HYBRID ENCRYPTION OF BIG DATA SECURITY USING IMPROVED ELLIPTIC CURVE CRYPTOGRAPHY
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.9, No. 10)Publication Date: 2020-10-30
Authors : B. Arputhamary; A. Benita;
Page : 83-94
Keywords : Bid Data; Cryptography; Encryption; Decryption; Elliptic Curve Cryptography (ECC); AES;
Abstract
In terms of identifying the attacker, the Big Data environment helps resolving cyber security problems. There are big data security concerns as well as safety issues that the analyst must understand. The security of confidential data has long been a serious concern, and as a result, data security is in huge demand. Data is considered an important aspect of an asset and must be protected. Data Protection comprises data integrity, data authenticity, data confidentiality, and then some. Data is prone to possible security risks despite several measures for protecting data including encryption, decryption, and compression. Cryptography is an art and science that encodes messages to make them unreadable in order to achieve secrecy. The data is translated from a readable format known as plain text to an unreadable format known as cypher text, and vice versa. Based on various techniques, there are different types of cryptographic algorithms proposed over the years. These methods use different techniques to implement cryptography's fundamental features, i.e. to conceal the data from unauthorised users. A hybrid cryptographic technique is proposed in this paper to enhance data protection during network transmission, and its implementation and results are published. The proposed secure cryptographic technique promises to use the Enhanced ECC and AES technologies to include the highly secure cypher generation technique. Using JAVA technology, the implementation of the proposed technique is given and its efficiency in terms of space and time complexity is calculated and compared with conventional ECC cryptography. During comparative performance analysis, the proposed cryptographic technique established the successful and enhanced cypher text.
Other Latest Articles
- THE EFFECT OF SERVICE QUALITY ON CUSTOMER SATISFACTION TOWARDS LOYALTY AND HAPPINESS IN SHARED SERVICE COMPANY: A STUDY ON GLOBAL BUSINESS SERVICE HUB IN MALAYSIA
- K-Means++ Clustering Using MapReduce Framework for Large Datasets
- PHYTOCHEMICAL SCREENING AND ANTIBACTERIAL ACTIVITY OF LEAF EXTRACT OFMYRTUSCOMMUNIS L. (ADESS)
- PHYTOCHEMICAL SCREENING AND STUDY OF ANTIBACTERIAL ACTIVITY OF ROASTED AND UNROASTED SOAKED WHITE LUPINUS ALBUS SEED GROWS IN AWI ZONE, ETHIOPIA
- CORRELATION OF BODY MASS INDEX AND LIFESTYLE PATTERNSWITH ACADEMIC ACHIEVEMENT AMONG FEMALE HIGH SCHOOL STUDENTS IN AL MADINAH, KSA: A POPULATION-BASED STUDY
Last modified: 2020-10-26 16:56:18