A review of data security and cryptographic techniques in IoT based devices

G Mustafa, R Ashraf, MA Mirza, A Jamil… - Proceedings of the 2nd …, 2018 - dl.acm.org
The idea of the Internet of Things (IoT) is to connect or give access to everything to the
Internet. IoT environment not only provides the facility of Human to Machine connectivity …

HEAP: an efficient and fault-tolerant authentication and key exchange protocol for Hadoop-assisted big data platform

D Chattaraj, M Sarma, AK Das, N Kumar… - IEEE …, 2018 - ieeexplore.ieee.org
Hadoop framework has been evolved to manage big data in cloud. Hadoop distributed file
system and MapReduce, the vital components of this framework, provide scalable and fault …

Image encryption with one-time password mechanism and pseudo-features

Y Lu, K Yu, X Lv - Multimedia Tools and Applications, 2021 - Springer
An image encryption algorithm based on chaotic sequence and permutation matrix is
presented in this paper, with the ability to create pseudo-features and realize one-time …

Combination RSA with one time pad for enhanced scheme of two-factor authentication

Z Alamsyah, T Mantoro… - 2020 6th international …, 2020 - ieeexplore.ieee.org
RSA is a popular asymmetric key algorithm with two keys scheme, a public key for
encryption and private key for decryption. RSA has weaknesses in encryption and …

Job failure prediction in Hadoop based on log file analysis

E Shirzad, H Saadatfar - International Journal of Computers and …, 2022 - Taylor & Francis
Hadoop is a popular framework based on MapReduce programming model to allow for
distributed processing of large datasets across clusters with various number of computer …

[PDF][PDF] A three-tier authentication scheme for kerberized hadoop environment

M Hena, N Jeyanthi - Cybernetics and Information Technologies, 2021 - intapi.sciendo.com
Apache Hadoop answers the quest of handling Bigdata for most organizations. It offers
distributed storage and data analysis via Hadoop Distributed File System (HDFS) and Map …

Beaf: BD–A Blockchain Enabled Authentication Framework for Big Data

MK Gupta, RK Dwivedi - ADCAIJ: Advances in Distributed …, 2023 - revistas.usal.es
The widespread utilization of Internet-based applications in our daily routines has resulted in
enormous amounts of data being generated every minute. This data is not only produced by …

Big data security: a progress study of current user authentication schemes

TS Algaradi, B Rama - 2018 4th International Conference on …, 2018 - ieeexplore.ieee.org
In the past few years, a rapid evolution in the ICTs has been witnessed in various aspects,
leading to a higher communication volume, and data exchange.Big Data'is one of the recent …

An Implementation of Robust User Authentication Technique for Big Data Platform

GA AL-Rummana, AHA Al-Ahdal… - Advances in Cyber Security …, 2021 - Springer
Hadoop framework has been developed to manage Big Data on the Cloud. The main
components of this framework are MapReduce and Hadoop Distributed File System (HDFS) …

[PDF][PDF] Exploiting flaws in big data systems

MG Brown, P Centonze - International Journal, 2016 - academia.edu
This journal discusses the relevant security threats, vulnerabilities and prominent techniques
to securing data lake [39]. Over the last few years, Big Data solutions to data processing …