Abstract

Big data usually running in large-scale and centralized key management systems. However, the centralized key management systems are increasing the problems such as single point of failure, exchanging a secret key over insecure channels, third-party query, and key escrow problem. To avoid these problems, we propose an improved certificate-based encryption scheme that ensures data confidentiality by combining symmetric and asymmetric cryptography schemes. The combination can be implemented by using the Advanced Encryption Standard (AES) and Elliptic Curve Diffie-Hellman (ECDH). The proposed scheme is an enhanced version of the Certificate-Based Encryption (CBE) scheme and preserves all its advantages. However, the key generation process in our scheme has been done without any intervention from the certificate issuer and avoiding the risk of compromised CA. The Elliptic Curve Digital Signature Algorithm (ECDSA) has been used with the ECDH to handle the authentication of the key exchange. The proposed scheme is demonstrated on a big dataset of social networks. The scheme is analyzed based on security criteria that have been compared with the previous schemes to evaluate its performance.

Highlights

  • The term ‘Big Data’ has been become an essential part of people's lives

  • Ibn Al-Haitham Journal for Pure and Applied science https://doi.org/. To cope with this issue, Shamir (A Shamir, 1984) produced the concept of Identity-Based Encryption (IBE) where the identity was used as a public key, and a third party generates a secret key for the user

  • We propose an efficient certificate-based encryption scheme that ensures data confidentiality by combining symmetric and asymmetric cryptography schemes

Read more

Summary

1.Introduction

The term ‘Big Data’ has been become an essential part of people's lives. The appearance of big data has brought new challenges regarding data security. For more information about the Conference please visit the websites: http://ihicps.com/ To cope with this issue, Shamir (A Shamir, 1984) produced the concept of Identity-Based Encryption (IBE) where the identity was used as a public key, and a third party generates a secret key for the user. This approach eliminates the demand for digital certificates. 2. Client B computes PU B = Y ∗ G The two parties share their public keys and the common base point G Step 3: 1.

The Proposed Scheme
Certificate SetKeyPair: Input
ECDSA Signature Generation Input
Encryption: Input
Decryption: Input
8.Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.