Efficient pairing computation for Attribute Based Encryption using MBNR for Big Data in cloud

Author(s):  
Balaji Chandrasekaran ◽  
Ramadoss Balakrishnan
2020 ◽  
Vol 6 ◽  
pp. e259
Author(s):  
Gayatri Kapil ◽  
Alka Agrawal ◽  
Abdulaziz Attaallah ◽  
Abdullah Algarni ◽  
Rajeev Kumar ◽  
...  

Hadoop has become a promising platform to reliably process and store big data. It provides flexible and low cost services to huge data through Hadoop Distributed File System (HDFS) storage. Unfortunately, absence of any inherent security mechanism in Hadoop increases the possibility of malicious attacks on the data processed or stored through Hadoop. In this scenario, securing the data stored in HDFS becomes a challenging task. Hence, researchers and practitioners have intensified their efforts in working on mechanisms that would protect user’s information collated in HDFS. This has led to the development of numerous encryption-decryption algorithms but their performance decreases as the file size increases. In the present study, the authors have enlisted a methodology to solve the issue of data security in Hadoop storage. The authors have integrated Attribute Based Encryption with the honey encryption on Hadoop, i.e., Attribute Based Honey Encryption (ABHE). This approach works on files that are encoded inside the HDFS and decoded inside the Mapper. In addition, the authors have evaluated the proposed ABHE algorithm by performing encryption-decryption on different sizes of files and have compared the same with existing ones including AES and AES with OTP algorithms. The ABHE algorithm shows considerable improvement in performance during the encryption-decryption of files.


2021 ◽  
Vol 9 (1) ◽  
pp. 295-303
Author(s):  
Dr. P. Vijaya Bharati, R. Ravi, N. Sowjanya Kumari

Data increased daily and has a significant role in every field, like industries, medical, etc. The data is captured, stored, and it is processed to retrieve the necessary data. Security and privacy play an essential role when critical data is shared among users in a distributed environment. These challenges are to be addressed. Mainly they are highly required during sharing and storing vast amounts of data. This paper presents a novel solution to secure the vast data with Attribute-based encryption (ABE), providing access control that prevents unauthorized user's access. Moreover, query optimization is provided in this paper to retrieve the required encrypted data from the big data quickly.


2018 ◽  
Vol 173 ◽  
pp. 03047
Author(s):  
Zhao Li ◽  
Shuiyuan Huan

There are many security threats such as data’s confidentiality and privacy protection in the new application scenario of big data processing, and for the problems such as coarse granularity and low sharing capability existing in the current research on big data access control, a new model to support fine-grained access control and flexible attribute change is proposed. Based on CP-ABE method, a multi-level attribute-based encryption scheme is designed to solve fine-grained access control problem. And to solve the problem of attribute revocation, the technique of re-encryption and version number tag is integrated into the scheme. The analysis shows that the proposed scheme can meet the security requirement of access control in big data processing environment, and has an advantage in computational overhead compared with the previous schemes.


2018 ◽  
Vol 7 (S1) ◽  
pp. 87-89
Author(s):  
Avula Satya Sai Kumar ◽  
S. Mohan ◽  
R. Arunkumar

As emerging data world like Google and Wikipedia, volume of the data growing gradually for centralization and provide high availability. The storing and retrieval in large volume of data is specialized with the big data techniques. In addition to the data management, big data techniques should need more concentration on the security aspects and data privacy when the data deals with authorized and confidential. It is to provide secure encryption and access control in centralized data through Attribute Based Encryption (ABE) Algorithm. A set of most descriptive attributes is used as categorize to produce secret private key and performs access control. Several works proposed in existing based on the different access structures of ABE algorithms. Thus the algorithms and the proposed applications are literally surveyed and detailed explained and also discuss the functionalities and performance aspects comparison for desired ABE systems.


2020 ◽  
Author(s):  
VINIT KRISHNANKUTTY ◽  
Tanvir Sajal ◽  
Jinan Fiaidhi

<b>Big Data faces many challenges with respect to the security while storing them on a cloud server. There is high chance of getting data viewed by the hacker and the server for performing various operations. In order to provide high level of confidentiality and integrity, a new Encryption technique is introduced known as Attribute Based Encryption (ABE), which instead of making use of the receiver’s public key for encryption, uses various attributes. As a future scope, ABE can be combined with Homomorphic Encryption (HE) to provide a secure transfer of the identity. In order to provide more privacy of data, web log Analyzer is used to find out the loopholes and the unauthorized access to the web data</b>


Sign in / Sign up

Export Citation Format

Share Document