Open Access Open Access  Restricted Access Subscription or Fee Access

Analysis and Design of Efficient HDFS Data Encryption Algorithm: A Review

Shivani Awasthi, Narendra Kohli

Abstract


Large amounts of structured and unstructured data can be handled using big data. Companies utilize Big Data for a variety of purposes, including improving customer service and taking other profitable actions. Big Data gives benefits such as better customer insight, improved performance, more insight full market performance, agile supply chain management, data-driven innovation, smart recommendations, and targeting to the business. Hadoop is a well-built technology which mainly used for the distributed processing and storage of a large amount of data. Hadoop itself does not provide any security so the encryption zone is used for security purposes, but this is a weakness of this strategy from the attacker’s point of view. The primary objective of this research is to look into the different encryption techniques utilized in the Hadoop Distributed File System. In this paper, we have discussed ‘data at rest’ HDFS data encryption algorithm. We choose the efficient algorithm that gives better performance at the storage level, when working with big data on the cloud. Firstly, we have discussed the introduction part to explain the paper’s background, review of the literature to discuss the theory behind the research, research methodology, comparative analysis, and last conclusion and future work.


Full Text:

PDF

References


S Sagiroglu, D Sinanc - 2013 international conference on collaborative technologies and systems,ieeexplore.ieee.org

A Labrinidis, HV Jagadish - Proceedings of the VLDB Endowment, 2012 Challenges and Opportunity Of Big Data, dl.acm.org

G George, MR Haas, A Pentland - Academy of management journals,2014,Big Data and Challenges

P Géczy - The Macrotheme Review, 2014, Big Data and Characteristics - macrotheme.com

A Trnka - European Journal of Science and Theology, 2014 Big Data analysis - ejst.tuiasi.ro

N Koseleva, G Ropaite - Procedia Engineering, Big Data in building energy efficiency: Understanding the Big data and main challenges 2017 – Elsevier

K Singh, R Kaur - 2014 IEEE International Advance Computing, Hadoop: addressing challenges ofBig data, ieeexplore.ieee.org

A Erraissi, A Belangour, A Tragha - International Journal of, A Big data building blocks comparativeStudy 2017 - researchgate.net

VB Bobade - Int. Res. J. Eng. Technol, Survey paper on big data and Hadoop 2016 - academia.edu

RP Padhy - International Journal of Cloud Computing and Services, Big Data Processing with Hadoop MapReduce in cloud systems 2013 - academia.edu

MR Ghazi, D Gangodkar - Procedia Computer Science, Hadoop MapReduce and HDFS: a developer Perspective 2015 – Elsevier

VK Jain Big data and Hadoop 2017 - books.google.com

SV Phaneendra, EM Reddy - 12th IEEE/IFIP Network Operations &, Big Data solution for RDBMS Problems: A survey 2013 - academia.edu

K Noh, D Lee - Indian Journal of science and, Big Data platform design and implementation model2015 - sciresol.s3.us-east-2.amazonaws.

GS Bhathal, A Singh - Array, Big Data Hadoop framework vulnerabilities, security issues and attack2019 – Elsevier

B Spivey, J Echeverri - Hadoop Security protecting your Big Data Platform 2015 –books.google.com

A Alharthi, V Krotov, M Bowman - Business Horizons, Addressing barriers to Big Data Platform 2017 – Elsevier

B Saraladevi, N Pazhaniraja, PV Paul - Procedia computer, Big Data and Hadoop a security Perspective 2015 – Elsevier

MR Jam, LM Khanli, MS Javan - 2014 4th International, A survey on Security of Hadoop 2014 – ieeexplore.ieee.org

AA Cardenas, PK Manadhata - IEEE Security & Privacy, Big Data analytics for Security 2013 – ieeexplore.ieee.org

Geeks for geeks (06 May, 2019). Difference between Hadoop 1 and Hadoop 2 [Online]. Available from https://www.geeksforgeeks.org/difference-between-hadoop-1-and-hadoop-2/

Geeks for Geeks (30 Jun, 2020). Difference Between Hadoop 2.x vs Hadoop 3.x [online]. Available from https://www.geeksforgeeks.org/difference-between-hadoop-2-x-vs-hadoop-3-x/?ref=rp

R Bhanot, R Hans - International Journal of Security and Its Applications, A Review and Comparitive analysis of various encryption algorithms 2015 - earticle.net

MF Mushtaq, S Jamel, AH Disina - Journal of Advanced computer science and applications, A Survey on Cryptographic Encryption Algorithm 2017 - researchgate.net

RE Smith Internet Cryptography 1997 - dl.acm.org

P Patil, P Narayankar, DG Narayan… - Procedia Computer Science, A Comprehensive Evolution Of Cryptographic Algorithm: DES, 3DES, RSA and BlowFish 2016 – Elsevier

P Mahajan, A Sachdeva - Global Journal of Computer Science and Technology, A study of Encryption Algorithms AES, DES and RSA for Security 2013 - Computerresearch.Org

AK Mandal, C Parakash, A Tiwari – 2012 IEEE Students ' conference on electrical electronics and computer science DES and AES Performance evolution of Cryptographic algorithm, ieeexplore.ieee.org

H. Mahmoud, A. Hegazy and M. H. Khafagy 2018 An approach for big data security based On Hadoop distributed file system International Conference on Innovative Trends in Computer Engineering (ITCE) pp 109-114

A Sunder, N Shabu, T Remya Nair - Ubiquitous Intelligent Systems, Securing Big Data in Hadoop using Hybrid Encription 2022 – Springer

E Aromataris, A Pearson - AJN The American Journal of Nursing, Systematic Review: An Overview 2014 - journals.lww.com

D. Moher, et al. 2010 Preferred reporting items for systematic reviews and meta analyses:The PRISMA statement International Journal of Surgerypp.336-341

AA Selçuk - Turkish Archives of Otorhinolaryngology, A guide for Systematic Review: PRISMA 2019 – ncbi.nlm.nih.gov

S. Suganya and S. Selvamuthukumaran 2018 Hadoop Distributed File System Security - A Review International Conference on Current Trends towards Converging Technologies (ICCTCT) pp.1-5

B. Lakhe 2014 Practical Hadoop Security (New York:Apress)

R. R. Parmar, S. Roy, D. Bhattacharyya, S. K. Bandyopadhyay, and T.-H. Kim 2017 Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions IEEE Access vol. 5 pp.7156–7163

J. Hurwitz and A. Nugent 2013 Big Data for Dummies: a Wiley Brand. Hoboken, NJ: John Wiley and Sons.

A. Holmes 2013 Hadoop in Practice (Shelter Island: Manning Publications)

B. Spivey and J. Echeverria 2015 Hadoop Security (OReillyMedia)

M. M. Shetty and D. H. Manjaiah 2006 Data security in Hadoop distributed file system 2016 International Conference on Emerging Technological Trends (ICETT) pp.1-5

W. Stallings 2006 Cryptography and Network Security: Principles and Practice

L. Miller and P. H. Gregory 2016 CISSP for Dummies The 8th Engineering International Conference 2019. Journal of Physics: Conference Series 1444 (2020) 012012 IOP Publishing doi:10.1088/1742-6 6596/1444/1/012018

S. Vaudenay 2010 A Classical Introduction to Cryptography: Applications for Communications Security (New York: Springer)

S. Kumarsinha, M. Shrivastava, and K. K. Pandey 2013 A New Way of Design and Implementation of Hybrid Encryption to Protect Confidential Information from Malicious Attack in Network International Journal of Computer Applications vol. 80 no. 3 pp.48–55

WS Kareem, RZ Yousif - Indonesian Journal of Electrical Engineering and Computer Science, An approach of Data Confidentiality in Hadoop 2020 - researchgate.net

K. Sekar and M. Padmavathamma 2016 Comparative Study of Encryption Algorithm over Big Data in Cloud Systems International Conference on Computing for Sustainable Global Development (INDIACom) pp. 1571-1574

B. Padmavathi and S. Ranjitha Kumari 2013 A Survey on Performance Analysis of DES, AES, and RSA Algorithm along with LSB Substitution Technique International Journal of Science and Research (IJSR) vol.2 pp. 170–174

R. Arora and A. Parashar 2013 Secure User Data in Cloud Computing Using Encryption Algorithms International Journal of Engineering Research and Applications (IJERA) vol. 3 pp. 1922–1926

S. H. Kamaruzaman, W. N. S. W. Nik, M. A. Mohamed, and Z. Mohamad 2018 Design and Implementation of Data-at-Rest Encryption for Hadoop International Journal of Engineering & Technology vol. 7 p.54

R. Chehal and K. Singh 2012 Efficiency and Security of Data with Symmetric Encryption Algorithms International Journal of Advanced Research in Computer Science and Software Engineering vol. 2 pp. 472– 275

D. Elminaam, H. Kader, and M. Hadhoud 2008 Performance Evaluation of Symmetric Encryption Algorithms IJCSNS International Journal of Computer Science and Network Security vol. 8 pp. 280–286

S. Pavithra and E. Ramadevi 2012 Performance Evaluation of Symmetric Algorithms Journal of Global Research in Computer Science vol. 3 pp.43–45

A. Jeeva, V. Palanisamy, and K. Kanagaram 2012 Comparative Analysis of Performance Efficiency And Security Measures Of Some Encryption Algorithms International Journal of Engineering Research and Applications (IJERA) vol. 2 pp.3033–3038

A. Kumar, S. Jakhar, and S. Makkar 2012 Comparative Analysis between DES and RSA Algorithm International Journal of Advanced Research in Computer Science and Software Engineering vol. 2 pp. 386– 390

K. Kalaiselvi and A. Kumar 2015 Implementation Issues and Analysis of Cryptographic Algorithms based on Different Security Parameters International Conference on Current Trends in Advanced Computing pp.23–28

Youngho Song, Young-Sung Shin, Miyoung Jang and Jae-Woo Chang 2017 Design and implementation of HDFS data encryption scheme using ARIA algorithm on Hadoop 2017 IEEE International Conference on Big Data and Smart Computing (BigComp) pp.84-90

C. Yang, W. Lin, and M. Liu 2013 A Novel Triple Encryption Scheme for Hadoop-Based Cloud Data Security 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies

H.-Y. Lin, S.-T. Shen, W.-G. Tzeng, and B.-S. P. Lin 2012 Toward Data Confidentiality via Integrating Hybrid Encryption Schemes and Hadoop Distributed File System 2012 IEEE 26th International Conference on Advanced Information Networking and Applications

J. Cohen and S. Acharya 2013 Towards a Trusted Hadoop Storage Platform: Design Considerations of an AES Based Encryption Scheme with TPM Rooted Key Protections 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing pp.444-451

W Ren, Z Miao - 2010 SecondInternational Conference on 2010 A hybrid encryption algorithm based on DES and RSA in bluetooth communication

G Kapil, A Agrawal, A Attaallah, A Algarni PeerJ Computer, 2020 Attribute based honey encryption Algorithm for securing big data: Hadoop distributed file system perspective

W Heping Conference on Computer Systems, Electronics, 2017 Research on Hyperchaotic Encryption Algorithm based on Map Reduce

TS Fun, A Samsudin, S Alias – 2020 Securing Big Data Processing Using Homomorphic Encryption

C Aatish, MAU Einstein - 2021 8th IEEE International, 2021 Performance Enhancing Secure Erasure Code (PESEC) for Cloud Storage using Random N Blocks Encryption

U Narayanan, V Paul, S Joseph - Indonesian Journal of Elctrical Engineering and Computer Science, A Light Weight Encryption Over Big Data Information Stockpiling In Cloud 2020 - pdfs.semanticscholar.org 66. L Teng, H Li, S Yin, Y Sun – International. Journal Network Security, A Modified Advanced Encryption Standard for Data Security 2020 - isrc.ccs.asia.edu.tw

O Trabelsi, L Sfaxi, R Robbana - International Conference on E-Business, A Secure Distributed Hashed Based Encryption Mode of Operation Suited for Big Data Systems, 2020 – Springer

T Mohanraj, R Santhosh - Computer Assisted Methods in Engineering and Scienec, Hybrid Encryption Algorithm for Big Data Security in Hadoop disytributed File System, 2022 - cames.ippt.pan.pl

A Altigani, S Hasan, B Barry, S Naserelde - IEEE A Polymorphic Advanced Encryption Standard: A Novel Approach 2021 - ieeexplore.ieee.org

NASA. Modis Moderate Resolution Imaging Spectroradiometer. Iceberg B-22A [Online]. Available from https://modis.gsfc.nasa.gov/


Refbacks

  • There are currently no refbacks.