Abstract
The word “SECURITY” play’s an important role in the area of the Database. The massive volume of the data is been collected every day which is been stored, transferred over the network from one distant location to the other to provide the availability of the data to the end user. To make the data secure in the network or into the drives where it is stored need some security measures like encryption of the data into the storage device and over the network. There are many encryption algorithms which are been used to secure the data. So that it must be made as confidential in the sense of end user, that its data is protected. Transferring and storing of the data in a plaintext format may create a risk of hacking by the attacker or maybe miss used by the attacker. In order to get prevented by this kind of attacks, proper encryption/authentication must be performed. Or proper mechanism must be imposed on the system so that the data which is been transferred or stored must be secured. Use of various encryption/decryption algorithms like AES, 3DES, RSA and many more are preventing it nowadays but we can create a new algorithm by merging the two algorithms of a different nature to protect our data from the attacker. In this Research, RSA 2048-bit algorithm and AES 256-bit will be implemented using ASP.Net or Java and cryptool 2.0. Securing the Big-Data application is intended to suit security administrations, for example, classification, trustworthiness, verification, and non-disavowal.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Harba, E.S.I.: Secure data encryption through a combination of AES, RSA and HMAC. Eng. Technol. Appl. Sci. Res. 7(4), 1781–1785 (2017)
Sekar, K., Padmavathamma, M.: Comparative study of encryption algorithm over big data in cloud systems. In: 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 1571–1574. IEEE, March 2016
Alam, M.I., Khan, M.R.: Performance and efficiency analysis of different block cipher algorithms of symmetric key cryptography. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(10) (2013)
Mell, P., Grance, T.: Draft NIST working definition of cloud computing, Referenced on June 3rd, vol. 15 (2009)
Carey, M.J.: Declarative data services: this is your data on SOA. In: SOCA, p. 4 (2007)
Singh, G.: A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int. J. Comput. Appl. 67(19) (2013)
Sharma, A., Sharma, D.: Big data protection via neural and quantum cryptography. In: 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 3701–3704. IEEE, March 2016
Jin, S., Yang, S., Zhu, X., Yin, H.: Design of a trusted file system based on hadoop. In: Yuan, Y., Wu, X., Lu, Y. (eds.) ISCTCS 2012. CCIS, vol. 320, pp. 673–680. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-35795-4_85
Zhou, H., Wen, Q.: Data security accessing for HDFS based on attribute-group in cloud computing. In: International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2014). Atlantis Press, May 2014
Somu, N., Gangaa, A., Sriram, V.S.: Authentication service in hadoop using one time pad. Indian J. Sci. Technol. 7(4), 56–62 (2014)
Fernandez, E.B.: Security in data intensive computing systems. In: Furht, B., Escalante, A. (eds.) Handbook of Data Intensive Computing, pp. 447–466. Springer, New York (2011). https://doi.org/10.1007/978-1-4614-1415-5_16
Jam, M.R., Khanli, L.M., Akbari, M.K., Hormozi, E., Javan, M.S.: Survey on improved Autoscaling in Hadoop into cloud environments. In: 2013 5th Conference on Information and Knowledge Technology (IKT), pp. 19–23. IEEE, May 2013
Yuan, M.A.: Study of security mechanism based on Hadoop. Inf. Secur. Commun. Priv. 6(042.2012) (2012)
Yang, C., Lin, W., Liu, M.: A novel triple encryption scheme for hadoop-based cloud data security. In: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), pp. 437–442. IEEE, September 2013
Jam, M.R., Khanli, L.M., Javan, M.S., Akbari, M.K.: A survey on security of Hadoop. In: 2014 4th International eConference on Computer and Knowledge Engineering (ICCKE), pp. 716–721. IEEE, October 2014
Shukla, V.: Hadoop Security: Today and Tomorrow (2013)
Magnani, E., Hake, S.: KNOX lost the OX: the arabidopsis KNATM gene defines a novel class of KNOX transcriptional regulators missing the homeodomain. Plant Cell 20(4), 875–887 (2008)
Zhang, X.: Secure your Hadoop cluster with apache sentry. Cloudera, 7 April 2014
Raja, M.C., Rabbani, M.M.A.: Comprehensive and coordinated security of knox gateway in big data (2015)
Vavilapalli, V.K., et al.: Apache hadoop yarn: yet another resource negotiator. In: Proceedings of the 4th Annual Symposium on Cloud Computing, p. 5. ACM, October 2013
Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. Commun. ACM 51(1), 107–113 (2008)
Venugopalan, S., Noland, B.: With sentry, Cloudera fills Hadoop’s enterprise security gap. Cloudera (2013). http://blog.cloudera.com/blog/2013/07/with-sentry-cloudera-fillshadoops-enterprise-security-gap
Sharma, P.P., Navdeti, C.P.: Securing big data hadoop: a review of security issues, threats and solution. Int. J. Comput. Sci. Inf. Technol. 5(2), 2126–2131 (2014)
Wang, L., et al.: MapReduce across distributed clusters for data-intensive applications. In: 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & Ph.D. Forum (IPDPSW), pp. 2004–2011. IEEE, May 2012
Zhao, J., et al.: A security framework in G-Hadoop for big data computing across distributed Cloud data centres. J. Comput. Syst. Sci. 80(5), 994–1007 (2014)
Abood, O.G., Elsadd, M.A., Guirguis, S.K.: Investigation of cryptography algorithms used for security and privacy protection in smart grid. In: 2017 Nineteenth International Middle East Power Systems Conference (MEPCON), pp. 644–649. IEEE, December 2017
Kumar, J., Garg, V.: Security analysis of unstructured data in NoSQL MongoDB database. In: 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN), pp. 300–305. IEEE, October 2017
Bhardwaj, I., Kumar, A., Bansal, M.: A review on lightweight cryptography algorithms for data security and authentication in IoTs. In: 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC), pp. 504–509. IEEE, September 2017
Chandra, S., Ray, S., Goswami, R.T.: Big data security: survey on frameworks and algorithms. In: 2017 IEEE 7th International Advance Computing Conference (IACC), pp. 48–54. IEEE, January 2017
Li., J., Surbiryala, C., Rong, C.: A framework for improving security in cloud computing. In: 2017 IEEE 2nd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), pp. 260–264. IEEE, April 2017
Chaudhari, N., Srivastava, S.: Big data security issues and challenges. In: 2016 International Conference on Computing, Communication and Automation (ICCCA), pp. 60–64. IEEE, April 2016
Alouneh, S., Hababeh, L., Al-Hawari, F., Alajrami, T.: An innovative methodology for elevating big data analysis and security. In: Open Source Software Computing, December 2016
Jang, S.B.: A study of performance enhancement in big data anonymization. In: 2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT), pp. 1–4. IEEE, August 2017
Mishra, A.D., Singh, Y.B.: Big data analytics for security and privacy challenges. In: 2016 International Conference on Computing, Communication and Automation (ICCCA), pp. 50–53. IEEE, April 2016
Mahmoud, H., Hegazy, A., Khafagy, M.H.: An approach for big data security based on the Hadoop distributed file system. In: Innovative Trends, February 2018
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dwivedi, N., Malik, A. (2019). Analysis of Novel Hybrid Encryption Algorithm for Providing Security in Big Data. In: Luhach, A., Jat, D., Hawari, K., Gao, XZ., Lingras, P. (eds) Advanced Informatics for Computing Research. ICAICR 2019. Communications in Computer and Information Science, vol 1076. Springer, Singapore. https://doi.org/10.1007/978-981-15-0111-1_15
Download citation
DOI: https://doi.org/10.1007/978-981-15-0111-1_15
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0110-4
Online ISBN: 978-981-15-0111-1
eBook Packages: Computer ScienceComputer Science (R0)