An Investigation Analysis on Secured Communication with Big Data |
||
|
|
|
© 2022 by IJCTT Journal | ||
Volume-70 Issue-8 |
||
Year of Publication : 2022 | ||
Authors : S. Sangeetha, P. Suresh Babu | ||
DOI : 10.14445/22312803/IJCTT-V70I8P103 |
How to Cite?
S. Sangeetha, P. Suresh Babu, "An Investigation Analysis on Secured Communication with Big Data," International Journal of Computer Trends and Technology, vol. 70, no. 8, pp. 15-20, 2022. Crossref, https://doi.org/10.14445/22312803/IJCTT-V70I8P103
Abstract
Big data is a large volume of complex data structured and unstructured to reveal patterns and trends. Big data is a large amount of data storage and delivery on a semi-trusted big datasharing platform. Secured data communication is employed to perform the data point communication securely. Data security is an important role in guaranteeing a large number of data. Security in data communication transfers the message between sender and receiver to preserve the message as confidential. Cryptography performs the secured communication with an adversarial behaviour. Many researchers carried out their research for performing secured data communication. But, the data confidentiality level was not improved, and existing cryptographic methods did not reduce delay. Different cryptographic methods are discussed to perform the secured data communication to address these issues.
Keywords
Big data, Data confidentiality, Data delivery, Data storage, Cryptography.
Reference
[1] Hong Xu, Qian He, Xuecong Li, Bingcheng Jiang, and Kuangyu Qin, "Bdss-Fa: A Blockchain-Based Data Security Sharing Platform with Fine-Grained Access Control", IEEE Access, vol. 8, pp. 87552– 87561, 2020.
[2] David G. Rosado, Julio Moreno, Luis E. Sanchez, Antonio Santos-Olmo, Manuel A. Serrano and Eduardo FernandezMedina,“MARISMA-BiDa Pattern: Integrated Risk Analysis for Big Data”, Computers & Security, Elsevier, vol. 102, pp. 1-35, 2021.
[3] Fengyin Li, Xinying Yu, RuiGe, Yanli Wang, Yang Cui and Huiyu Zhou, "BCSE: Blockchain-Based Trusted Service Evaluation Modelover BigData", BigData Miningand Analytics, vol. 5, no. 1, pp. 1-14, 2022.
[4] Jie Chen L, Ramanathan and Mamoun Alazab, "Holistic, Big Data Integrated Artificial Intelligent Modeling to Improve Privacy and Security in Data Management of Smart Cities", Microprocessors and Microsystems, Elsevier, vol. 81, pp. 1-10, 2021.
[5] Danda B. Rawat, Ronald Doku and Moses Garuba, "Cyber Security in Big Data Era: From Securing Big Data to Data-Driven Security", IEEE Transactionson Services Computing, vol. 14, no. 6, pp. 2055–2072, 2021.
[6] Bin Zhao, Kai Fan, Kan Yang, Zilong Wang, Hui Li, and Yintang Yang, "Anonymous and Privacy-Preserving Federated Learning with Industrial Big Data", IEEE Transactionson Industrial Informatics, vol. 17, no. 9, pp. 6314– 6323, 2021.
[7] Donghui Hu, Yifan Li, Lixuan Pan, Meng Li and Shuli Zheng, "A Block Chain-Based Trading System for Big Data", Computer Networks, Elsevier, vol. 191, pp. 1-13, 2021.
[8] B. Mishachandar, S. Vairamuthu and M. Pavithra, "A Data Security and Integrity Framework using Third-Party Cloud Auditing", International Journal of Information Technology, Springer, vol. 13, pp. 2081–2089, 2021.
[9] Jun Feng, Laurence T. Yang, Ronghao Zhang, Shunli Zhang, Guohui Dai, and Weizhong Qiang, "A Tensor-Based Optimization Model for Secure Sustainable Cyber-Physical-Social Big Data Computations", IEEE Transactionson Sustainable Computing, vol. 5, no. 2, pp. 223-234, 2020.
[10] Marwa A. Elsayed and Mohammad Zulkernine, "Predict Deep: Security Analytics as a Service for Anomaly Detection and Prediction", IEEE Access, vol. 99, pp. 1-14, 2020.
[11] Pratima Sharma, Malaya Dutta Borah and Suyel Namasudra, "Improving Security of Medical Big Data by using Block Chain Technology", Computers & Electrical Engineering, Elsevier, vol. 96, pp. 1-15, 2021.
[12] Mallepalli Prasanna Kumari and Tumma Srinivasa Rao, "Alight Weighthy Brid Scheme for Security of Big Data", Materials Today: Proceedings, Elsevier, pp. 1-15, 2021.
[13] Maryann Thomas, S. V. Athawale, "Study of Cloud Computing Security Methods: Cryptography," SSRG International Journal of Computer Science and Engineering, vol. 6, no. 4, pp. 1-5, 2019. Crossref, https://doi.org/10.14445/23488387/IJCSEV6I4P101
[14] Jun Feng, Laurence T. Yang, Ronghao Zhang, Shunli Zhang, Guohui Dai, and WeizhongQiang, "A Tensor-Based Optimization Model for Secure Sustainable Cyber-Physical-Social Big Data Computations", IEEE Transactions on Sustainable Computing, vol. 5, no. 2, pp. 223-234, 2020.
[15] WeichaoGao, Wei Yu, Fan Liang, William Grant Hatcher, Chao Lu, "Privacy-Preserving Auction for Big Data Trading Using Homomorphic Encryption", IEEE Transactions on Network Science and Engineering, vol. 7, no. 2, pp. 776-791, 2020. DOI: 10.1109/TNSE.2018.2846736
[16] Saleh Atiewi, Amer Al-Rahayfeh, MuderAlmiani, Salman Yussof, Omar Alfandi, Ahed Abugabah, and Yaser Jararweh, "Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography", IEEE Access, vol. 8, pp. 113498 – 113511, 2020. DOI: 10.1109/ACCESS.2020.3002815
[17] RafikHamza, Alzubair Hassan, Awad Ali, Mohammed Bakri Bashir, Samar M. Alqhtani, Tawfeeg Mohmmed Tawfeeg and AdilYousif, "Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms", Entropy, vol. 24, no. 4, pp. 1-17, 2022.
[18] Surabhi Singh, LataBajpai Singh, Anjali Rai, "Investigating the Analytics for Workforce Automation," SSRG International Journal of Economics and Management Studies, vol. 9, no. 5, pp. 23-31, 2022. Crossref, https://doi.org/10.14445/23939125/IJEMS-V9I5P103
[19] Gayatri Kapil, Alka Agrawal, Abdulaziz Attaallah, Abdullah Algarni, Rajeev Kumar and Raees Ahmad Khan, "Attribute Based Honey Encryption Algorithm for Securing Big Data: Hadoop Distributed File System Perspective", Peer J Computer Science, vol. 6, 2020.
[20] Hanan E. Alhazmi, Fathy E. Eassa; Suhelah M. Sandokji, "Towards Big Data Security Framework by Leveraging Fragmentation and Block Chain Technology", IEEE Access, vol. 10, pp. 10768 – 10782, 2022. DOI: 10.1109/ACCESS.2022.3144632
[21] Akinsanmi Joel Akinboboye, Ayodele Sunday Oluwole, OlaitanAkinsanmi, Abiodun Ernest Amoran, "Cryptographic Algorithms for IoT Privacy: A Technical Review," International Journal of Engineering Trends and Technology, vol. 70, no. 8, pp. 185-193, 2022. Crossref, https://doi.org/10.14445/22315381/IJCTT-V70I8P219
[22] SarathSabu, H.M. Ramalingam, M Vishaka, H.R. Swapna, SwarajHegde, "Implementation of a Secure and Privacy-Aware E-Health Record and IoT Data Sharing using Blockchain", Global Transitions Proceedings, Elsevier, vol. 2, no. 2, pp. 429-433, 2021.
[23] Shekha Chenthara, Khandakar Ahmed, Hua Wang, Frank Whittaker, Zhenxiang Chen, "Health Chain: A Novel Framework on Privacy Preservation of Electronic Health Records using Block Chain Technology", PLoS ONE, vol. 15, no. 12, pp. 1-35, 2020.
[24] Abhishek Gupta, Mahesh Pawar, Dr. SachinGoyal, RatishAgrawal, "Information Assurance via Big Data Security Analytics", International Journal of Computer & organization Trends (IJCOT), vol. 5, no. 2, pp. 85-91, 2015.
[25] JafarA.Alzubi, "Blockchain-Based Lamport Merkle Digital Signature: Authentication Tool in IoT Healthcare", Computer Communications, Elsevier, vol. 170, pp. 200-208, 2021.
[26] LokendraVishwakarma, Debasis Das, "SCAB-IoTA: Secure Communication and Authentication for IoT Applications using Block Chain", Journal of Parallel and Distributed.
[27] Shalini Kumari, Dr.Neeru Bhardwaj, "A Review Paper on Big Data," SSRG International Journal of Mobile Computing and Application, vol. 6, no. 2, pp. 1-3, 2019. Crossref, https://doi.org/10.14445/23939141/IJMCA-V6I2P101
[28] J. Hariharakrishnan, S. Mohanavalli, K. S. Kumar, et al., "Survey of Pre-Processing Techniques for Mining Big data," in J Computer, Communication and Signal Processing (ICCCSP), International Conference, pp. 1–5, 2017.
[29] W. Diffie, M. Hellman, “New Directions in Cryptography,” IEEE Trans. Information Theory, vol. 22, no. 6, pp. 644-654, 1976.
[30] W. Stallings, “Cryptography and Network Security: Principles and Practice,” 5th ed., Prentice Hall Press, Upper Saddle River, NJ, USA, 2010.
[31] P.Priya, R.Jayakumar, "Cryptography Based Privacy Preserving Data Transmission in Hybrid Wireless Networks", International Journal of Computer & organization Trends (IJCOT), vol. 6, no. 6, pp. 5-9, 2016.
[32] D. Mondek, R. B. Blaz?ek, and T. Zahradnicky`, "Security Analytics in the Big Data Era," in Software Quality, Reliability and Security Companion (QRS-C), IEEE International Conference, pp. 605–606, 2017.