Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 15
Page No. 6043 - 6052

ECDH-ECC: A Combination of Elliptic Curve Cryptography and Diffie Hellman Based Cryptography Technique for Big Data Security

Authors : Adilakshmi Kameswari Vadavalli and R. Subhashini

References

Ali, M., S.U. Malik and S.U. Khan, 2017. DaSCE: Data security for cloud environment with semi-trusted third party. IEEE. Trans. Cloud Comput., 5: 642-655.
CrossRef  |  Direct Link  |  

Assuncao, M.D., R.N. Calheiros, S. Bianchi, M.A.S. Netto and R. Buyya, 2015. Big data computing and clouds: Trends and future directions. J. Parallel Distrib. Comput., 79-80: 3-15.
CrossRef  |  Direct Link  |  

Chang, V. and M. Ramachandran, 2016. Towards achieving data security with the cloud computing adoption framework. IEEE. Trans. Serv. Comput., 9: 138-151.
CrossRef  |  Direct Link  |  

Chen, M., S. Mao and Y. Liu, 2014. Big data: A survey. Mobile Networks Applic., 19: 171-209.
CrossRef  |  Direct Link  |  

Chu, C.K., S.S. Chow, W.G. Tzeng, J. Zhou and R.H. Deng, 2014. Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE. Trans. Parallel Distrib. Syst., 25: 468-477.
CrossRef  |  Direct Link  |  

Daniel, E. and N.A. Vasanthi, 2016. An efficient continuous auditing methodology for outsourced data storage in cloud computing. Proceedings of the 2015 International Conference on Computational Intelligence, Cyber Security and Computational Models, December 19, 2015, Springer, Singapore, ISBN:978-981-10-0250-2, pp: 461-468.

Fernandez, A., S.D. Rio, V. Lopez, A. Bawakid and M.J.D. Jesus et al., 2014. Big data with cloud computing: An insight on the computing environment, MapReduce and programming frameworks. Interdiscip. Rev. Data Min. Knowl. Discovery, 4: 380-409.
CrossRef  |  Direct Link  |  

Hashem, I.A.T., I. Yaqoob, N.B. Anuar, S. Mokhtar and A. Gani et al., 2015. The rise of big data on cloud computing: Review and open research issues. Inf. Syst., 47: 98-115.
Direct Link  |  

Hongbing, C., R. Chunming, H. Kai, W. Weihong and L. Yanyan, 2015. Secure big data storage and sharing scheme for cloud tenants. China Commun., 12: 106-115.
CrossRef  |  Direct Link  |  

Inukollu, V.N., S. Arsi and S.R. Ravuri, 2014. Security issues associated with big data in cloud computing. Intl. J. Network Secur. Appl., 6: 45-56.
CrossRef  |  Direct Link  |  

Jain, T. and A.P.J.A. Khan, 2017. Secure big data access control policies for cloud computing environment. Intl. J. Innovative Res. Comput. Sci. Technol., 5: 253-256.
CrossRef  |  Direct Link  |  

Jin, X., B.W. Wah, X. Cheng and Y. Wang, 2015. Significance and challenges of big data research. Big Data Res., 2: 59-64.
CrossRef  |  Direct Link  |  

Katal, A., M. Wazid and R.H. Goudar, 2013. Big data: Issues, challenges, tools and good practices. Proceedings of the 6th International Conference on Contemporary Computing (IC3) 2013, August 8-10, 2013, IEEE, Dehradun, India, ISBN:978-1-4799-0191-3, pp: 404-409.

Kelbert, F., F. Gregor, R. Pires, S. Kopsell and M. Pasin et al., 2017. SecureCloud: Secure big data processing in untrusted clouds. Proceedings of the Conference on Design, Automation and Test in Europe, March 27-31, 2017, European Design and Automation Association, Lausanne, Switzerland, pp: 282-285.

Li, K., W. Zhang, C. Yang and N. Yu, 2015. Security analysis on one-to-many order preserving encryption-based cloud data search. IEEE. Trans. Inf. Forensics Secur., 10: 1918-1926.
CrossRef  |  Direct Link  |  

Liu, J.K., K. Liang, W. Susilo, J. Liu and Y. Xiang, 2016. Two-factor data security protection mechanism for cloud storage system. IEEE. Trans. Comput., 65: 1992-2004.
CrossRef  |  Direct Link  |  

Maheswari, M.I., S. Revathy and R. Tamilarasi, 2016. Secure data transmission for multisharingin big data storage. Indian J. Sci. Technol., 9: 1-6.
CrossRef  |  Direct Link  |  

Prakash, G.L., M. Prateek and I. Singh, 2014. Efficient data security method to control data in cloud storage system using cryptographic techniques. Proceedings of the 2014 Conference on Recent Advances and Innovations in Engineering (ICRAIE’14), May 9-11, 2014, IEEE, Jaipur, India, ISBN:978-1-4799-4041-7, pp: 1-6.

Puthal, D., S. Nepal, R. Ranjan and J. Chen, 2015. DPBSV-an efficient and secure scheme for big sensing data stream. Proceedings of the 2015 IEEE Conference on Trustcom/BigDataSE/ISPA Vol. 1, August 20-22, 2015, IEEE, Helsinki, Finland, ISBN:978-1-4673-7951-9, pp: 246-253.

Rizvi, S., A. Razaque and K. Cover, 2015. Third-Party Auditor (TPA): A potential solution for securing a cloud environment. Proceedings of the 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud’15), November 3-5, 2015, IEEE, New York, USA., ISBN:978-1-4673-9299-0, pp: 31-36.

Sharma, P.P. and C.P. Navdeti, 2014. Securing big data hadoop: A review of security issues, threats and solution. Intl. J. Comput. Sci. Inf. Technol., 5: 2126-2131.
Direct Link  |  

Shimbre, N. and P. Deshpande, 2015. Enhancing distributed data storage security for cloud computing using TPA and AES algorithm. Proceedings of the 2015 International Conference on Computing Communication Control and Automation (ICCUBEA’15), February 26-27, 2015, IEEE, Pune, India, ISBN:978-1-4799-6892-3, pp: 35-39.

Sookhak, M., A. Gani, M.K. Khan and R. Buyya, 2017. Dynamic remote data auditing for securing big data storage in cloud computing. Inf. Sci., 380: 101-116.
Direct Link  |  

Tahilyani, M., A. Dutta and D. Parwani, 2015. Cloud computing storage security and various protocols: A survey. Intl. J. Adv. Eng. Technol., 8: 762-769.
Direct Link  |  

Terzi, D.S., R. Terzi and S. Sagiroglu, 2015. A survey on security and privacy issues in big data. Proceedings of the 10th International Conference on Internet Technology and Secured Transactions (ICITST’15), December 14-16, 2015, IEEE, London, England, UK., ISBN:978-1-9083-2051-3, pp: 202-207.

Wei, L., H. Zhu, Z. Cao, X. Dong and W. Jia et al., 2014. Security and privacy for storage and computation in cloud computing. Inf. Sci., 258: 371-386.
CrossRef  |  Direct Link  |  

Wu, X., R. Jiang and B. Bhargava, 2017. On the security of data access control for multiauthority cloud storage systems. IEEE. Trans. Serv. Comput., 10: 258-272.
CrossRef  |  Direct Link  |  

Yakoubov, S., V. Gadepally, N. Schear, E. Shen and A. Yerukhimovich, 2014. A survey of cryptographic approaches to securing big-data analytics in the cloud. Proceedings of the 2014 IEEE Conference on High Performance Extreme Computing (HPEC’14), September 9-11, 2014, IEEE, Waltham, Massachusetts, USA., ISBN:978-1-4799-6232-7, pp: 1-6.

Youssef, A.E., 2014. A framework for secure healthcare systems based on big data analytics in mobile cloud computing environments. Intl. J. Ambient Syst. Appl., 2: 1-11.
CrossRef  |  

Zhu, Y., G.J. Ahn, H. Hu, S.S. Yau and H.G. An et al., 2013. Dynamic audit services for outsourced storages in clouds. IEEE. Trans. Serv. Comput., 6: 227-238.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved