CFP last date
20 May 2024
Reseach Article

Improvisation of Network Security using Encryption Technique for Big Data Technology

by Geeta Yadav, Sandeep Dalal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 124 - Number 11
Year of Publication: 2015
Authors: Geeta Yadav, Sandeep Dalal
10.5120/ijca2015905647

Geeta Yadav, Sandeep Dalal . Improvisation of Network Security using Encryption Technique for Big Data Technology. International Journal of Computer Applications. 124, 11 ( August 2015), 27-30. DOI=10.5120/ijca2015905647

@article{ 10.5120/ijca2015905647,
author = { Geeta Yadav, Sandeep Dalal },
title = { Improvisation of Network Security using Encryption Technique for Big Data Technology },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 124 },
number = { 11 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 27-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume124/number11/22149-2015905647/ },
doi = { 10.5120/ijca2015905647 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:14:08.795143+05:30
%A Geeta Yadav
%A Sandeep Dalal
%T Improvisation of Network Security using Encryption Technique for Big Data Technology
%J International Journal of Computer Applications
%@ 0975-8887
%V 124
%N 11
%P 27-30
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An era has come where technology plays a very dominant role in every one’s life. Communication is one such aspect which is crucial for any business to flourish on day to day basis. An upcoming trend changer in terms of technology is Big Data technology which makes the organizations achieve competitive edge over others through big data which helps in exploiting values from available data. All organizations prefer networking system for communicating with their consumers or clients at a faster rate compared to earlier years and achieve success in dynamic environment. This requires an infrastructure that can manage exploding volumes of unstructured and structured data in rest as well as in motion and protect data privacy and security. Most critical aspect of big data technology lies in security. Leak of security can prove to be dangerous for any business success considering data confidentiality. In recent years, many scientists and researchers have work towards strengthening of big data’s security aspect. Transferring rate of big data depends on its volume, velocity and variety. This research paper show design of a new algorithm which improve security aspect of big data technology and makes application of big data technology safer to operate by organizations.

References
  1. Michael Cooper & Peter Mell, “Tackling Big Data” NIST Information Technology Laboratory, Computer Security Division, Dept. of commerce, US.
  2. Information Commissioner’s Office, “Big Data and Data Protection”, Version: 1.0, 1998.
  3. Domenico Daniele Bloisi, Luca Iocchi: Image based Steganography and cryptography, Computer Vision theory and applications volume 1, pp. 127-134.
  4. Professor Paul Cheung, “Big Data, Official Statistics and Social Science Research: Emerging Data Challenges” United Nations Statistics Division, 2012.
  5. Kharrazi, M., Sencar, H. T., and Memon, N. Image Steganography: Concepts and practice. In WSPC Lecture Notes Series (2004).
  6. Dave Clemente, “Cyber Security and Global Interdependence: What Is Critical?” The Royal Institute of International Affairs, 2013.
  7. Diaa Salama Abdul Minaam, Hatem M. Abdual-Kader, and Mohiy Mohamed Hadhoud “Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types” International Journal of Network Security, Vol.11, No.2, PP.78-87, Sept
  8. Simar Preet Singh, and Raman Maini “COMPARISON OF DATA ENCRYPTION ALGORITHMS” International Journal of Computer Science and Communication Vol. 2, No. 1, January-June 2011, pp. 125-127
  9. C. Kaufman, R. Perlman, M. Speciner, Network Security, Private Communication in a Public World, Prentice Hall, 1995.
  10. Kudakwashe Zvarevashe, Mainford Mutandavari, Trust Gotora, “A Survey of the Security Use Cases in Big Data” International Journal of Innovative Research in Computer and Communication Engineering Vol. 2, Issue 5, May 2014
  11. Jung-Wen Lo, Min-Shiang Hwang, Chia-Hsin Liu, “An Efficient Key Assignment Scheme for Access Control in a Large Leaf Class Hierarchy” Information Sciences Vol. 181, 2011 pp. 917–925.
  12. Paul Brittan, Shelley Petzer, “Mobile Medical Records”, Link: people.cs.uct.ac.za/spetzer/mobileMedRecords/ results_shelley.html
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography RSA CAESAR Big Data Networking