A GPU Unified Platform to Secure Big Data Transportation Using an Error-Prone Elliptic Curve Cryptography

The time and space optimization, protecting data loss and safeguarding privacy as well as integrity are the priorities in any large file transmission system. However, the current literature is lacking to provide such a system which can take care of each of these aspects very strongly in a unified way. Hence, this research proposes a Graphics Processing Unit (GPU)-based error-prone elliptic curve cryptography with an advanced memory management mechanism. It comprises the elliptic curve public-key cryptography (ECC) to offer higher defiance against the various privacy and integrity attacks. It further includes an advanced dual round of error regulator which can sense and spot any numbers of discrete or continuous faults. This error control technique can regenerate the data if there is any accidental loss during transportation. The usages of advanced parallel execution with a GPU and a unique memory management mechanism make it enable to handle required memory and time during the execution very efficiently. The achieved result shows that the projected unified approach offers higher Throughput on every incident which signifies that it is time-efficient. Additionally, it offers higher SNR, Avalanche Effect and a curtailed proportion of Data Loss. It specifies that the suggested mingled technique is proficient to protect privacy, integrity and mishap of data in big data hauling with the efficient management of available internal memory.

[1]  Houbing Song,et al.  Mobile Cloud Computing Model and Big Data Analysis for Healthcare Applications , 2016, IEEE Access.

[2]  Rajkumar Buyya,et al.  An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing , 2016, J. Netw. Comput. Appl..

[3]  Jinjun Chen,et al.  A security framework in G-Hadoop for big data computing across distributed Cloud data centres , 2014, J. Comput. Syst. Sci..

[4]  Vijay Varadharajan,et al.  Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage , 2013, IEEE Transactions on Information Forensics and Security.

[5]  Chin-Ling Chen,et al.  A Secure Medical Data Exchange Protocol Based on Cloud Environment , 2014, Journal of Medical Systems.

[6]  Yong Xiang,et al.  Protection of Big Data Privacy , 2016, IEEE Access.

[7]  Xiaohua Jia,et al.  Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud , 2015 .

[8]  Chunhua Jin,et al.  Secure and efficient data transmission in the Internet of Things , 2015, Telecommunication Systems.

[9]  Xiangjian He,et al.  Cryptography-based secure data storage and sharing using HEVC and public clouds , 2017, Inf. Sci..

[10]  Vijay S. Pande,et al.  Hard Data on Soft Errors: A Large-Scale Assessment of Real-World Error Rates in GPGPU , 2009, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.

[11]  Shiladitya Bhattacharjee,et al.  A multibit burst error detection and correction mechanism for application layer , 2014, 2014 International Conference on Computer and Information Sciences (ICCOINS).

[12]  Shiladitya Bhattacharjee,et al.  A security scheme to minimize information loss during big data transmission over the internet , 2016, 2016 3rd International Conference on Computer and Information Sciences (ICCOINS).

[13]  Xiong Li,et al.  A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers , 2018, 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN).

[14]  M. Shamim Hossain,et al.  Secure data-exchange protocol in a cloud-based collaborative health care environment , 2018, Multimedia Tools and Applications.

[15]  Lu Zhang,et al.  Development and Application of a Chinese Webpage Suicide Information Mining System (Sims) , 2013, Journal of Medical Systems.

[16]  Jianqiang Li,et al.  A hybrid solution for privacy preserving medical data sharing in the cloud environment , 2015, Future Gener. Comput. Syst..

[17]  Xiaohong Yuan,et al.  Network security analysis using Big Data technology , 2016, SoutheastCon 2016.

[18]  Manish Kumar,et al.  A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography , 2016, Signal Process..

[19]  Shiladitya Bhattacharjee,et al.  A Hybrid Technique for Enhancing Data Integrity in Big Data Transmission Environment , 2018, 2018 4th International Conference on Computer and Information Sciences (ICCOINS).

[20]  Won Woo Ro,et al.  Access pattern-aware cache management for improving data utilization in GPU , 2017, 2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA).

[21]  Min Yoon,et al.  A data encryption scheme and GPU-based query processing algorithm for spatial data outsourcing , 2015, 2015 International Conference on Big Data and Smart Computing (BIGCOMP).

[22]  Jinjun Chen,et al.  A dynamic prime number based efficient security mechanism for big sensing data streams , 2017, J. Comput. Syst. Sci..

[23]  Shiladitya Bhattacharjee,et al.  GPU-Based Integrated Security System for Minimizing Data Loss in Big Data Transmission , 2019 .

[24]  Shadi Aljawarneh,et al.  A resource-efficient encryption algorithm for multimedia big data , 2017, Multimedia Tools and Applications.