Secure Data Access in Hadoop Using Elliptic Curve Cryptography

被引:1
作者
Diaz, Antonio F. [1 ]
Blokhin, Ilia [1 ]
Ortega, Julio [1 ]
Palacios, Raul H. [1 ]
Rodriguez-Quintana, Cristina [1 ]
Diaz-Garcia, Juan [1 ]
机构
[1] Univ Granada, Dept Comp Architecture & Technol, Granada & Andalusian Hlth Serv SAS, Granada, Spain
来源
ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2016 COLLOCATED WORKSHOPS | 2016年 / 10049卷
关键词
Hadoop; Big data; Security; Elliptic curve cryptography;
D O I
10.1007/978-3-319-49956-7_11
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Big data analytics allows to obtain valuable information from different data sources. It is important to maintain control of those data because unauthorised copies could be used by other entities or companies interested in them. Hadoop is widely used for processing large volumes of information and therefore is ideal for developing big data applications. Its security model focuses on the control within a cluster by preventing unauthorised users, or encrypting data distributed among nodes. Sometimes, data theft is carried out by personnel who have access to the system so they can skip most of the security features. In this paper, we present an extension to the Hadoop security model that lets control the information from the source, avoiding that data can be used by unauthorised users and improving corporative e-governance. We use an eToken with elliptic curve cryptography that performs a robust operation of the system and prevents from being falsified, duplicated or manipulated.
引用
收藏
页码:136 / 145
页数:10
相关论文
共 50 条
  • [11] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Dinarvand, Negin
    Barati, Hamid
    WIRELESS NETWORKS, 2019, 25 (01) : 415 - 428
  • [12] Secure Data Transmission Scheme Based on Elliptic Curve Cryptography for Internet of Things
    Harbi, Yasmine
    Aliouat, Zibouda
    Harous, Saad
    Bentaleb, Abdelhak
    MODELLING AND IMPLEMENTATION OF COMPLEX SYSTEMS, 2019, 64 : 34 - 46
  • [13] Towards application of biometrically based methods for secure transmission of spatial data using elliptic curve cryptography
    Martin, Chris
    Vert, Gregory
    WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 2, 2005, : 325 - 329
  • [14] Design of Secure Group Key Agreement Protocol using Elliptic Curve Cryptography
    Jaiswal, Priyanka
    Kumar, Abhimanyu
    Tripathi, Sachin
    2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND APPLICATIONS (ICHPCA), 2014,
  • [15] Secure video steganographic model using framelet transform and elliptic curve cryptography
    Rout, Sonali
    Mohapatra, Ramesh Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (09) : 25191 - 25212
  • [16] Efficient and secure e-voting scheme using elliptic curve cryptography
    Chatterjee, Uddalak
    Ray, Sangram
    Adhikari, Sharmistha
    Khan, Muhammad Khurram
    Dasgupta, Mou
    SECURITY AND PRIVACY, 2023, 6 (03)
  • [17] Secure video steganographic model using framelet transform and elliptic curve cryptography
    Sonali Rout
    Ramesh Kumar Mohapatra
    Multimedia Tools and Applications, 2024, 83 : 25191 - 25212
  • [18] Combining Elliptic Curve Cryptography and Blockchain Technology to Secure Data Storage in Cloud Environments
    Benmenzer, Faiza
    Beghdad, Rachid
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [19] A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY
    Aydin, M. Ali
    Aydin, G. Zeynep
    ISTANBUL UNIVERSITY-JOURNAL OF ELECTRICAL AND ELECTRONICS ENGINEERING, 2006, 6 (02): : 211 - 221
  • [20] A SECURE COMMUNICATION FOR HEALTHCARE SYSTEM USING WEARABLE DEVICES BASED ON ELLIPTIC CURVE CRYPTOGRAPHY
    Pandiaraja, P.
    Subha, S.
    INTERNATIONAL JOURNAL OF LIFE SCIENCE AND PHARMA RESEARCH, 2019, : 3 - 9