Secure Data Access in Hadoop Using Elliptic Curve Cryptography

被引:1
|
作者
Diaz, Antonio F. [1 ]
Blokhin, Ilia [1 ]
Ortega, Julio [1 ]
Palacios, Raul H. [1 ]
Rodriguez-Quintana, Cristina [1 ]
Diaz-Garcia, Juan [1 ]
机构
[1] Univ Granada, Dept Comp Architecture & Technol, Granada & Andalusian Hlth Serv SAS, Granada, Spain
来源
ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2016 COLLOCATED WORKSHOPS | 2016年 / 10049卷
关键词
Hadoop; Big data; Security; Elliptic curve cryptography;
D O I
10.1007/978-3-319-49956-7_11
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Big data analytics allows to obtain valuable information from different data sources. It is important to maintain control of those data because unauthorised copies could be used by other entities or companies interested in them. Hadoop is widely used for processing large volumes of information and therefore is ideal for developing big data applications. Its security model focuses on the control within a cluster by preventing unauthorised users, or encrypting data distributed among nodes. Sometimes, data theft is carried out by personnel who have access to the system so they can skip most of the security features. In this paper, we present an extension to the Hadoop security model that lets control the information from the source, avoiding that data can be used by unauthorised users and improving corporative e-governance. We use an eToken with elliptic curve cryptography that performs a robust operation of the system and prevents from being falsified, duplicated or manipulated.
引用
收藏
页码:136 / 145
页数:10
相关论文
共 50 条
  • [1] A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption
    Elhoseny, Mohamed
    Elminir, Hamdy
    Riad, Alaa
    Yuan, Xiaohui
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2016, 28 (03) : 262 - 275
  • [2] Secure sharing of data in cloud using MA-CPABE with elliptic curve cryptography
    Sandhia, G. K.
    Raja, S. V. K.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (8) : 3893 - 3902
  • [3] Secure sharing of data in cloud using MA-CPABE with elliptic curve cryptography
    G. K. Sandhia
    S. V. K. Raja
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 3893 - 3902
  • [4] A secure protocol for Bluetooth piconets using elliptic curve cryptography
    Hwang, MS
    Lee, CC
    Lee, JZ
    Yang, CC
    TELECOMMUNICATION SYSTEMS, 2005, 29 (03) : 165 - 180
  • [5] A secure user authentication protocol using elliptic curve cryptography
    Kumari, Adesh
    Abbasi, M. Yahya
    Kumar, Vinod
    Khan, Akber Ali
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 521 - 530
  • [6] A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography
    Min-Shiang Hwang
    Cheng-Chi Lee
    Ji-Zhe Lee
    Chao-Chen Yang
    Telecommunication Systems, 2005, 29 : 165 - 180
  • [7] An Improved Secure RFID Authentication Protocol Using Elliptic Curve Cryptography
    Liu, Wan-Rong
    Ji, Zhi-Yong
    Chu, Cheng-Chen
    International Journal of Network Security, 2024, 26 (01) : 106 - 115
  • [8] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Dinarvand, Negin
    Barati, Hamid
    WIRELESS NETWORKS, 2019, 25 (01) : 415 - 428
  • [9] Competing secure text encryption in intranet using elliptic curve cryptography
    Kumari, Arpana
    Kapoor, Vivek
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2020, 23 (02): : 631 - 641
  • [10] Secure Localization Using Elliptic Curve Cryptography in Wireless Sensor Networks
    Vijayalakshmi, V.
    Palanivelu, T. G.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (06): : 255 - 261