88
Views
0
CrossRef citations to date
0
Altmetric
Articles

Hybrid Elliptic Curve Cryptographic Approach for Data Privacy and Authentication in Secured Map Reduce Layer (SMR) for Optimized CPU Utilization

&

REFERENCES

  • E. S. A. Ahmed, and R. A. Saeed, “A survey of big data cloud computing security,” Int. J. Comput. Sci. Softw. Eng., Vol. 3, no. 1, pp. 78–85, 2014.
  • V. N. Inukollu, S. Arsi, and S. R. Ravuri, “Security issue associated with big data in cloud computing,” Int. J. Netw. Secur. Appl., Vol. 6, no. 3, pp. 45–56, 2014.
  • B. Saraladevi, N. Pazhaniraja, P. Victer Paul, M. S. Saleem Basha, and P. Dhavachelvan, “Big data and Hadoop-A study in security perspective,” Procedia. Comput. Sci., Vol. 50, pp. 596–601, 2015.
  • J. Shafer, S. Rixner, and A. L. Cox, “The Hadoop Distributed File system: balancing portability and performance,” in Proceedings of the IEEE International Symposium on Performance Analysis of Systems & Software (ISPASS). White Plain, NY: IEEE; 2010, pp. 122–133.
  • J. Zhao, L. Wang, J. Tao, J. Chen, W. Sun, R. Ranjan, J. Kołodziej, A. Streit, D. Georgakopoulos, “A security framework in G-Hadoop for big data computing across distributed cloud data centres,” J. Comput. Syst. Sci., Vol. 80, pp. 994–1007, 2014.
  • L. Kumar, H. Jae, and R. P. Singh, “Efficient and secure cloud storage for handling big data,” in Information Science and Service Science and Data Mining (ISSDM), Taipei: IEEE; 2012, pp. 162–166.
  • H. Cheng, C. Rong, K. Hwang, W. Wang, and Y. Li, “Secure big data storage and sharing scheme for cloud tenants,” China Commun., Vol. 12, no. 6, pp. 106–115, 2015.
  • Y. Ma, Y. Zhou, Y. Yu, C. Peng, Z. Wang, and S. Du, “A novel approach for improving security and storage efficiency on HDFS,” Procedia Comput. Sci., Vol. 52, pp. 631–635, 2015.
  • G. Wei, J. Shao, Y. Xiang, P. Zhu, and R. Lu, “Obtain confidentiality or/and authenticity in big data by ID-based generalized signcryption,” Inf. Sci., Vol. 318, pp. 111–122, 2015.
  • M. Yoon, A. Cho, M. Jang, and J. W. Chang, “A data encryption scheme and GPU-based query processing algorithm for spatial data outsourcing,” in Proceedings of the 2015 International Conference on Big Data and Smart Computing (BIGCOMP), Jeju, Korea, 2015, pp. 202–209.
  • M. Kumar, A. Iqbal, and P. Kumar, “A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie–Hellman cryptography,” Signal. Processing., Vol. 125, pp. 187–202, Aug. 2016.
  • R. Balasubramanian, “Sumit Giri, the mean-value of a product of shifted multiplicative functions and the average number of points of elliptic curves,” J. Number Theory, Vol. 157, pp. 37–53, Dec. 2015.
  • P. V. Maitri, and A. Verma, “Enhancing file security using cryptography algorithms in cloud computing: a survey,” Int. J. Innov. Res Comput. Commun. Eng., Vol. 3, no. 10, pp. 9611–9615, Oct. 2015.
  • I. Nautiyal, and M. Sharma, “Encryption using elliptic curve cryptography using Java as implementation tool,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., Vol. 4, no. 1, pp. 15–21, Jan. 2014.
  • C. Nithiya, and R. Sridevi, “ECC algorithm & security in cloud,” Int. J. Adv. Res. Comput. Sci. Technol., Vol. 4, no. 1, pp. 24–27, Jan.–Mar. 2016.
  • K. David Strang, and Z. Sun, “Meta-Analysis of Big Data Security and Privacy: scholarly literature gaps,” in 2016 IEEE International Conference on Big Data (Big Data), 2016.
  • K. Navuluri, R. Mukkamala, A. Ahmad, “Privacy-aware big data warehouse architecture,” in 2016 IEEE International Congress on Big Data (Bigdata Congress), 2016.
  • M. M. Shetty, and D. H. Manjaiah, “Privacy preserving scheme for mapreduce,” in 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT), 2017.
  • B. Nelson, and T. Olovsson, “Security and privacy for big data: a systematic literature review,” in 2016 IEEE International Conference on Big Data (Big Data), 2016.
  • X. Chen, J. Ji, C. Luo, W. Liao, P. Li, “When machine learning meets blockchain: a decentralized, privacy-preserving and secure design,” in 2018 IEEE International Conference on Big Data (Big Data), 2018.
  • Y. Shi, “Data security and privacy protection in public cloud,” in 2018 IEEE International Conference On Big Data (Big Data), 2018.
  • M. T. Nafis, and R. Biswas, “A secure technique for unstructured big data using clustering method,” Int. J. Inf. Technol., 2019. in press
  • W. Zhou, D. Feng, Z. Tan, and Y. Zheng, “Improving big data storage performance in hybrid environment,” J. Comput. Sci., Vol. 26, pp. 409–418, 2018.
  • D. Taniar, “Big data is all about data that we don't have,” in Proceedings of the 2017 International Conference on Advanced Computer Science and Information Systems (ICACSIS), 2017, pp. 1–8.
  • D. Taniar, C. H. C. Leung, W. Rahayu, and S. Goel. High performance parallel database processing and grid databases. Germany: John Wiley & Sons, 2008. p. 576.
  • R. Chauhan, H. Kaur, and V. Chang, “An optimized integrated framework of big data analytics managing security and privacy in healthcare data,” Wirel. Pers. Commun., Vol. 117, pp. 87–108, 2021.
  • N. Hajli, F. Shirazi, M. Tajvidi, and N. Huda, “Towards an understanding of privacy management architecture in big data: an experimental research,” Br. J. Manage., Vol. 32, pp. 548–565, 2021.
  • L. Li, B. Abd-El-Atty, A. A. Abd El-Latif, and A. Ghoneim, “Quantum color image encryption based on multiple discrete chaotic systems,” in 2017 Federated Conference on Computer Science and Information Systems (FedCSIS), 2017, pp. 555–559. doi:10.15439/2017F163.
  • A. A. Abd El-Latif, B. Abd-El-Atty, M. Amin, A. M. Iliyasu, “Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications,” Sci. Rep., Vol. 10, pp. 1–15, 2020.
  • A. A. Abd EL-Latif, B. Abd-El-Atty, E. M. Abou-Nassar, and S. E. Venegas-Andraca, “Controlled alternate quantum walks based privacy preserving healthcare images in Internet of things,” Opt. Laser Technol., Vol. 124, p. 105942, 2020.
  • A. A. Abd El-Latif, X. Yan, L. Li, N. Wang, J.-L. Peng, and X. Niu, “A new meaningful secret sharing scheme based on random grids, error diffusion and chaotic encryption,” Opt. Laser Technol., Vol. 54, pp. 389–400, 2013.
  • Z. Liu, S. Li, W. Liu, W. Liu, and S. Liu, “Image hiding scheme by use of rotating squared sub-image in the gyrator transform domains,” Opt. Laser Technol., Vol. 45, pp. 198–203, 2013.
  • G. K. Mahato, and S. K. Chakraborty, “A comparative review on homomorphic encryption for cloud security,” IETE. J. Res., 2021. in press
  • Tweepy dataset online. https://marcobonzanini.com/2015/03/02/mining-twitter-data-with-python-part-1/.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.