An Improved Fine-Grained Encryption Method for Unstructured Big Data

In the big data protecting technologies, most of the existing data protections adopt entire encryption that leads to the researches of lightweight encryption algorithms, without considering from the protected data itself. In our previous paper (FGEM), it finds that not all the parts of a data need protections, the entire data protection can be supplanted as long as the critical parts of the structured data are protected. Reducing unnecessary encryption makes great sense for raising efficiency in big data processing. In this paper, the improvement of FGEM makes it suitable to protect semi-structured and unstructured data efficiently. By storing semi-structured and unstructured datum in an improved tree structure, the improved FGEM for the datum is achieved by getting congener nodes. The experiments show the improved FGEM has short operating time and low memory consumption.

[1]  Sameer Singh,et al.  Advances in Pattern Recognition — ICAPR 2001 , 2001, Lecture Notes in Computer Science.

[2]  Nei Kato,et al.  Toward intelligent machine-to-machine communications in smart grid , 2011, IEEE Communications Magazine.

[3]  Mikko Kiviharju Towards Pervasive Cryptographic Access Control Models , 2012, SECRYPT.

[4]  Shiau-Huey Wang,et al.  An Exchange Framework for Intrusion Alarm Reduction in Mobile Ad-hoc Networks , 2013, J. Comput..

[5]  Mustafa M. Matalgah,et al.  Simple encryption algorithm with improved performance in wireless communications , 2011, 2011 IEEE Radio and Wireless Symposium.

[6]  Gail-Joon Ahn,et al.  Towards temporal access control in cloud computing , 2012, 2012 Proceedings IEEE INFOCOM.

[7]  S. El-Rabaie,et al.  Encryption-based multilevel model for DBMS , 2012, Comput. Secur..

[8]  Xing Zhou,et al.  A novel efficient database encryption scheme , 2012, FSKD.

[9]  Jiu-Ru Wang,et al.  A research of fine-grained encryption method for IoT , 2012 .

[10]  Mark Weiser The computer for the 21st century , 1991 .

[11]  L. M. Varalakshmi,et al.  An enhanced encryption algorithm for video based on multiple Huffman tables , 2011, Multimedia Tools and Applications.

[12]  John Lee,et al.  A survey and challenges in routing and data dissemination in vehicular ad-hoc networks , 2008, 2008 IEEE International Conference on Vehicular Electronics and Safety.

[13]  Jennifer Widom,et al.  Object exchange across heterogeneous information sources , 1995, Proceedings of the Eleventh International Conference on Data Engineering.

[14]  Wang Yi-ming Design of Lightweight Encryption Algorithm Based on Optimized S-box , 2010 .

[15]  Wayne H. Wolf,et al.  Cyber-physical Systems , 2009, Computer.

[16]  Zhou Yuping,et al.  Research and realization of multi-level encryption method for database , 2010, 2010 2nd International Conference on Advanced Computer Control.

[17]  Matthew Smith,et al.  Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions , 2012, 2012 Tenth Annual International Conference on Privacy, Security and Trust.