Development of Fragmentation to Create a Big Data Security Framework using Blockchain Innovation
Keywords:
Blockchain, Big data security, Auditing, Fragmentation, Access controlAbstract
The volume and diversity of data created by both humans and robots is increasing. Although the exponential growth, the tools and technology implemented to control huge information volume are not designed to fulfill protection and data security standards. Furthermore, the majority of Current big data security systems are provided by a centralised third party, making them subject to a wide variety of security risks. This reading provides a novel large information security solution driven by Blockchain technology that integrates fragmentation, encryption, and access control mechanisms. Our suggested fragmentation method considers the data owner's request for encryption to be included in the fragmentation progression. Moreover, data pieces will be stored in the dispersed way provided by the big data atmosphere, adding an extra layer of data security. We want to improve large data security with suitable expense and eliminate encryption overhead for non-sensitive and low-sensitive data sections in classify to provide an ideal security clarification. We show the consequences of our developed approaches to demonstrate that the overheads (in terms of computing time) caused by our system are insignificant in comparison to the security and confidentiality improvements it provides.
Downloads
References
Kassen M. ``Blockchain and E-government innovation: Automation of public information processes,'' Inf. Syst., vol. 103, Jan. 2022,Art. no. 101862.
Manzoor A. A. Braeken, S. S. Kanhere, M. Ylianttila, and M. Liyanage,``Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain,'' J. Netw. Comput. Appl., vol. 176,Feb. 2021, Art. no. 102917.
Deepa. N., Q. Pham, D. C. Nguyen, S. Bhattacharya, P. B. T. R. Gadekallu,P. K. R. Maddikunta, F. Fang, and P. N. Pathirana, ``A survey on blockchain for big data: Approaches, opportunities, and future directions,'' CoRR,vol. abs/2009.00858, pp.1-4, Oct. 2020.
Xiao Y., N. Zhang, W. Lou, and Y. T. Hou,``A survey of distributed consensus protocols for blockchain networks,'' IEEE Commun. Surveys Tuts., vol. 22, no. 2, pp. 1432-1465, 2nd Quart., 2020.
J.Wu,G.Jiang J. Li, and T.Srikanthan, "`Blockchain-based public auditing for big data in cloud storage,'' Inf. Process. Manage.,vol. 57, no. 6, Nov. 2020, Art. no. 102382.
N Ajay; H S Mohan; B V Shwetha; M R Shrihari,” Access Control Framework in the Cloud based on Multi-Blockchain with Light Privacy Protection” ICDCECE, 23-24 April 2022.
Z. Yang H. Yu, , and R. O. Sinnott, ``Decentralized big data auditing for smart city environments leveraging blockchain technology,'' IEEE Access, vol. 7, pp. 6288-6296, 2019.
M R Shrihari, Manjunath T.N, R.A. Archana and Hegadi, Ravindra S,” Development of Security Clustering Process for Big Data in Cloud”, ICT Analysis and Applications ,Lecture Notes in Networks and Systems book series (LNNS,volume 154) 16 December 2020..
Yang and Z. Liang Z., ``Automated identication of sensitive data from implicit user specication,'' Cybersecurity, vol. 1, no. 1, pp. 1-15, Dec. 2018.
Lv, S. Zhu D., H. Xu, and R. Liu, ``Areview of big data security and privacy protection technology,'' in Proc. IEEE 18th Int. Conf. Commun. Technol. (ICCT), Oct. 2018, pp. 1082-1091.
Santos and N. G. L. Masala, ``Big data security on cloud servers using data fragmentation technique and NoSQL database,'' in Proc. Int. Conf. Intell. Interact. Multimedia Syst. Services. Cham, Switzerland: Springer, 2018,pp. 5_13.
Tankard C., ``Encryption as the cornerstone of big data security,'' Netw. Secur., vol. 2017, no. 3, pp. 57, Mar. 2017.
M R Shrihari , Manjunath T.N, R.A. Archana and Hegadi, Ravindra S,” Research Challenges in Big Data Security with Hadoop Platform” International Conference on (RTIP2R December 21-22 2018, RTIP2R 2018, CCIS 1037, pp. 550–560, 2019.
M.R. Shrihari, R.A. Archana, T.N. Manjunath and Ravindra S. Hegadi,” A Review on Different Methods to Protect Big Data Sets”, 2018,issue-12&page-4.
Chakravorty A. and C. Rong, ``Ushare: User controlled social media based on blockchain,'' in Proc. 11th Int. Conf. Ubiquitous Inf. Manage. Commun., Jan. 2017, pp. 1_6.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.