An efficient framework for big data security based on selection encryption on AmazonEC2

被引:0
作者
Sakr, Ahmed S. [1 ]
Abdullkader, Hatem M. [2 ]
El-kafrawy, P. M. [1 ]
Ibrahem, Hani M. [1 ]
机构
[1] Menoufia Univ, Math & Comp Sci Dept, Fac Sci, Al Minufya, Egypt
[2] Menoufia Univ, Informat Syst Dept, Fac Comp & Informat, Al Minufya, Egypt
来源
2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018) | 2018年
关键词
Big data; encryption; cloud; Amazon ec2;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the wide use of smart device made huge amount of information arise. This information needed new methods to deal with it from that perspective big data concept arise. Most of the concerns on big data are given to handle data without concentrating on its security. Encryption is the best use to keep data safe from malicious users. However, ordinary encryption methods are not suitable for big data. Selective encryption is an encryption method that encrypts only the important part of the message. However, we deal with uncertainty to evaluate the important part of the message. The problem arises when the important part is not encrypted. This is the motivation of the paper. In this paper we propose security framework to secure important and unimportant portion of the message to overcome the uncertainty. However, each will take a different encryption technique for better performance without losing security. The framework selects the important parts of the message to be encrypted with a strong algorithm and the weak part with a medium algorithm. The important of the word is defined according to how its origin frequently appears. This framework is applied on amazon EC2 (elastic compute cloud). A comparison between the proposed framework, the full encryption method and TossA-Coin method are performed according to encryption time and throughput. The results showed that the proposed method gives better performance according to encryption time, throughput than full encryption.
引用
收藏
页数:5
相关论文
共 10 条
[1]  
[Anonymous], 2009, NIST DEFINITION CLOU
[2]  
[Anonymous], 2011, INT J COMPUT TRENDS
[3]   Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility [J].
Buyya, Rajkumar ;
Yeo, Chee Shin ;
Venugopal, Srikumar ;
Broberg, James ;
Brandic, Ivona .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (06) :599-616
[4]  
Jeeva A., 2012, International Journal of Engineering Research and Applications (IJERA), V2, P3033
[5]   A Novel Selective Encryption Method for Securing Text over Mobile Ad hoc Network [J].
Kushwaha, Ajay ;
Sharma, Hari Ram ;
Ambhaikar, Asha .
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 :16-23
[6]   A Survey On Scheduling Schemes With Security In Wireless Sensor Networks [J].
Mahidhar, Rashmi ;
Raut, Archana .
1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 :756-762
[7]   A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues [J].
Mohd, Bassam J. ;
Hayajneh, Thaier ;
Vasilakos, Athanasios V. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 58 :73-93
[8]  
Nanda S., 2005, TECHNICAL REPORT, P11794
[9]   A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish [J].
Patil, Priyadarshini ;
Narayankar, Prashant ;
Narayan, D. G. ;
Meena, S. M. .
1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 :617-624
[10]  
Ren YL, 2011, 2011 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), P1038, DOI 10.1109/WCNC.2011.5779278