Hybrid-Key Stream Cipher Mechanism for Hadoop Distributed File System Security

被引:0
作者
Khafagy, Omar Helmy [1 ]
Ibrahim, Mohamed Hasan [2 ]
Omara, Fatma A. [3 ]
机构
[1] Fayoum Univ, October 6 Univ, Dept Comp Sci, Giza, Egypt
[2] Fayoum Univ, Fac Comp & Informat, Dept Informat Syst, Al Fayyum, Egypt
[3] Cairo Univ, Fac Comp & Artificial Intelligence, Dept Comp Sci, Giza, Egypt
来源
PROCEEDINGS OF 2020 INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN COMMUNICATION AND COMPUTER ENGINEERING (ITCE) | 2020年
关键词
Big Data; Hadoop; Data Security; Encryption; Decryption;
D O I
10.1109/itce48509.2020.9047775
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Big Data is a term used to describe a collection of huge data that none of the traditional data management tools are able to store or process it efficiently. Big Data has been speeded rapidly in many domains such as, social networks and other information systems. One of the main challenges of Big data is how to keep sensitive information private and secure. So, data protection is considered the major problem of big data. In this paper, a hybrid-Key Stream Cipher Mechanism (HKSCM) has been introduced to improve the time of encryption and decryption data. This proposed mechanism consists of the One-Time Password (OTP) encryption algorithm and the Advanced Encryption Standard (AES) algorithm. The performance of our proposed HKSCM mechanism has been evaluated with respect to the execution time and file size. These have been done by a comparative study among the AES algorithm, RC4 stream cipher algorithm, hybrid algorithm, and our proposed HKSCM mechanism. According to the comparative results, it is found that our proposed HKSCM mechanism outperforms the AES algorithm, RC4 stream cipher algorithm, and hybrid algorithm by 14%, 3%, and 8% on average respectively. In addition, the read/write performance of the data protection in the Hadoop Distributed File System (HDFS) has been improved.
引用
收藏
页码:39 / 43
页数:5
相关论文
共 21 条
[1]  
A. S. Foundation, 2014, WHAT IS AP HAD
[2]  
Borthakur D., 2007, ACCESS, P1
[3]  
Chakraborty D., 2014, MODES OPERATIONS BLO
[4]  
Defence N, 2007, CRYPT MECH RUL REC
[5]  
IDC Corporate USA, 2016, BIG DAT AN, P1
[6]  
Kak A, 2015, LECT 8 AES ADV ENCRY, P1
[7]  
Mahmoud H., 2017, COMP STUDY HADOOP DI
[8]  
Mahmoud H, 2018, PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN COMPUTER ENGINEERING (ITCE' 2018), P109, DOI 10.1109/ITCE.2018.8316608
[9]  
Mohamed MH, 2015, 2015 SAI INTELLIGENT SYSTEMS CONFERENCE (INTELLISYS), P355, DOI 10.1109/IntelliSys.2015.7361167
[10]  
O. P. OTP, 2011, IMPL ON TIM PASSW OT