Autor: |
Thenmozhi R; Department of Computer Science and Engineering, College of Engineering and Technology, SRM Institute of Science and Technology, Kattankulathur, India., Shridevi S; Centre of Advanced Data Science, Vellore Institute of Technology, Vellore, Chennai, India., Mohanty SN; Department of Computer Science & Engineering, Vardhaman College of Engineering (Autonomous), Hyderabad, India., García-Díaz V; Department of Computer Science, University of Oviedo, Oviedo, Spain., Gupta D; Department of Computer Science and Engineering, Maharaja Agrasen Institute of Technology, Delhi, India., Tiwari P; Department of Computer Science, Aalto University, Espoo, Finland., Shorfuzzaman M; Department of Computer Science, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia. |
Jazyk: |
angličtina |
Zdroj: |
Big data [Big Data] 2024 Oct; Vol. 12 (5), pp. 343-356. Date of Electronic Publication: 2021 Dec 13. |
DOI: |
10.1089/big.2021.0176 |
Abstrakt: |
There is a drastic increase in Internet usage across the globe, thanks to mobile phone penetration. This extreme Internet usage generates huge volumes of data, in other terms, big data. Security and privacy are the main issues to be considered in big data management. Hence, in this article, Attribute-based Adaptive Homomorphic Encryption (AAHE) is developed to enhance the security of big data. In the proposed methodology, Oppositional Based Black Widow Optimization (OBWO) is introduced to select the optimal key parameters by following the AAHE method. By considering oppositional function, Black Widow Optimization (BWO) convergence analysis was enhanced. The proposed methodology has different processes, namely, process setup, encryption, and decryption processes. The researcher evaluated the proposed methodology with non-abelian rings and the homomorphism process in ciphertext format. Further, it is also utilized in improving one-way security related to the conjugacy examination issue. Afterward, homomorphic encryption is developed to secure the big data. The study considered two types of big data such as adult datasets and anonymous Microsoft web datasets to validate the proposed methodology. With the help of performance metrics such as encryption time, decryption time, key size, processing time, downloading, and uploading time, the proposed method was evaluated and compared against conventional cryptography techniques such as Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC). Further, the key generation process was also compared against conventional methods such as BWO, Particle Swarm Optimization (PSO), and Firefly Algorithm (FA). The results established that the proposed method is supreme than the compared methods and can be applied in real time in near future. |
Databáze: |
MEDLINE |
Externí odkaz: |
|