Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/359488
Title: | Design and Development for Enhancing Secure Big Data Environment with Different Protocols |
Researcher: | Galal Adel Abdo Mohammed Al-Rummana |
Guide(s): | Shinde G. N. |
Keywords: | Computer Science Computer Science Theory and Methods Engineering and Technology |
University: | Swami Ramanand Teerth Marathwada University |
Completed Date: | 2021 |
Abstract: | The data size isbbeingggeneratedeevery second, and it has crossedtthetboundarytof newlinethetusualtdata sizetas a resulttof thetrapidtgrowthtoftcommunicationttechnology. This newlinenotabletincrease istof greattimportancetandthastgained the scholars tinterest. Therefore, the newlinedata increase has revolutionized technology in the current era, which is known as BigtData. newlineNowadays, onetof thetvitaltchallenges istto securetBig Data. newlineData security is represented by cryptography that can be defined as converting newlineplaintexttintotciphertexttand reversing from ciphertext into plaintext. These operations are newlinecalledtencryptiontandtdecryption by using a cipher. newlineConventional cryptography has different standard algorithms like thetAdvancedt newlineEncryptiontStandard (AES) algorithm, andtDatatEncryptiontStandardt (DES) talgorithm. newlineHowever, the security level is not strong in DES compared with AES. However, in terms of newlineproductivity, tyoutmaytfindtthattthetBlowfishtalgorithmtistonetof thetalgorithms thatthave newlineproventtotbeteffectivetfromtunbreakabletencryptiontnon-penetrationtcomparedttotsimilar newlinealgorithmstsuchtas DES and T-DES. As for the Blowfish, we find that it requires less time newlinethantothertalgorithmstsuch as AES, Therefore, Blowfish algorithm was one of the basic newlinealgorithms that were compared in the present thesis. newlineThe algorithms of cryptography provide high level security, yet they do not take newlineinto account the requirements of Big Data, which make such algorithms incompatible with newlineBig Data. Due to the ubiquitous tremendous development of technology, traditional newlinealgorithms must be updated with other algorithms that are compatible with the newlinecharacteristics of Big Data. This thesis is dedicated to provide solutions to this problem newlineXV newlinethrough presenting two algorithms to encrypt big data and one algorithm to authenticate the newlinebig data. newlineIn the first proposed algorithm, a technique has been adopted totsecuretdatatviata newlineproposedtnew blocktcipherttechniquettotprocesstmoretthantonetblocktbytdividingtthettotal newlinesizetof thetblocktinto twotparts, tswapping them, co |
Pagination: | 120p |
URI: | http://hdl.handle.net/10603/359488 |
Appears in Departments: | Department of Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 56.43 kB | Adobe PDF | View/Open |
02_certificate.pdf | 79.22 kB | Adobe PDF | View/Open | |
03_declaration.pdf | 65.7 kB | Adobe PDF | View/Open | |
04_dedication.pdf | 118.24 kB | Adobe PDF | View/Open | |
05_acknowledgment.pdf | 92.49 kB | Adobe PDF | View/Open | |
06_list_of_content.pdf | 207.53 kB | Adobe PDF | View/Open | |
07_list_of_figures.pdf | 112.79 kB | Adobe PDF | View/Open | |
08_list_of_tables.pdf | 56.01 kB | Adobe PDF | View/Open | |
09_abstract.pdf | 127.32 kB | Adobe PDF | View/Open | |
10_chapter 1.pdf | 826.31 kB | Adobe PDF | View/Open | |
11_chapter 2.pdf | 596.76 kB | Adobe PDF | View/Open | |
12_chapter 3.pdf | 661.4 kB | Adobe PDF | View/Open | |
13_chapter 4.pdf | 1.57 MB | Adobe PDF | View/Open | |
14_chapter 5.pdf | 1.28 MB | Adobe PDF | View/Open | |
15_conclusion.pdf | 223.98 kB | Adobe PDF | View/Open | |
16_bibliography.pdf | 418.24 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 133.05 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial 4.0 International (CC BY-NC 4.0).
Altmetric Badge: