Development of Fragmentation to Create a Big Data Security Framework using Blockchain Innovation

Authors

  • Shrihari M. R. Associate Professor, Dept of CSE, SJC Institute of Technology, VTU, Karnataka, India
  • Ajay N. Assistant Professor, Dept of CSE, SJC Institute of Technology, VTU, Karnataka, India.
  • Shwetha B. V. Assistant Professor, Dept of CSD, SJC Institute of Technology, VTU, Karnataka, India., VTU, Karnataka, India
  • Mahesh M. R. Assistant Professor, Dept of ECE Nagarjuna College of Engineering and Technology, VTU, Karnataka, India
  • Vikas Reddy S. Associate Professor, Dept of AI&ML, SJC Institute of Technology, VTU, Karnataka, India
  • Mohan H. S. Professor, RNS Institute of Technology, VTU, Karnataka, India
  • Muniraju M. Assistant Professor, Dept of AI&ML, SJC Institute of Technology, VTU, Karnataka, India.

Keywords:

Blockchain, Big data security, Auditing, Fragmentation, Access control

Abstract

The volume and diversity of data created by both humans and robots is increasing. Although the exponential growth, the tools and technology implemented to control huge information volume are not designed to fulfill protection and data security standards. Furthermore, the majority of Current big data security systems are provided by a centralised third party, making them subject to a wide variety of security risks. This reading provides a novel large information security solution driven by Blockchain technology that integrates fragmentation, encryption, and access control mechanisms. Our suggested fragmentation method considers the data owner's request for encryption to be included in the fragmentation progression. Moreover, data pieces will be stored in the dispersed way provided by the big data atmosphere, adding an extra layer of data security. We want to improve large data security with suitable expense and eliminate encryption overhead for non-sensitive and low-sensitive data sections in classify to provide an ideal security clarification. We show the consequences of our developed approaches to demonstrate that the overheads (in terms of computing time) caused by our system are insignificant in comparison to the security and confidentiality improvements it provides.

Downloads

Download data is not yet available.

References

Kassen M. ``Blockchain and E-government innovation: Automation of public information processes,'' Inf. Syst., vol. 103, Jan. 2022,Art. no. 101862.

Manzoor A. A. Braeken, S. S. Kanhere, M. Ylianttila, and M. Liyanage,``Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain,'' J. Netw. Comput. Appl., vol. 176,Feb. 2021, Art. no. 102917.

Deepa. N., Q. Pham, D. C. Nguyen, S. Bhattacharya, P. B. T. R. Gadekallu,P. K. R. Maddikunta, F. Fang, and P. N. Pathirana, ``A survey on blockchain for big data: Approaches, opportunities, and future directions,'' CoRR,vol. abs/2009.00858, pp.1-4, Oct. 2020.

Xiao Y., N. Zhang, W. Lou, and Y. T. Hou,``A survey of distributed consensus protocols for blockchain networks,'' IEEE Commun. Surveys Tuts., vol. 22, no. 2, pp. 1432-1465, 2nd Quart., 2020.

J.Wu,G.Jiang J. Li, and T.Srikanthan, "`Blockchain-based public auditing for big data in cloud storage,'' Inf. Process. Manage.,vol. 57, no. 6, Nov. 2020, Art. no. 102382.

N Ajay; H S Mohan; B V Shwetha; M R Shrihari,” Access Control Framework in the Cloud based on Multi-Blockchain with Light Privacy Protection” ICDCECE, 23-24 April 2022.

Z. Yang H. Yu, , and R. O. Sinnott, ``Decentralized big data auditing for smart city environments leveraging blockchain technology,'' IEEE Access, vol. 7, pp. 6288-6296, 2019.

M R Shrihari, Manjunath T.N, R.A. Archana and Hegadi, Ravindra S,” Development of Security Clustering Process for Big Data in Cloud”, ICT Analysis and Applications ,Lecture Notes in Networks and Systems book series (LNNS,volume 154) 16 December 2020..

Yang and Z. Liang Z., ``Automated identication of sensitive data from implicit user specication,'' Cybersecurity, vol. 1, no. 1, pp. 1-15, Dec. 2018.

Lv, S. Zhu D., H. Xu, and R. Liu, ``Areview of big data security and privacy protection technology,'' in Proc. IEEE 18th Int. Conf. Commun. Technol. (ICCT), Oct. 2018, pp. 1082-1091.

Santos and N. G. L. Masala, ``Big data security on cloud servers using data fragmentation technique and NoSQL database,'' in Proc. Int. Conf. Intell. Interact. Multimedia Syst. Services. Cham, Switzerland: Springer, 2018,pp. 5_13.

Tankard C., ``Encryption as the cornerstone of big data security,'' Netw. Secur., vol. 2017, no. 3, pp. 57, Mar. 2017.

M R Shrihari , Manjunath T.N, R.A. Archana and Hegadi, Ravindra S,” Research Challenges in Big Data Security with Hadoop Platform” International Conference on (RTIP2R December 21-22 2018, RTIP2R 2018, CCIS 1037, pp. 550–560, 2019.

M.R. Shrihari, R.A. Archana, T.N. Manjunath and Ravindra S. Hegadi,” A Review on Different Methods to Protect Big Data Sets”, 2018,issue-12&page-4.

Chakravorty A. and C. Rong, ``Ushare: User controlled social media based on blockchain,'' in Proc. 11th Int. Conf. Ubiquitous Inf. Manage. Commun., Jan. 2017, pp. 1_6.

Downloads

Published

25.12.2023

How to Cite

M. R., S. ., N., A. ., B. V., S. ., M. R., M. ., Reddy S., V. ., H. S. , M. ., & M., M. . (2023). Development of Fragmentation to Create a Big Data Security Framework using Blockchain Innovation. International Journal of Intelligent Systems and Applications in Engineering, 12(1), 492–499. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3947

Issue

Section

Research Article