Comparative study of encryption algorithm over big data in cloud systems

Big data refers to data that is too large and complex to be processed. Big data handles voluminous amount of structured, semi structured and unstructured data with standard tools. Big Data also refers to the data where the volume, velocity or variety of data. It combines the historic data with the present data to predict the outcomes. In this regard, providing security for these data is a challenging task. Apache Hadoop was one of the tool designed to handle big data. Apache Hadoop along with other software products were used to process and interpret the results of big data. Hadoop includes various main components like Map reduce and HDFS for handling big data. Cloud computing is the technology that provides the online data storage. But here providing security is the key issue. In this paper, an integrated approach is introduced to encrypt and decrypt the data before sending on cloud. To achieve better performance and security performance analysis on different techniques can be applied based on different parameters.

[1]  Chen Li,et al.  Inside "Big Data management": ogres, onions, or parfaits? , 2012, EDBT '12.

[2]  N. Cao,et al.  Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.

[3]  Sanjay Ghemawat,et al.  MapReduce: a flexible data processing tool , 2010, CACM.

[4]  Sihem Amer-Yahia,et al.  Proceedings of the 15th International Conference on Extending Database Technology , 2010, EDBT 2012.

[5]  Behrouz A. Forouzan,et al.  Data Communications and Networking , 2000 .

[6]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[7]  Roberto J. Bayardo,et al.  Data privacy through optimal k-anonymization , 2005, 21st International Conference on Data Engineering (ICDE'05).

[8]  Philip S. Yu,et al.  Anonymizing Classification Data for Privacy Preservation , 2007, IEEE Transactions on Knowledge and Data Engineering.

[9]  Ritu Pahal Efficient Implementation of AES , 2013 .

[10]  Jinjun Chen,et al.  A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud , 2013, IEEE Transactions on Parallel and Distributed Systems.

[11]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[12]  Kuldeep Singh,et al.  Efficiency and Security of Data with Symmetric Encryption Algorithms , 2012 .

[13]  Yang Xiao,et al.  Accountable MapReduce in cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).