Abstract
Data integrity, confidentiality and data loss are the issues that arise during transmission because of the use of an inadequate security scheme. These issues become particularly critical for big data transmission due to its own individual overhead causes. Moreover, multiple executions of distinct security algorithms for maintaining confidentiality and integrity reduce throughput and add a large number of additional bits as security overhead that hampers the robustness against data loss. Conversely, an efficient compression technique minimizes data confidentiality, as it eliminates redundant data during compression. Contemporary studies shows the lack of security policies for solving the mentioned issues in a combinatorial manner. The current study proposes an innovative integrated technique to collectively addresses the above security issues. It increases confidentiality and offers a backup for accidental data loss by combining the simplified data encryption standard (SDES) and an advanced pattern generation technique that uses a unique pattern generation table. A novel dual round of error control technique has been introduced to maximize data integrity by considering an arbitrary number of transmission errors. A new compression technique is adopted to enhance the robustness against data loss along with high compression efficiency and resistance against transmission errors. Confidentiality and integrity are further enhanced by integrating advanced audio steganography that uses a distinctive sample selection for hiding bits. Additionally, the implementation of the proposed innovative integrated technique in the graphics processing unit (GPU) environment increases the execution speed and reduces time complexity with extended parallel processing power. Furthermore, the application of a GPU enhances the execution speed at least 28-fold compared to the CPU performance. Experiments are performed using the standard Calgary Corpuses, text files (sized up to 1 TB), and audio files to validate the objectives. The proposed method offers a higher signal-to-noise ratio (SNR), entropy, and avalanche effect (AE) and lower amplitude difference (AD), and uncorrectable error rate (UER) as well as a lower percentage of information loss (IL), which substantiates its potential to offer higher data confidentiality and integrity. The capacity to reduce the computational complexity is further measured with compression ratio (CR) and throughput. The results further depicts the method's superiority in offering confidentiality and integrity over contemporary approaches. © 2013 IEEE.
Highlights
‘big data’ is a well-known term that depicts the exponential growth and availability of data in both structuredThe associate editor coordinating the review of this manuscript and approving it for publication was Tomás F
This study develops a less complex and highly confidential audio steganography technique that is a perfect fit to big data transmission
FOR FUTURE RESEARCH Present work shows the inability of the contemporary security techniques in offering an integrated solution for resolving confidentiality, integrity and data loss issues in big data transmission
Summary
‘big data’ is a well-known term that depicts the exponential growth and availability of data in both structured. The specific objectives of this study are to do the following: Mitigate the present challenges to confidentiality related to big data transmission by applying the said low-complexity integrated technique and maximize the confidentiality level, Resolve the limitations of current data compression methods by controlling the extra data overhead and reduce channel congestion in big data transmission by designing a new lossless compression method as part of the said integrated technique, Reduce the processing time by reducing the hardware and software latencies, utilizing GPU-based accurate parallel. Processing and an adequate resource allocation mechanism, and Explore the limitations of existing error control techniques to maximize data integrity by minimizing data loss in big data transmission with the use of a new error-checking technique applicable to any number of discrete or continuous bit errors.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.