volume of the data is been collected every day which is been stored, transferred over the network from one distant location to the other to provide the availability of the data to the end user. To make the data secure in the network or into the drives where it is stored need some security measures like encryption of the data into the storage device and over the network. There are many encryption algorithms which are been used to secure the data. So that it must be made as confidential in the sense of end user, that its data is protected. Transferring and storing of the data in a plaintext format may create a risk of hacking by the attacker or maybe miss used by the attacker. In order to get prevented by this kind of attacks, proper encryption/authentication must be performed. Or proper mechanism must be imposed on the system so that the data which is been transferred or stored must be secured. Use of various encryption/decryption algorithms like AES, 3DES, RSA and many more are preventing it nowadays but we can create a new algorithm by merging the two algorithms of a different nature to protect our data from the attacker. In this Research, RSA 2048-bit algorithm and AES 256-bit will be implemented using ASP.Net or Java and cryptool 2.0. Securing the Big-Data application is intended to suit security administrations, for example, classification, trustworthiness, verification, and non-disavowal.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Harba, E.S.I.: Secure data encryption through a combination of AES, RSA and HMAC. Eng. Technol. Appl. Sci. Res. 7(4), 1781–1785 (2017)

    Google Scholar 

  2. Sekar, K., Padmavathamma, M.: Comparative study of encryption algorithm over big data in cloud systems. In: 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 1571–1574. IEEE, March 2016

    Google Scholar 

  3. Alam, M.I., Khan, M.R.: Performance and efficiency analysis of different block cipher algorithms of symmetric key cryptography. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(10) (2013)

    Google Scholar 

  4. Mell, P., Grance, T.: Draft NIST working definition of cloud computing, Referenced on June 3rd, vol. 15 (2009)

    Google Scholar 

  5. Carey, M.J.: Declarative data services: this is your data on SOA. In: SOCA, p. 4 (2007)

    Google Scholar 

  6. Singh, G.: A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int. J. Comput. Appl. 67(19) (2013)

    Article  Google Scholar 

  7. Sharma, A., Sharma, D.: Big data protection via neural and quantum cryptography. In: 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 3701–3704. IEEE, March 2016

    Google Scholar 

  8. Jin, S., Yang, S., Zhu, X., Yin, H.: Design of a trusted file system based on hadoop. In: Yuan, Y., Wu, X., Lu, Y. (eds.) ISCTCS 2012. CCIS, vol. 320, pp. 673–680. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-35795-4_85

    Chapter  Google Scholar 

  9. https://hadoop.apache.org/

  10. Zhou, H., Wen, Q.: Data security accessing for HDFS based on attribute-group in cloud computing. In: International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2014). Atlantis Press, May 2014

    Google Scholar 

  11. Somu, N., Gangaa, A., Sriram, V.S.: Authentication service in hadoop using one time pad. Indian J. Sci. Technol. 7(4), 56–62 (2014)

    Google Scholar 

  12. Fernandez, E.B.: Security in data intensive computing systems. In: Furht, B., Escalante, A. (eds.) Handbook of Data Intensive Computing, pp. 447–466. Springer, New York (2011). https://doi.org/10.1007/978-1-4614-1415-5_16

    Chapter  Google Scholar 

  13. Jam, M.R., Khanli, L.M., Akbari, M.K., Hormozi, E., Javan, M.S.: Survey on improved Autoscaling in Hadoop into cloud environments. In: 2013 5th Conference on Information and Knowledge Technology (IKT), pp. 19–23. IEEE, May 2013

    Google Scholar 

  14. Yuan, M.A.: Study of security mechanism based on Hadoop. Inf. Secur. Commun. Priv. 6(042.2012) (2012)

    Google Scholar 

  15. Yang, C., Lin, W., Liu, M.: A novel triple encryption scheme for hadoop-based cloud data security. In: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), pp. 437–442. IEEE, September 2013

    Google Scholar 

  16. Jam, M.R., Khanli, L.M., Javan, M.S., Akbari, M.K.: A survey on security of Hadoop. In: 2014 4th International eConference on Computer and Knowledge Engineering (ICCKE), pp. 716–721. IEEE, October 2014

    Google Scholar 

  17. Shukla, V.: Hadoop Security: Today and Tomorrow (2013)

    Google Scholar 

  18. Magnani, E., Hake, S.: KNOX lost the OX: the arabidopsis KNATM gene defines a novel class of KNOX transcriptional regulators missing the homeodomain. Plant Cell 20(4), 875–887 (2008)

    Article  Google Scholar 

  19. Zhang, X.: Secure your Hadoop cluster with apache sentry. Cloudera, 7 April 2014

    Google Scholar 

  20. Raja, M.C., Rabbani, M.M.A.: Comprehensive and coordinated security of knox gateway in big data (2015)

    Google Scholar 

  21. Vavilapalli, V.K., et al.: Apache hadoop yarn: yet another resource negotiator. In: Proceedings of the 4th Annual Symposium on Cloud Computing, p. 5. ACM, October 2013

    Google Scholar 

  22. Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. Commun. ACM 51(1), 107–113 (2008)

    Article  Google Scholar 

  23. Venugopalan, S., Noland, B.: With sentry, Cloudera fills Hadoop’s enterprise security gap. Cloudera (2013). http://blog.cloudera.com/blog/2013/07/with-sentry-cloudera-fillshadoops-enterprise-security-gap

  24. Sharma, P.P., Navdeti, C.P.: Securing big data hadoop: a review of security issues, threats and solution. Int. J. Comput. Sci. Inf. Technol. 5(2), 2126–2131 (2014)

    Google Scholar 

  25. Wang, L., et al.: MapReduce across distributed clusters for data-intensive applications. In: 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & Ph.D. Forum (IPDPSW), pp. 2004–2011. IEEE, May 2012

    Google Scholar 

  26. Zhao, J., et al.: A security framework in G-Hadoop for big data computing across distributed Cloud data centres. J. Comput. Syst. Sci. 80(5), 994–1007 (2014)

    Article  MathSciNet  Google Scholar 

  27. Abood, O.G., Elsadd, M.A., Guirguis, S.K.: Investigation of cryptography algorithms used for security and privacy protection in smart grid. In: 2017 Nineteenth International Middle East Power Systems Conference (MEPCON), pp. 644–649. IEEE, December 2017

    Google Scholar 

  28. Kumar, J., Garg, V.: Security analysis of unstructured data in NoSQL MongoDB database. In: 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN), pp. 300–305. IEEE, October 2017

    Google Scholar 

  29. Bhardwaj, I., Kumar, A., Bansal, M.: A review on lightweight cryptography algorithms for data security and authentication in IoTs. In: 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC), pp. 504–509. IEEE, September 2017

    Google Scholar 

  30. Chandra, S., Ray, S., Goswami, R.T.: Big data security: survey on frameworks and algorithms. In: 2017 IEEE 7th International Advance Computing Conference (IACC), pp. 48–54. IEEE, January 2017

    Google Scholar 

  31. Li., J., Surbiryala, C., Rong, C.: A framework for improving security in cloud computing. In: 2017 IEEE 2nd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), pp. 260–264. IEEE, April 2017

    Google Scholar 

  32. Chaudhari, N., Srivastava, S.: Big data security issues and challenges. In: 2016 International Conference on Computing, Communication and Automation (ICCCA), pp. 60–64. IEEE, April 2016

    Google Scholar 

  33. Alouneh, S., Hababeh, L., Al-Hawari, F., Alajrami, T.: An innovative methodology for elevating big data analysis and security. In: Open Source Software Computing, December 2016

    Google Scholar 

  34. Jang, S.B.: A study of performance enhancement in big data anonymization. In: 2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT), pp. 1–4. IEEE, August 2017

    Google Scholar 

  35. Mishra, A.D., Singh, Y.B.: Big data analytics for security and privacy challenges. In: 2016 International Conference on Computing, Communication and Automation (ICCCA), pp. 50–53. IEEE, April 2016

    Google Scholar 

  36. Mahmoud, H., Hegazy, A., Khafagy, M.H.: An approach for big data security based on the Hadoop distributed file system. In: Innovative Trends, February 2018

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arun Malik .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dwivedi, N., Malik, A. (2019). Analysis of Novel Hybrid Encryption Algorithm for Providing Security in Big Data. In: Luhach, A., Jat, D., Hawari, K., Gao, XZ., Lingras, P. (eds) Advanced Informatics for Computing Research. ICAICR 2019. Communications in Computer and Information Science, vol 1076. Springer, Singapore. https://doi.org/10.1007/978-981-15-0111-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0111-1_15

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0110-4

  • Online ISBN: 978-981-15-0111-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics