2017
DOI: 10.1371/journal.pone.0168207
|View full text |Cite|
|
Sign up to set email alerts
|

Chaos-Based Simultaneous Compression and Encryption for Hadoop

Abstract: Data compression and encryption are key components of commonly deployed platforms such as Hadoop. Numerous data compression and encryption tools are presently available on such platforms and the tools are characteristically applied in sequence, i.e., compression followed by encryption or encryption followed by compression. This paper focuses on the open-source Hadoop framework and proposes a data storage method that efficiently couples data compression with encryption. A simultaneous compression and encryption… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 20 publications
(14 citation statements)
references
References 44 publications
0
14
0
Order By: Relevance
“…This paper [26] introduced a framework based on a masking pseudorandom key stream to increase the encryption quality and provide robust encryption security & compression during read and write operation when integrated in HDFS. Also, the researchers have proposed a scheme for Hadoop using simultaneous compression and encryption to solve the implementation issues.…”
Section: Chaos-based Simultaneous Compression and Encryption For Hadoopmentioning
confidence: 99%
“…This paper [26] introduced a framework based on a masking pseudorandom key stream to increase the encryption quality and provide robust encryption security & compression during read and write operation when integrated in HDFS. Also, the researchers have proposed a scheme for Hadoop using simultaneous compression and encryption to solve the implementation issues.…”
Section: Chaos-based Simultaneous Compression and Encryption For Hadoopmentioning
confidence: 99%
“…[18][19][20] Generally, chaotic systems are employed to construct proficient cryptosystems. 21 -, 24 The distinguishing qualities of the chaotic maps are practicable for cryptography, for instance, randomness, mingling, and sensitivity; [25][26][27] all of these properties make chaotic maps a suitable option for achieving Shannon's concept of good practical secrecy systems. In addition to the theoretical study of the chaos, its potential applications in cryptosystem-based S-box have also been widely explored, 23,[28][29][30][31] Toward this end, chaotic dynamics was first employed in the construction of S-box by Jakimoski and Kocarev.…”
Section: Related Workmentioning
confidence: 99%
“…Security leak was controlled by performing the Apache Sentry for access control, triple encryption of knowledge using RSA, DES, and IDEA algorithms, was proposed in protecting classification system trusted fully homomorphic encryption. Parmar et al (Parmar et al, 2017) proposed a brand new method which will be utilized to secure Hadoop, an economical technique that works within the Hadoop cluster to offer it 3-D security Usama and Zakaria (Usama and Zakaria, 2017) proposed encryption and compression for Hadoop. HADOOP does not combine security tools.…”
Section: Introductionmentioning
confidence: 99%