A hybrid encryption method handling big data vulnerabilities

被引:0
|
作者
Priyanka G. [1 ]
Lal A.M. [1 ]
机构
[1] School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, Tamil Nadu
关键词
Algorithms; Big data; Combinations; Encryption; High-level security; Hybrid; Low-level security; Medium-level security; Multi-fold method; Vulnerabilities;
D O I
10.1504/IJCC.2019.103879
中图分类号
学科分类号
摘要
As big data hits the maximum number of companies in all domains, secured data transfer can be done by cryptography. With increasing threats to big data, the security must focus on to avoid the attackers from the formation of any pattern to gain access to the information. Big data deals with the linguistic data which consists of low secured data and high secured data as well. Hence, the system should focus on providing multi-fold security and should avoid high-security common to all data categories. This paper presents a hybrid model for big data that ensures data confidentiality, data integrity, access control and sequential freshness by combining three symmetric key algorithms AES, DES and blowfish for the encryption and decryption process in any desired order. Based on the level of security the combination of the algorithms can vary. This method of encryption and decryption process ensures safe data transformation between source and destination. © 2019 Inderscience Enterprises Ltd.
引用
收藏
页码:207 / 213
页数:6
相关论文
共 50 条
  • [21] Handling Big Data in Modern Healthcare
    Aziz, Hassan A.
    LABORATORY MEDICINE, 2016, 47 (04) : E38 - E41
  • [22] Approximation aids handling of big data
    Thomas Heinis
    Nature, 2014, 515 : 198 - 198
  • [23] Handling Evolution in Big Data Architectures
    Solodovnikova, Darja
    Niedrite, Laila
    BALTIC JOURNAL OF MODERN COMPUTING, 2020, 8 (01): : 21 - 47
  • [24] Handling Big Data using NoSQL
    Bhogal, Jagdev
    Choksi, Imran
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 393 - 398
  • [25] VAVId-Handling Big data
    Garcke, Jochen
    ERCIM NEWS, 2015, (101): : 51 - 51
  • [26] Metadata handling for Big Data projects
    Golosova, M.
    Aulov, V
    Kaida, A.
    BIGDATA CONFERENCE (FORMERLY INTERNATIONAL CONFERENCE ON BIG DATA AND ITS APPLICATIONS), 2018, 1117
  • [27] Big Data Handling in Real Time
    Lierheimer, Michael
    ATP MAGAZINE, 2021, (05): : 31 - 31
  • [28] Role of Hadoop in Big Data Handling
    Meenakshi
    Ramachandra, A. C.
    Thippeswamy, M. N.
    Bailakare, Ajith
    INTERNATIONAL CONFERENCE ON INTELLIGENT DATA COMMUNICATION TECHNOLOGIES AND INTERNET OF THINGS, ICICI 2018, 2019, 26 : 482 - 491
  • [29] A big data analytics approach to combat telecommunication vulnerabilities
    Jensen, Kristoffer
    Hai Thanh Nguyen
    Thanh Van Do
    Arnes, Andre
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03): : 2363 - 2374
  • [30] Estimation Method of Port Handling Efficiency Value Based on Ship Big Data
    Liao S.-G.
    Yang D.
    Bai X.-W.
    Weng J.-X.
    Jiaotong Yunshu Xitong Gongcheng Yu Xinxi/Journal of Transportation Systems Engineering and Information Technology, 2021, 21 (02): : 217 - 223