Securing BIG DATA: A Comparative Study Across RSA, AES, DES, EC and ECDH

Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 5)

Abstract

Now a days cloud computing has emerged as a cost-effective platform for providing IT or business services over the Internet. However, the services provided by the cloud are of third parties, ensuring the security and privacy of the customers. BIG Data is critical at cloud storage. Several security frameworks using cryptographic methodologies have been proposed to address this issue. However, there is no wide comparative study across the cryptographic methods that ensure the security of BIG DATA at the cloud data center. This paper presents a comparative study across fundamental cryptographic methodologies used in securing BIG Data at cloud storage. This work assumes that the cloud storage is erected with HADOOP based data center. In order to carry out comparative study, we have considered ECC, RSA, AES, DES and Elliptic curve Diffie-Hellman to verify the BIG Data security at cloud based data center.

Keywords

Big Data HADOOP RSA AES DES EC ECDH 

References

  1. 1.
    Tom White, “Hadoop: The Definitive Guide”, Third Edition, O’Reilly, (2012).Google Scholar
  2. 2.
    S. Park, Y. Lee, “Secure Hadoop with Encrypted HDFS,” Chapter Grid and Pervasive Computing, Vol. 7861 of the series Lecture Notes in Computer Science, pp 134–141, (2013).Google Scholar
  3. 3.
    Bo Li, Mengdi Wang, Yongxin Zhao, Geguang Pu, Huibiao Zhu, Fu Song “Modeling and Verifying Google File System Modeling and Verifying Google File System”, 16th International Symposium on High Assurance Systems Engineering, Pages: 207–214, IEEE, (2015).Google Scholar
  4. 4.
    Sourabh Chandra, Siddhartha B, Smita Paira. “A Study and Analysis on Symmetric Cryptography” ICSEMR, pp 1–8, IEEE (2014).Google Scholar
  5. 5.
    Rejani. R, Deepu.V. Krishnan, Study of Symmetric key Cryptography Algorithms, Volume 2 Issue 2, pp 45–50, IJCT (2015).Google Scholar
  6. 6.
    Garima Saini and Naveen Sharma, “Triple security of data in cloud computing,” International Journal of Computer Science and Information Technologies, Vol. 5, No 4, pp. 5825–5827, (2014).Google Scholar
  7. 7.
    Behrouz A. Forouzan “Cryptography and Network Security”, Tata McGraw-Hill Companies, (2007).Google Scholar
  8. 8.
    Sourabh Chandra, Sk Safikul Alam, Smita Paira and Goutam Sanyal. “A comparative survey of symmetric and asymmetric key cryptography”, International Conference on Electronics, Communication and Computational Engineering (ICECCE), pp 83–93, IEEE (2014).Google Scholar
  9. 9.
    D. Das, O. O’ Malley, Sanjay Radia, Kan Zhang, “Adding Security to Hadoop,” Hortonworks Technical Report I, (2010).Google Scholar
  10. 10.
    O. O’Malley, Kan Zhang, Sanjay Radia, Ram Marti, and Christopher Harrell. Hadoop security design. https://issues.apache.org/jira/secure/attachment/12428537/securitydesign.pdf,October, (2009).
  11. 11.
    H. Zhou and Q. Wen, “Data Security Accessing for HDFS Based on Attribute-Group in Cloud Computing,” In Proc. of International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2014), pp. 525–528, (2014).Google Scholar
  12. 12.
    J. Cohen, S. Acharya, “Towards a Trusted Hadoop Storage Platform: Design Considerations of an AES Based Encryption Scheme with TPM Rooted Key Protections,” IEEE 10th International Conference on and Autonomic and Trusted Computing (UIC/ATC), Ubiquitous Intelligence and Computing, pp. 444–451, (2013).Google Scholar
  13. 13.
    S. Jin, S. Yang, X. Zhu, and H. Yin, “Design of a Trusted File System Based on Hadoop,” In Proc. of Trustworthy Computing and Services, ed: Yuyu Yuan, Xu Wu, Yueming Lu, pp. 673–680, (2013).Google Scholar
  14. 14.
    H. Y. Lin, S. T. Shen, W. G. Tzeng, B. S. P. Lin. “Toward Data Confidentiality via Integrating Hybrid Encryption Schemes and Hadoop Distributed File System,” In Proceedings of 26th International Conference on Advanced Information Networking and Applications, IEEE Computer Society Washington, DC, USA, pp. 740–747, (2012).Google Scholar
  15. 15.
    C. Yang, W. Lin, and M. Liu, “A Novel Triple Encryption Scheme for Hadoop-Based Cloud Data Security,” in Proc. of 4th Emerging Intelligent Data and Web Technologies (EIDWT), pp. 437–442, (2013).Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringVFSTR UniversityGunturIndia

Personalised recommendations