Performance Analysis of Implementation of AES (XTS)-MR in HDFS and Its Suitability in UIDAI
Arpana Chaturvedi, Dr. Vinay Kumar, Dr. Meenu Dave "Performance Analysis of Implementation of AES (XTS)-MR in HDFS and Its Suitability in UIDAI". International Journal of Computer Trends and Technology (IJCTT) V60(3):161-168 June 2018. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract
The UIDAI data stored at CIDR is at high risk. Due to the introduction of new technologies and advanced tools, the risk factor increased. The data at rest as well as data at travel mode, both are at risk. The government is enforcing citizen of India to link Aadhaar number with different services so that right citizen can avail the benefits. The fear of getting shared private information increases the worries about various security threats. An efficient encryption technique is required to be implemented to secure data stored in different data centers. In this paper, an encryption process to be performed in parallel mode is discussed. This proposed algorithm minimizes the time consumption and vulnerabilities to numerous attacks on stored data. The proposed approach is AES in XTS Mode in Map Reduce paradigm which supports parallel programming in the distributed environment. The findings after reviews of results show that it provides better security against external attacks and overcomes the shortcomings of Kerberos. Encryption followed by compression on various datasets provides better result and protection from vulnerabilities and threats. In this paper, we reviewed different observations which prove that the algorithm is an appropriate choice.
Reference
[1] Kadre V., Chaturvedi S., “AES – MR: A Novel Encryption Scheme for securing Data in HDFS Environment using Map Reduce”, www.ijcaonline.org/ research/ volume129/ number12/kadre-2015-ijca-906994.pdf
[2] Mehak, Gagan, “Improving Data Storage Security in Cloud using Hadoop “, ISSN: 2248-9622, Vol. 4, Issue 9(Version 3), September 2014, pp.133-138, http://www.ijera.com/papers/Vol4_issue9/Version%203/U4903133138.pdf
[3] Weeks B., Bean M., Rozylowicz T., Ficke C.,” Hardware Performance Simulations of Round 2 Advanced Encryption Standard Algorithms, National Security”, https:// csrc.nist.gov/CSRC/ media/Projects/Cryptographic-Standards-and-Guidelines/documents/aes-development/NSA-AESfinalreport.pdf doi=10.1.1.35.6941
[4] Clunie D., Public Comments on the XTS-AES Mode,” https://csrc.nist.gov/csrc/media/projects/.../comments/xts/collected_xts_comments.pdf
[5] Public Comments-Modes Development - Block CipherTechniques,"https://csrc.nist.gov/Projects/Block-Cipher-Techniques/BCM/Public-Comments-Modes-Development “, Comments submitted to This email address is being protected from spambots. You need JavaScript enabled to view it..
[6] Dr. Hawthorne, NY, Computing Arbitrary Functions of Encrypted Data Craig Gentry IBM T.J. Watson Research Center 19 Skyline,This email address is being protected from spambots. You need JavaScript enabled to view it. https://crypto.stanford.edu/craig/easy-fhe.pdf.
[7] Desai Spark Y., Gao J., Sang-Yoon Chang, Chungsik Song, “Improving Encryption Performance Using Map reduce”, Published in: High Performance Computing and Communications (HPCC), IEEE 17th International Conference, ISBN: 978-1-4799-8937-9, http:// ieeexplore. ieee.org / document/7336355/
[8] G. Sujitha, M. Varadharajan, B. Raj Kumar and S. Mercy Shalinie ,”Provisioning Mapreduce for Improving Security of Cloud Data “,http:// scialert.net/ qredirect.php? doi = jai.2013.220.228& linkid=pdf, International Journal of Computer Science and Applications, ? Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016.
[9] Alexander Uskov, Adam Byerly, Colleen Heinemann,” Advanced Encryption Standard Analysis with Multimedia Data on Intel® AES-NI Architecture”, Department of Computer Science and Information Systems, and interlabs Research Institute Bradley University, 1501 West Bradley Avenue Peoria, Illinois 61625, U.S.A. This email address is being protected from spambots. You need JavaScript enabled to view it. http://www.tmrfindia.org/ijcsa/v13i26.pdf
[10] Demir L., Thiery M., Roca V., Jean-Louis Roch, Jean-Michel Tenkes, “Improving dm-crypt performance for XTS-AES mode through extended requests “, Nov 21, 2016 The 4th International Symposium on Research in Grey-Hat Hacking - aka GreHack, Nov 2016, Grenoble, France https://hal.inria.fr/hal-01399967
[11] Philip Derbeko, Shlomi Dolev, Ehud Gudes, Shantanu Sharma” Security and Privacy Aspects in map reduce on Clouds: A Survey”, www.https://arxiv.org/abs/1605.00677, www.iiste.org, ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012
[12] Liskov M., Mine Matsu K., “Comments on XTS-AES” September 2, 2008 This is a comment in response to the request for comment on XTS-AES, as specified in IEEE Std. 1619-2007 September 2, 2008, https://csrc.nist.gov/csrc/media/ projects /block-cipher-techniques/ documents/ bcm/ comm. ents/xts/xts_comments-liskov_minematsu .pdf.
[13] Kirat Pal Singh, Shiwani,” An Efficient Hardware design and Implementation of Advanced Encryption Standard (AES) Algorithm “, https :// eprint.iacr.org/ 2016/ 789.pdf.
[14]Vaidyaa M., Dr Shrinivas Deshpandeb ,” Study of Performance Parameters on Distributed File Systems using map reduce “, www.sciencedirect.com International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015, https://ac.els-cdn.com/S18770509 16000399/1-s2.0-S1877050916000399-main.pdf ?_tid=78 c69a4a-e233-11e7-8cfd-00000aab0f01& acdnat=15134098 15_ d18af66cf2c2e5fa578411397b06ce28
Keywords
AES, XTX, Map Reduce, UIDAI, CIDR, Kerberos.