Abstract
In the big data protecting technologies, most of the existing data protections adopt entire encryption that leads to the researches of lightweight encryption algorithms, without considering from the protected data itself. In our previous paper (FGEM), it finds that not all the parts of a data need protections, the entire data protection can be supplanted as long as the critical parts of the structured data are protected. Reducing unnecessary encryption makes great sense for raising efficiency in big data processing. In this paper, the improvement of FGEM makes it suitable to protect semi-structured and unstructured data efficiently. By storing semi-structured and unstructured datum in an improved tree structure, the improved FGEM for the datum is achieved by getting congener nodes. The experiments show the improved FGEM has short operating time and low memory consumption.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Weiser, M.: The computer for the 21st century. Scientific American 265(3), 94–104 (1991)
Wang, S.H.: An Exchange Framework for Intrusion Alarm Reduction in Mobile Ad-hoc Networks. Journal of Computers 8(7), 1648–1655 (2013)
Chen, W., Guha, R.K., Kwon, T.J., et al.: A survey and challenges in routing and data dissemination in vehicular ad hoc networks. Wireless Communications and Mobile Computing 11(7), 787–795 (2011)
Hui, Y., Wang, Y.: Design of Lightweight Encryption Algorithm Based on Optimized S-box. Communications Technology 5, 39 (2010)
Singh, S., Murshed, N., Kropatsch, W.G. (eds.): ICAPR 2001. LNCS, vol. 2013. Springer, Heidelberg (2001)
ITU-T. Recommendation Y. 2221, Requirements for support of ubiquitous sensor network (USN) applications and services in NGN environment. Geneva (2010)
Wolf, W.: Cyber-physical system. IEEE Computer 42(3), 88–89 (2009)
Fadlullah, Z.M., Fouda, M.M., Kato, N., et al.: Toward intelligent machine-to-machine communications in smart grid. IEEE Communications Magazine 49(4), 60–65 (2011)
Ma, C., Zhou, C., et al.: A Research of Fine-grained Encryption Method for IoT. Journal of Computational Information Systems 8(24), 10213–10222 (2012)
Matalgah, M.M., Magableh, A.M.: Simple encryption algorithm with improved performance in wireless communications. In: 2011 IEEE Radio and Wireless Symposium (RWS), pp. 215–218. IEEE (2011)
Varalakshmi, L.M., Florence, S.G.: An enhanced encryption algorithm for video based on multiple Huffman tables. Multimedia Tools and Applications, 1–13 (2013)
Yuping, Z., Xinghui, W.: Research and realization of multi-level encryption method for database. In: 2010 2nd International Conference on Advanced Computer Control (ICACC), vol. 3, pp. 1–4. IEEE (2010)
Zhou, X., Liu, J.: A novel efficient database encryption scheme. In: 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2012, pp. 1610–1614 (2012)
Sallam, A.I., El-Rabaie, E.S., Faragallah, O.S.: Encryption-based multilevel model for DBMS. Computers & Security 31(4), 437–446 (2012)
Kiviharju, M.: Towards pervasive cryptographic access control models. In: SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, pp. 239–244 (2012)
Marian, H., Sascha, F., Michael, B., Thomas, M., Matthew, S.: Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions. In: 2012 10th Annual International Conference on Privacy, Security and Trust, PST 2012, pp. 17–24 (2012)
Zhu, Y., Gail-Joon, A., Huang, D., Wang, S.: Towards temporal access control in cloud computing. In: Proceedings - IEEE INFOCOM, pp. 2576–2580 (2012)
Papakonstamfinous, Y., Wiom, J.: Object exchange across heterogeneous information sources. In: Proc. of Int. Conf. on Data Engineering (ICDE), pp. 251–260 (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhou, C., Ma, C., Yang, S. (2015). An Improved Fine-Grained Encryption Method for Unstructured Big Data. In: Wang, H., et al. Intelligent Computation in Big Data Era. ICYCSEE 2015. Communications in Computer and Information Science, vol 503. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-46248-5_44
Download citation
DOI: https://doi.org/10.1007/978-3-662-46248-5_44
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-46247-8
Online ISBN: 978-3-662-46248-5
eBook Packages: Computer ScienceComputer Science (R0)