A hybrid encryption method handling big data vulnerabilities Online publication date: Mon, 02-Dec-2019
by G. Priyanka; Anisha M. Lal
International Journal of Cloud Computing (IJCC), Vol. 8, No. 3, 2019
Abstract: As big data hits the maximum number of companies in all domains, secured data transfer can be done by cryptography. With increasing threats to big data, the security must focus on to avoid the attackers from the formation of any pattern to gain access to the information. Big data deals with the linguistic data which consists of low secured data and high secured data as well. Hence, the system should focus on providing multi-fold security and should avoid high-security common to all data categories. This paper presents a hybrid model for big data that ensures data confidentiality, data integrity, access control and sequential freshness by combining three symmetric key algorithms AES, DES and blowfish for the encryption and decryption process in any desired order. Based on the level of security the combination of the algorithms can vary. This method of encryption and decryption process ensures safe data transformation between source and destination.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Cloud Computing (IJCC):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com