Anonymous Privacy-Preserving Scheme for Big Data Over the Cloud

被引:0
作者
Al-Odat, Zeyad A. [1 ]
Khan, Samee U. [1 ]
机构
[1] North Dakota State Univ, Dept Elect & Comp Engn, Fargo, ND 58105 USA
来源
2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA) | 2019年
基金
美国国家科学基金会;
关键词
Cloud; Privacy; Security; MapReduce; Big Data;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper introduces an anonymous privacy preserving scheme for big data over the cloud. The proposed design helps to enhance the encryption/decryption time of big data by utilizing the MapReduce framework. The Hadoop distributed file system and the secure hash algorithm are employed to provide the anonymity, security and efficiency requirements for the proposed scheme. The experimental results show a significant enhancement in the computational time of data encryption and decryption.
引用
收藏
页码:5711 / 5717
页数:7
相关论文
共 15 条
  • [1] Al-Odat Z. A., 2019, ARXIV190806086
  • [2] Mitigation and Improving SHA-1 Standard Using Collision Detection Approach
    Al-Odat, Zeyad
    Ali, Mazhar
    Khan, Samee U.
    [J]. 2018 INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT 2018), 2018, : 333 - 338
  • [3] A Big Data Storage Scheme Based on Distributed Storage Locations and Multiple Authorizations
    Al-Odat, Zeyad A.
    Al-Qtiemat, Eman M.
    Khan, Samee U.
    [J]. 2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2019, : 13 - 18
  • [4] The Sponge Structure Modulation Application to Overcome the Security Breaches for the MD5 and SHA-1 Hash Functions
    Al-Odat, Zeyad A.
    Khan, Samee U.
    [J]. 2019 IEEE 43RD ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2019, : 811 - 816
  • [5] An innovative privacy preserving technique for incremental datasets on cloud computing
    Aldeen, Yousra Abdul Alsahib S.
    Salleh, Mazleena
    Aljeroudi, Yazan
    [J]. JOURNAL OF BIOMEDICAL INFORMATICS, 2016, 62 : 107 - 116
  • [6] Function-Private Functional Encryption in the Private-Key Setting
    Brakerski, Zvika
    Segev, Gil
    [J]. JOURNAL OF CRYPTOLOGY, 2018, 31 (01) : 202 - 225
  • [7] Chandramohan Dhasarathan, 2017, Journal of King Saud University - Engineering Sciences, V29, P144, DOI 10.1016/j.jksues.2015.12.002
  • [8] Enhanced Secured Map Reduce layer for Big Data privacy and security
    Jain, Priyank
    Gyanchandani, Manasi
    Khare, Nilay
    [J]. JOURNAL OF BIG DATA, 2019, 6 (01)
  • [9] Jingwei Li, 2012, Information and Communication Security. 14th International Conference (ICICS 2012). Proceedings, P191, DOI 10.1007/978-3-642-34129-8_17
  • [10] Loai A. T., 2019, J KING SAUD U COMPUT