BigCrypt for Big Data Encryption
Title | BigCrypt for Big Data Encryption |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Mamun, A. Al, Salah, K., Al-maadeed, S., Sheltami, T. R. |
Conference Name | 2017 Fourth International Conference on Software Defined Systems (SDS) |
Date Published | may |
Keywords | Asymmetric Encryption, asymmetric encryption technique, Big Data, big data encryption, BigCrypt, cloud computing, cloud storage, compositionality, cryptography, data protection, Encryption, Hacking, Hadoop, Human Behavior, Metrics, Pretty Good Privacy technique, private information, probabilistic approach, probability, pubcrawl, Public key, Receivers, resilience, Resiliency, Rijndael, RSA, Servers, Software, storage management, symmetric key encryption, zero tolerance security |
Abstract | as data size is growing up, cloud storage is becoming more familiar to store a significant amount of private information. Government and private organizations require transferring plenty of business files from one end to another. However, we will lose privacy if we exchange information without data encryption and communication mechanism security. To protect data from hacking, we can use Asymmetric encryption technique, but it has a key exchange problem. Although Asymmetric key encryption deals with the limitations of Symmetric key encryption it can only encrypt limited size of data which is not feasible for a large amount of data files. In this paper, we propose a probabilistic approach to Pretty Good Privacy technique for encrypting large-size data, named as ``BigCrypt'' where both Symmetric and Asymmetric key encryption are used. Our goal is to achieve zero tolerance security on a significant amount of data encryption. We have experimentally evaluated our technique under three different platforms. |
URL | https://ieeexplore.ieee.org/document/7939147/ |
DOI | 10.1109/SDS.2017.7939147 |
Citation Key | mamun_bigcrypt_2017 |
- Pretty Good Privacy technique
- zero tolerance security
- symmetric key encryption
- storage management
- Software
- Servers
- RSA
- Rijndael
- Resiliency
- resilience
- Receivers
- Public key
- pubcrawl
- probability
- probabilistic approach
- private information
- Asymmetric Encryption
- Metrics
- Human behavior
- Hadoop
- Hacking
- encryption
- Data protection
- Cryptography
- Compositionality
- cloud storage
- Cloud Computing
- BigCrypt
- big data encryption
- Big Data
- asymmetric encryption technique