Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/359488
Title: Design and Development for Enhancing Secure Big Data Environment with Different Protocols
Researcher: Galal Adel Abdo Mohammed Al-Rummana
Guide(s): Shinde G. N.
Keywords: Computer Science
Computer Science Theory and Methods
Engineering and Technology
University: Swami Ramanand Teerth Marathwada University
Completed Date: 2021
Abstract: The data size isbbeingggeneratedeevery second, and it has crossedtthetboundarytof newlinethetusualtdata sizetas a resulttof thetrapidtgrowthtoftcommunicationttechnology. This newlinenotabletincrease istof greattimportancetandthastgained the scholars tinterest. Therefore, the newlinedata increase has revolutionized technology in the current era, which is known as BigtData. newlineNowadays, onetof thetvitaltchallenges istto securetBig Data. newlineData security is represented by cryptography that can be defined as converting newlineplaintexttintotciphertexttand reversing from ciphertext into plaintext. These operations are newlinecalledtencryptiontandtdecryption by using a cipher. newlineConventional cryptography has different standard algorithms like thetAdvancedt newlineEncryptiontStandard (AES) algorithm, andtDatatEncryptiontStandardt (DES) talgorithm. newlineHowever, the security level is not strong in DES compared with AES. However, in terms of newlineproductivity, tyoutmaytfindtthattthetBlowfishtalgorithmtistonetof thetalgorithms thatthave newlineproventtotbeteffectivetfromtunbreakabletencryptiontnon-penetrationtcomparedttotsimilar newlinealgorithmstsuchtas DES and T-DES. As for the Blowfish, we find that it requires less time newlinethantothertalgorithmstsuch as AES, Therefore, Blowfish algorithm was one of the basic newlinealgorithms that were compared in the present thesis. newlineThe algorithms of cryptography provide high level security, yet they do not take newlineinto account the requirements of Big Data, which make such algorithms incompatible with newlineBig Data. Due to the ubiquitous tremendous development of technology, traditional newlinealgorithms must be updated with other algorithms that are compatible with the newlinecharacteristics of Big Data. This thesis is dedicated to provide solutions to this problem newlineXV newlinethrough presenting two algorithms to encrypt big data and one algorithm to authenticate the newlinebig data. newlineIn the first proposed algorithm, a technique has been adopted totsecuretdatatviata newlineproposedtnew blocktcipherttechniquettotprocesstmoretthantonetblocktbytdividingtthettotal newlinesizetof thetblocktinto twotparts, tswapping them, co
Pagination: 120p
URI: http://hdl.handle.net/10603/359488
Appears in Departments:Department of Computer Science

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File56.43 kBAdobe PDFView/Open
02_certificate.pdf79.22 kBAdobe PDFView/Open
03_declaration.pdf65.7 kBAdobe PDFView/Open
04_dedication.pdf118.24 kBAdobe PDFView/Open
05_acknowledgment.pdf92.49 kBAdobe PDFView/Open
06_list_of_content.pdf207.53 kBAdobe PDFView/Open
07_list_of_figures.pdf112.79 kBAdobe PDFView/Open
08_list_of_tables.pdf56.01 kBAdobe PDFView/Open
09_abstract.pdf127.32 kBAdobe PDFView/Open
10_chapter 1.pdf826.31 kBAdobe PDFView/Open
11_chapter 2.pdf596.76 kBAdobe PDFView/Open
12_chapter 3.pdf661.4 kBAdobe PDFView/Open
13_chapter 4.pdf1.57 MBAdobe PDFView/Open
14_chapter 5.pdf1.28 MBAdobe PDFView/Open
15_conclusion.pdf223.98 kBAdobe PDFView/Open
16_bibliography.pdf418.24 kBAdobe PDFView/Open
80_recommendation.pdf133.05 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial 4.0 International (CC BY-NC 4.0).

Altmetric Badge: