Skip to main content

An Improved Fine-Grained Encryption Method for Unstructured Big Data

  • Conference paper
Intelligent Computation in Big Data Era (ICYCSEE 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 503))

Abstract

In the big data protecting technologies, most of the existing data protections adopt entire encryption that leads to the researches of lightweight encryption algorithms, without considering from the protected data itself. In our previous paper (FGEM), it finds that not all the parts of a data need protections, the entire data protection can be supplanted as long as the critical parts of the structured data are protected. Reducing unnecessary encryption makes great sense for raising efficiency in big data processing. In this paper, the improvement of FGEM makes it suitable to protect semi-structured and unstructured data efficiently. By storing semi-structured and unstructured datum in an improved tree structure, the improved FGEM for the datum is achieved by getting congener nodes. The experiments show the improved FGEM has short operating time and low memory consumption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Weiser, M.: The computer for the 21st century. Scientific American 265(3), 94–104 (1991)

    Article  Google Scholar 

  2. Wang, S.H.: An Exchange Framework for Intrusion Alarm Reduction in Mobile Ad-hoc Networks. Journal of Computers 8(7), 1648–1655 (2013)

    Google Scholar 

  3. Chen, W., Guha, R.K., Kwon, T.J., et al.: A survey and challenges in routing and data dissemination in vehicular ad hoc networks. Wireless Communications and Mobile Computing 11(7), 787–795 (2011)

    Article  Google Scholar 

  4. Hui, Y., Wang, Y.: Design of Lightweight Encryption Algorithm Based on Optimized S-box. Communications Technology 5, 39 (2010)

    Google Scholar 

  5. Singh, S., Murshed, N., Kropatsch, W.G. (eds.): ICAPR 2001. LNCS, vol. 2013. Springer, Heidelberg (2001)

    MATH  Google Scholar 

  6. ITU-T. Recommendation Y. 2221, Requirements for support of ubiquitous sensor network (USN) applications and services in NGN environment. Geneva (2010)

    Google Scholar 

  7. Wolf, W.: Cyber-physical system. IEEE Computer 42(3), 88–89 (2009)

    Article  Google Scholar 

  8. Fadlullah, Z.M., Fouda, M.M., Kato, N., et al.: Toward intelligent machine-to-machine communications in smart grid. IEEE Communications Magazine 49(4), 60–65 (2011)

    Article  Google Scholar 

  9. Ma, C., Zhou, C., et al.: A Research of Fine-grained Encryption Method for IoT. Journal of Computational Information Systems 8(24), 10213–10222 (2012)

    Google Scholar 

  10. Matalgah, M.M., Magableh, A.M.: Simple encryption algorithm with improved performance in wireless communications. In: 2011 IEEE Radio and Wireless Symposium (RWS), pp. 215–218. IEEE (2011)

    Google Scholar 

  11. Varalakshmi, L.M., Florence, S.G.: An enhanced encryption algorithm for video based on multiple Huffman tables. Multimedia Tools and Applications, 1–13 (2013)

    Google Scholar 

  12. Yuping, Z., Xinghui, W.: Research and realization of multi-level encryption method for database. In: 2010 2nd International Conference on Advanced Computer Control (ICACC), vol. 3, pp. 1–4. IEEE (2010)

    Google Scholar 

  13. Zhou, X., Liu, J.: A novel efficient database encryption scheme. In: 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2012, pp. 1610–1614 (2012)

    Google Scholar 

  14. Sallam, A.I., El-Rabaie, E.S., Faragallah, O.S.: Encryption-based multilevel model for DBMS. Computers & Security 31(4), 437–446 (2012)

    Article  Google Scholar 

  15. Kiviharju, M.: Towards pervasive cryptographic access control models. In: SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, pp. 239–244 (2012)

    Google Scholar 

  16. Marian, H., Sascha, F., Michael, B., Thomas, M., Matthew, S.: Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions. In: 2012 10th Annual International Conference on Privacy, Security and Trust, PST 2012, pp. 17–24 (2012)

    Google Scholar 

  17. Zhu, Y., Gail-Joon, A., Huang, D., Wang, S.: Towards temporal access control in cloud computing. In: Proceedings - IEEE INFOCOM, pp. 2576–2580 (2012)

    Google Scholar 

  18. Papakonstamfinous, Y., Wiom, J.: Object exchange across heterogeneous information sources. In: Proc. of Int. Conf. on Data Engineering (ICDE), pp. 251–260 (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhou, C., Ma, C., Yang, S. (2015). An Improved Fine-Grained Encryption Method for Unstructured Big Data. In: Wang, H., et al. Intelligent Computation in Big Data Era. ICYCSEE 2015. Communications in Computer and Information Science, vol 503. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-46248-5_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-46248-5_44

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-46247-8

  • Online ISBN: 978-3-662-46248-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics