FLEXIBLE SCHEME FOR PROTECTING BIG DATA AND ENABLE SEARCH AND MODIFICATIONS OVER ENCRYPTED DATA DIRECTLY

Authors:

Sirisha N,K. V. D. Kiran,

DOI NO:

https://doi.org/10.26782/jmcms.2020.04.00022

Keywords:

Big data,big data security,Jelastic cloud,flexible encryption,homomorphic encryption,

Abstract

Secure data storage and retrieval is essential to safeguard data from different kinds of attacks. It is part of information security which enables a system to avoid unauthorized access to data. The data storage destinations are diversified which includes the latest Internet computing phenomenon known as cloud computing as well. Whatever be the storage destination, cryptographic primitives are widely used to protect data from malicious attacks. There are other methods like auditing for data integrity. However, cryptography is the technique which has witnessed many variants of algorithms. However, most of the cryptographic algorithms do not support search and data modifications directly on the encrypted data. Homomorphic encryption and its variants showed promising solution towards flexibility in data dynamics. Motivated by this cryptographic technique, in this paper we proposed an algorithm known as Flexible Data Encryption (FDE) which supports encryption, decryption, search operation directly on encrypted data besides allowing modifications. This improves performance and flexibility in data management activities. Moreover, the proposed algorithm supports different kinds of data like relational and non-relational data. The proposed big data security methodology uses Jalastic cloud as the storage destination. Empirical results revealed that the proposed algorithm outperforms baseline cryptographic algorithms.

Refference:

I. DING, Wenxiu; YAN, Zheng; and DENG, Robert H.. Encrypted data processing with Homomorphic Re-Encryption. (2017). Information Sciences, 35-55.
II. Elhoseny, M., Elminir, H., Riad, A., & Yuan, X. (2016). A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption. Journal of King Saud University – Computer and Information Sciences, 28(3), 262–275.
III. Gai, K., &Qiu, M. (2018). Blend Arithmetic Operations on Tensor-Based Fully Homomorphic Encryption Over Real Numbers. IEEE Transactions on Industrial Informatics, 14(8), 3590–3598.
IV. Graepel, T., Lauter, K., &Naehrig, M. (2013). ML Confidential: Machine Learning on Encrypted Data. Information Security and Cryptology – ICISC 2012, 1–21.
V. Hen, C., Zhu, X., Shen, P., & Hu, J. (2014). A hierarchical clustering method for big data oriented ciphertext search. 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). P1-6.
VI. Helsloot, L. J., Tillem, G., &Erkin, Z. (2017). AHEad: Privacy-preserving online behavioural advertising using homomorphic encryption. 2017 IEEE Workshop on Information Forensics and Security (WIFS). P1-6.
VII. Jiang, R., Lu, R., &Choo, K.-K. R. (2018). Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data. Future Generation Computer Systems, 78, 392–401.
VIII. J.S. Rauthan, K.S. Vaisla, VRS-DB: Preserve confidentiality of users’ data using encryption approach, Digital Communications and Networks, p1-14.
IX. Kuzu, M., Islam, M. S., &Kantarcioglu, M. (2015). Distributed Search over Encrypted Big Data. Proceedings of the 5th ACM Conference on Data and Application Security and Privacy – CODASPY ’15. P1-8.
X. Khedr, Alhassan, et al. “SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers.” IEEE Transactions on Computers 65, 9, 2848–2858.
XI. Kim, H.-Y., Myung, R., Hong, B., Yu, H., Suh, T., Xu, L., & Shi, W. (2019). SafeDB: Spark Acceleration on FPGA Clouds with Enclaved Data Processing and Bitstream Protection. 2019 IEEE 12th International Conference on Cloud Computing (CLOUD). P1-8.
XII. KashiSai Prasad, S Pasupathy, “Real-time Data Streaming using Apache Spark on Fully Configured Hadoop Cluster”, J.Mech.Cont.& Math. Sci., Vol.-13, No.-5, November-December (2018) Pages 164-176.
XIII. K. Sai Prasad, Dr. S Pasupathy, “Deep Learning Concepts and Libraries Used in Image Analysis and Classification”, TEST Engineering & Management, Volume 82, ISSN: 0193 – 4120 Page No. 7907 – 7913.
XIV. K. Sai Prasad &RajenderMiryala “Histopathological Image Classification Using Deep Learning Techniques” International Journal on Emerging Technologies 10(2): 467-473(2019)
XV. Li, Y., Gai, K., Qiu, L., Qiu, M., & Zhao, H. (2017). Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, 103–115.
XVI. Maha TEBAA, Said EL HAJII, “Cloud Computing through Homomorphic Encryption”, International Journal of Advancements (IJACT), Vol. 8, No. 3, March – April 2017.
XVII. Ogburn, M., Turner, C., &Dahal, P. (2013). Homomorphic Encryption. Procedia Computer Science, 20, 502–509.
XVIII. PeterPietzuch and Valerio Schiavoni. (2019). Using Trusted Execution Environments for Secure Stream Processing of Medical Data, p1-16.
XIX. R.Hariharan, S. Saran Raj and R. Vimala. (2018). A Novel Approach for Privacy Preservation in Bigdata Using Data Perturbation in Nested Clustering in Apache Spark. Journal of Computational and Theoretical Nanoscience. 15 (.), p1-6.
XX. Rawat, D. B., Doku, R., &Garuba, M. (2019). Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security. IEEE Transactions on Services Computing, 1–18.
XXI. Shiyuan Wang, DivyakantAgrawal and Amr El Abbadi. (2012). Is Homomorphic Encryption the Holy Grail for Database Queries on Encrypted Data, p1-18.
XXII. Sirisha, N., &Kiran, K. V. D. (2018), “Authorization of Data In Hadoop Using Apache Sentry”, International Journal of Engineering and Technology, 7(3), 234-236.
XXIII. Sirisha, N., Kiran, K. V. D., &Karthik, R, (2018), ”Hadoop security challenges and its solution using KNOX”, Indonesian Journal of Electrical Engineering and Computer Science,12(1), 107-116.
XXIV. Sirisha, N., &Kiran, K. V. D. (2017), “Protection of encroachment on bigdata aspects”, International Journal of Mechanical Engineering and Technology, 8(7), 550- 558.
XXV. Tan Soo Fun and AzmanSamsudin. (2016). A Survey of Homomorphic Encryption for Outsourced Big Data Computation. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS. 10 (8), p1-26.
XXVI. T.Ramaporkalai, “Security Algorithms in Cloud Computing”, International Journal of Computer Science Trends and Technology Vol. 5. Issue 2, Mar – Apr 2017.
XXVII. Tourky, D., ElKawkagy, M., &Keshk, A. (2016). Homomorphic encryption the “Holy Grail” of cryptography. 2016 2nd IEEE International Conference on Computer and Communications (ICCC). P1-6.
XXVIII. V. Biksham, D. Vasumathi“Homomorphic Encryption Techniques for securing Data in Cloud Computing: A Survey”, International Journal of Computer Applications Vol.160, February 2017.
XXIX. Wei Dai, Doroz, Y., &Sunar, B. (2014). Accelerating NTRU based homomorphic encryption using GPUs. 2014 IEEE High Performance Extreme Computing Conference (HPEC). P1-6.
XXX. Wei Wang,&Xinming Huang. (2013). FPGA implementation of a large-number multiplier for fully homomorphic encryption. 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013). P1-4.
XXXI. Yu, S. (2016). Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data. IEEE Access, 4, 2751–2763.
XXXII. Yadav, D., Maheshwari, D. H., & Chandra, D. U. (2019). Big Data Hadoop: Security and Privacy. SSRN Electronic Journal. P1-8.
XXXIII. Zhiqiang, G., &Longjun, Z. (2017). Privacy Preserving Data Mining on Big Data Computing Platform: Trends and Future. Lecture Notes on Data Engineering and Communications Technologies, 491–502.

View Download