BigCrypt for big data encryption

  • Abdullah Al Mamun
  • , Khaled Salah
  • , Somaya Al-Maadeed
  • , Tarek R. Sheltami

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

as data size is growing up, cloud storage is becoming more familiar to store a significant amount of private information. Government and private organizations require transferring plenty of business files from one end to another. However, we will lose privacy if we exchange information without data encryption and communication mechanism security. To protect data from hacking, we can use Asymmetric encryption technique, but it has a key exchange problem. Although Asymmetric key encryption deals with the limitations of Symmetric key encryption it can only encrypt limited size of data which is not feasible for a large amount of data files. In this paper, we propose a probabilistic approach to Pretty Good Privacy technique for encrypting large-size data, named as "BigCrypt" where both Symmetric and Asymmetric key encryption are used. Our goal is to achieve zero tolerance security on a significant amount of data encryption. We have experimentally evaluated our technique under three different platforms.

Original languageBritish English
Title of host publication2017 4th International Conference on Software Defined Systems, SDS 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages93-99
Number of pages7
ISBN (Electronic)9781538628553
DOIs
StatePublished - 5 Jun 2017
Event4th International Conference on Software Defined Systems, SDS 2017 - Valencia, Spain
Duration: 8 May 201711 May 2017

Publication series

Name2017 4th International Conference on Software Defined Systems, SDS 2017

Conference

Conference4th International Conference on Software Defined Systems, SDS 2017
Country/TerritorySpain
CityValencia
Period8/05/1711/05/17

Keywords

  • Big Data
  • Cloud Computing
  • Cryptography
  • Hadoop
  • Public Key
  • Rijndael
  • RSA

Fingerprint

Dive into the research topics of 'BigCrypt for big data encryption'. Together they form a unique fingerprint.

Cite this