Open Access
ARTICLE
High Security for De-Duplicated Big Data Using Optimal SIMON Cipher
1 Department of Computer Science and Engineering, University College of Engineering, Ramanathapuram, 623513, India
2 Department of Information Technology, University College of Engineering, Nagercoil, 629004, India
3 Department of EEE, PSN College of Engineering (Anna University), Tirunelveli, 627152, India
4 Department of Information Science and Engineering, Sir M. Visvesvaraya Institute of Technology, Bangalore, 56215, India
5 Department of Computer Applications, Alagappa University, Karaikudi, 63003, India
6 Department of Entrepreneurship and Logistics, Plekhanov Russian University of Economics, Moscow, 117997, Russia
7 Department of Logistics, State University of Management, Moscow, 109542, Russia
* Corresponding Author: Denis A. Pustokhin. Email:
Computers, Materials & Continua 2021, 67(2), 1863-1879. https://doi.org/10.32604/cmc.2021.013614
Received 30 August 2020; Accepted 14 November 2020; Issue published 05 February 2021
Abstract
Cloud computing offers internet location-based affordable, scalable, and independent services. Cloud computing is a promising and a cost-effective approach that supports big data analytics and advanced applications in the event of forced business continuity events, for instance, pandemic situations. To handle massive information, clusters of servers are required to assist the equipment which enables streamlining the widespread quantity of data, with elevated velocity and modified configurations. Data deduplication model enables cloud users to efficiently manage their cloud storage space by getting rid of redundant data stored in the server. Data deduplication also saves network bandwidth. In this paper, a new cloud-based big data security technique utilizing dual encryption is proposed. The clustering model is utilized to analyze the Deduplication process hash function. Multi kernel Fuzzy C means (MKFCM) was used which helps cluster the data stored in cloud, on the basis of confidence data encryption procedure. The confidence finest data is implemented in homomorphic encryption data wherein the Optimal SIMON Cipher (OSC) technique is used. This security process involving dual encryption with the optimization model develops the productivity mechanism. In this paper, the excellence of the technique was confirmed by comparing the proposed technique with other encryption and clustering techniques. The results proved that the proposed technique achieved maximum accuracy and minimum encryption time.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.