Javascript must be enabled to continue!
Hybrid Encryption for Securing HDFS Data in Big Data Environments
View through CrossRef
Abstract
In the previous era, Conventional encryption schemes that work on file were linked with a lot of processing overhead that negatively impacted performance in the Hadoop framework. But now, With the help of the MapReduce framework or parallel processing method, this paper suggests a unique solution for securing large data and boosting performance: A hybrid encryption technique that combines the Twofish and AES algorithms with the map-reduce framework inside the HDFS (Hadoop Distributed File System) environment. Different conventional methods exist like Twofish + RSA, and AES + Twofish as hybrid encryption that is not decent for dealing with large data, our solution drastically improves performance through parallel encryption by mapper-reducer processes and advances the security of HDFS storage data. In this paper, we use hybrid encryption using AES with Twofish because Twofish provides better data security, and AES is used for optimizing the speed of data encryption, and decryption. Empirical findings validate the suggested approach's effectiveness in protecting private information kept in HDFS and improving performance in terms of speed of encryption ≅ 2–3%, throughput ≅1–2%, and efficiency ≅ 1–2% parameters. This work enhances the performance and reduces the risks associated with unwanted access to important data assets by data security in HDFS-based systems.
Title: Hybrid Encryption for Securing HDFS Data in Big Data Environments
Description:
Abstract
In the previous era, Conventional encryption schemes that work on file were linked with a lot of processing overhead that negatively impacted performance in the Hadoop framework.
But now, With the help of the MapReduce framework or parallel processing method, this paper suggests a unique solution for securing large data and boosting performance: A hybrid encryption technique that combines the Twofish and AES algorithms with the map-reduce framework inside the HDFS (Hadoop Distributed File System) environment.
Different conventional methods exist like Twofish + RSA, and AES + Twofish as hybrid encryption that is not decent for dealing with large data, our solution drastically improves performance through parallel encryption by mapper-reducer processes and advances the security of HDFS storage data.
In this paper, we use hybrid encryption using AES with Twofish because Twofish provides better data security, and AES is used for optimizing the speed of data encryption, and decryption.
Empirical findings validate the suggested approach's effectiveness in protecting private information kept in HDFS and improving performance in terms of speed of encryption ≅ 2–3%, throughput ≅1–2%, and efficiency ≅ 1–2% parameters.
This work enhances the performance and reduces the risks associated with unwanted access to important data assets by data security in HDFS-based systems.
Related Results
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
Secure Cloud Data with Attribute-based Honey Encryption
Secure Cloud Data with Attribute-based Honey Encryption
Abstract
Encryption is a Technique to convert plain text into Cipher text, which is unreadable without an appropriate decryption key. Hadoop is a platform to process and st...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Control the Sensitivity of the Encryption Key to Ensure the Security of Big Data
Control the Sensitivity of the Encryption Key to Ensure the Security of Big Data
With the increasing technological development that has led to the complexity of big data systems, the importance lies in the challenge that ensures the security of sensitive inform...
Automatic Selective Encryption of DICOM Images
Automatic Selective Encryption of DICOM Images
Securing DICOM images is essential to protect the privacy of patients, especially in the era of telemedicine and eHealth/mHealth. This increases the demand for rapid security. Neve...
O084 Adipose-derived stem cells attenuate the induction of tissue destructive and inflammatory fibroblasts by ionising radiation
O084 Adipose-derived stem cells attenuate the induction of tissue destructive and inflammatory fibroblasts by ionising radiation
Abstract
Introduction
Radiation-Induced Fibrosis (RIF) is a common complication of radiotherapy with no effective treatment, cau...


