Literature DB >> 33816911

Attribute based honey encryption algorithm for securing big data: Hadoop distributed file system perspective.

Gayatri Kapil1, Alka Agrawal1, Abdulaziz Attaallah2, Abdullah Algarni2, Rajeev Kumar1, Raees Ahmad Khan1.   

Abstract

Hadoop has become a promising platform to reliably process and store big data. It provides flexible and low cost services to huge data through Hadoop Distributed File System (HDFS) storage. Unfortunately, absence of any inherent security mechanism in Hadoop increases the possibility of malicious attacks on the data processed or stored through Hadoop. In this scenario, securing the data stored in HDFS becomes a challenging task. Hence, researchers and practitioners have intensified their efforts in working on mechanisms that would protect user's information collated in HDFS. This has led to the development of numerous encryption-decryption algorithms but their performance decreases as the file size increases. In the present study, the authors have enlisted a methodology to solve the issue of data security in Hadoop storage. The authors have integrated Attribute Based Encryption with the honey encryption on Hadoop, i.e., Attribute Based Honey Encryption (ABHE). This approach works on files that are encoded inside the HDFS and decoded inside the Mapper. In addition, the authors have evaluated the proposed ABHE algorithm by performing encryption-decryption on different sizes of files and have compared the same with existing ones including AES and AES with OTP algorithms. The ABHE algorithm shows considerable improvement in performance during the encryption-decryption of files. ©2020 Kapil et al.

Entities:  

Keywords:  And encryption-decryption; Big data; Cloud storage; Data security; HDFS; Hadoop

Year:  2020        PMID: 33816911      PMCID: PMC7924543          DOI: 10.7717/peerj-cs.259

Source DB:  PubMed          Journal:  PeerJ Comput Sci        ISSN: 2376-5992


  1 in total

1.  Correction: Chaos-Based Simultaneous Compression and Encryption for Hadoop.

Authors:  Muhammad Usama; Nordin Zakaria
Journal:  PLoS One       Date:  2018-03-29       Impact factor: 3.240

  1 in total
  2 in total

1.  A new SLA-aware method for discovering the cloud services using an improved nature-inspired optimization algorithm.

Authors:  Arash Heidari; Nima Jafari Navimipour
Journal:  PeerJ Comput Sci       Date:  2021-05-10

2.  Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems.

Authors:  Eko Hadiyono Riyadi; Agfianto Eko Putra; Tri Kuntoro Priyambodo
Journal:  PeerJ Comput Sci       Date:  2021-11-04
  2 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.