A New Efficient Method for Information Security in Hadoop
DOI:
https://doi.org/10.25212/lfu.qzj.7.2.42الكلمات المفتاحية:
Big Data, Hadoop, RSA, Rabin, Cryptography.الملخص
A significant difficulty in developing a specialized Hadoop for cloud computing, and to tackle this problem, an anticipated safe cloud computing system has been built. Hadoop was utilized in this field to develop and improve the security of handling and gathering data from users. Other Apache Big Data technologies include Hadoop, which uses the Map-Reduce architecture to prepare enormous amounts of data. Hadoop is one of the most significant tools for dealing with Big Data issues. Data storage security is one of the most challenging tasks, and the Hadoop distributed file system (HDFS) lacks a well-defined security policy. The proposed technique encrypts all of the files stored in HDFS with public-key cryptography to safeguard them all. The acquired data is encrypted in HDFS during the data collecting process using the proposed data encryption method (Rabin RZ). The proposed method is compared to the Paillier method and the default Rivest–Shamir–Adleman (RSA) cryptosystem, respectively. When compared to other cryptosystems, the proposed method has a more powerful computational complexity and a smaller latency than the alternatives.
التنزيلات
المراجع
Abdiaziz Omar Hassan, Abdulkadir Abdulahi Hasan. (2021). Simplified Data Processing for Large Cluster: A MapReduce and Hadoop Based Study. Advances in Applied Sciences, 6(3), 43-48.
Amin Salih Mohammed, Shahab Wahhab Kareem, Ahmed khazal al azzawi and M. Sivaram. (2018, 10 12). Time Series Prediction Using SRE- NAR and SRE- ADALINE. Jour of Adv Research in Dynamical & Control Systems.
Bhardwaj, A., Singh, V. K., Vanraj, & Narayan, Y. (December 17-20, 2015 (pp. 1-5)). Bhardwaj, A., Singh, V. K., Vanraj, & Analyzing BigData with Hadoop cluster in HDInsight azure Cloud. Annual IEEE India Conference (INDICON). New Delhi, India.
Cao, Y., Dhahad, H. A., Alsharif, S., Sharma, K., El-Shafay, A. S., & Kh, T. I. (2022). Development of a MSW-fueled sustainable co-generation of hydrogen and electricity plant for a better environment comparing PEM and alkaline electrolyzers. Sustainable Cities and Society, 81, 103801.
Chen, J. (2021). Encryption Algorithm of Automatic Single Chip Computer and Embedded System Based on Big Data. Journal of Physics: Conference Series , 2037.
Dubey, A. K., Jain, V., & Mittal, A. P. (2015). Stock Market Prediction using Hadoop Map-Reduce Ecosystem. 2nd International Conference on Computing for Sustainable Global Development (hal. 616-621). IEEE.
Galal A. Al-Rummana, Abdulrazzaq H. A. Al-Ahdal, G. N. Shinde. (2021). Faster Big Data Encryption Technique Using Key Generation. International Journal of Advanced Trends in Computer Science and Engineering , 3(10), 1776 - 1783.
Ghiasvand, A., Noori, S. M., Suksatan, W., Tomków, J., Memon, S., & Derazkola, H. A. (2022). Effect of Tool Positioning Factors on the Strength of Dissimilar Friction Stir Welded Joints of AA7075-T6 and AA6061-T6. Materials, 15(7), 2463.
Hadeer Mahmoud, Abdelfatah Hegazy, and Mohamed H. Khafagy. (2018). An approach for Big Data Security based on Hadoop Distributed File system. International Conference on Innovative Trends in Computer Engineering (ITCE 2018). Aswan : Aswan University.
Hsiao, F.-H. (2018). Chaotic synchronization cryptosystems combined with RSA encryption algorithm. Fuzzy Sets and Systems, 342, 109-137.
J. Wu, J. Shi, and T. Li. (2020). A novel image encryption approach based on a hyperchaotic system, pixel-level filtering with variable kernels, and DNA-level diffusion. Entropy,, 22(5).
K. Sekar and M. Padmavathamma,. (2016). Comparative study of encryption algorithm over big data in cloud systems. 3rd International Conference on Computing for Sustainable Global Development (INDIACom), (hal. 525 - 528). IEEE .
KAREEM, S. W. (2020). Secure Cloud Approach Based on Okamoto-Uchiyama Cryptosystem. Journal of Applied Computer Science & Mathematics, 14(1), 9-13.
M. Elsayed and M. Zulkernine,. (2018). Towards Security Monitoring for Cloud Analytic Applications. IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity),, 6, hal. 45-56. Omaha, NE, USA.
Masoumeh RezaeiJam, Leili Mohammad Khanli, Mohammad Kazem Akbari, and Morteza Sargolzaei Javan. (2014 ). A Survey on Security of Hadoop. 4th International Conference on Computer and Knowledge Engineering (ICCKE) (hal. 716-721). IEEE.
Mohammed, A. G. (2021). A Study of Scheduling Algorithms in LTE-Advanced HetNet. QALAAI ZANIST JOURNAL, 6(3), 945-968.
P. Merla and Y. Liang. (2017). Data analysis using hadoop MapReduce environment. IEEE International Conference on Big Data (Big Data) (hal. 4783-4785). Boston: IEEE.
Priyank Jain, Manasi Gyanchandani and Nilay Khare. (2016). Big data privacy: a technological perspective and review. Journal of Big Data, 25(3).
Poongodi, M., Bourouis, S., Ahmed, A. N., Vijayaragavan, M., Venkatesan, K. G. S., Alhakami, W., & Hamdi, M. (2022). A Novel Secured Multi-Access Edge Computing based VANET with Neuro fuzzy systems based Blockchain Framework. Computer Communications.
Raghad Z. Yousif1, Shahab W. Kareem, Shadan M. Abdalwahid. (2020). Enhancing Approach for Information Security in Hadoop. Polytechnic Journal. 2020., 10(1), 808.
Raghad Z.Yousif, Shahab.Wahhab Kareem, Ammar. O.Hasan. (2016). Design Security System Based on AES and MD5 for Smart Card. charmo university. Sulaimanyia: Charmo university.
Riguang Lin and Sheng Li . (2021). An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm. Security and Communication Networks , 2021.
Roojwan S. Ismael, Rami S. Youail, Shahab Wahhab Kareem. (2014). Image Encryption by Using RC4 Algorithm. EUROPEAN ACADEMIC RESEARCH, Vol. II(Issue 4), 5833-5839.
Saliha, R. K. (2022). Optimizing RSA cryptosystem using Hermite polynomials. Int. J. Nonlinear Anal. Appl., 13(1), 955-961.
Sami H. Ismael, Shahab Wahhab Kareem, Firas H. Almukhtar. (2020, 14 1). Medical Image Classification Using Different Machine Learning Algorithms. AL-Rafidain Journal of Computer Sciences and Mathematics, hal. 135-147.
Sardar M. R. K Al-Jumur, Shahab Wahhab Kareem, Raghad z.yousif. (2021, 22 2). Predicting temperature of erbil city applying deep learning and neural network. Indonesian Journal of Electrical Engineering and Computer Science, hal. 944-952.
Seema Maitrey and C.K. Jha. (2015). MapReduce: Simplified Data Analysis of Big Data. Procedia Computer Science, 57(1), 563-571.
Shadan Mohammed Jihad Abdalwahid, Raghad Zuhair Yousif, Shahab Wahhab Kareem. (2019, 15). Enhancing approach using hybrid pailler and RSA for information security in bigdata. Applied Computer Science.
Shadan Mohammed Jihad ABDALWAHID, Raghad Zuhair YOUSIF, Shahab Wahhab KAREEM. (2019). ENHANCING APPROACH USING HYBRID PAILLER AND RSA FOR INFORMATION SECURITY IN BIGDATA. Applied Computer Science, 15(4), 63-74.
shadan MohammedJihad abdalwahid Shahab Wahhab Kareem, Raghad Zuhair Yousif. (2020, 20 3). An approach for enhancing data confidentiality in Hadoop. Indonesian Journal of Electrical Engineering and Computer Science, hal. 1547-1555.
Shahab Kareem, Mehmet C Okur. (2018). Bayesian Network Structure Learning Using Hybrid Bee Optimization and Greedy Search. Çukurova University. Adana, Turkey.
Shahab Wahhab Kareem and Mehmet Cudi Okur. (2020). Evaluation of Bayesian Network Structure Learning Using Elephant Swarm Water Search Algorithm. Dalam S. C. Shi, Handbook of Research on Advancements of Swarm Intelligence Algorithms for Solving Real-World Problems (hal. 139-159). Chapter 8: IGI Global.
Shahab Wahhab Kareem, Raghad Zuhair Yousif, Shadan Mohammed Jihad Abdalwahid. (2020, 20 3). An approach for enhancing data confidentiality in hadoop. Indonesian Journal of Electrical Engineering and Computer Science, hal. pp. 1547~1555.
Shahab Wahhab Kareem, Yahya Tareq Hussein. (2017). Survey and New Security methodology of Routing Protocol in AD-Hoc Network. QALAAI ZANIST JOURNAL. Erbil.
Sharma, A., Miran, A., & Ahmed, Z. R. (2022). The 3D Facemask Recognition: Minimization for Spreading COVID-19 and Enhance Security. In ICT Analysis and Applications (pp. 619-637). Springer, Singapore.
Tang, Z. (2020). A Preliminary Study on Data Security Technology in Big Data Cloud Computing Environment. International Conference on Big Data & Artificial Intelligence & Software Engineering (ICBASE (hal. 437–442). Bangkok, Thailand: EIDWT .
Zahari Mahad and Muhammad Rezal Kamel Ariffin. (2015). Rabin-RZ: A New Efficient Method to Overcome Rabin Cryptosystem Decryption Failure Problem. International Journal of Cryptology Research, 5(1), 11-20.
التنزيلات
منشور
كيفية الاقتباس
إصدار
القسم
الرخصة
الحقوق الفكرية (c) 2022 Shadan Muhammed Jihad Abdalwahid, Banar Fareed Ibrahim, Sami Hassan Ismael, Shahab Wahhab Kareem
هذا العمل مرخص بموجب Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Qalaai Zanist Journal allows the author to retain the copyright in their articles. Articles are instead made available under a Creative Commons license to allow others to freely access, copy and use research provided the author is correctly attributed.
Creative Commons is a licensing scheme that allows authors to license their work so that others may re-use it without having to contact them for permission