Next Article in Journal
ECQV-Based Lightweight Revocable Authentication Protocol for Electric Vehicle Charging
Previous Article in Journal
Social Acceptability in Context: Stereotypical Perception of Shape, Body Location, and Usage of Wearable Devices
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Efficient and Secure Big Data Storage in Cloud Environment by Using Triple Data Encryption Standard

by
Mohan Naik Ramachandra
1,
Madala Srinivasa Rao
2,
Wen Cheng Lai
3,4,*,
Bidare Divakarachari Parameshachari
5,
Jayachandra Ananda Babu
6 and
Kivudujogappa Lingappa Hemalatha
7
1
Department of Electronics and Communication Engineering, Sri Dharmasthala Manjunatheshwara Institute of Technology (Affiliated to Visvesvaraya Technological University), Ujire 574240, India
2
Department of Computer Science and Engineering, PACE Institute of Technology and Sciences, Ongole 523272, India
3
Department of Electronic Engineering, National Yunlin University of Science and Technology, Douliu 640301, Taiwan
4
Bachelor Program in Industrial Projects, National Yunlin University of Science and Technology, Douliu 640301, Taiwan
5
Department of Electronics and Communication Engineering, Nitte Meenakshi Institute of Technology, Bengaluru 560064, India
6
Department of Information Science & Engineering, Malnad College of Engineering, Hassan 573202, India
7
Department of ISE, Sri Krishna Institute of Technology, Bengaluru 560090, India
*
Author to whom correspondence should be addressed.
Big Data Cogn. Comput. 2022, 6(4), 101; https://doi.org/10.3390/bdcc6040101
Submission received: 1 July 2022 / Revised: 5 September 2022 / Accepted: 14 September 2022 / Published: 26 September 2022

Abstract

:
In recent decades, big data analysis has become the most important research topic. Hence, big data security offers Cloud application security and monitoring to host highly sensitive data to support Cloud platforms. However, the privacy and security of big data has become an emerging issue that restricts the organization to utilize Cloud services. The existing privacy preserving approaches showed several drawbacks such as a lack of data privacy and accurate data analysis, a lack of efficiency of performance, and completely rely on third party. In order to overcome such an issue, the Triple Data Encryption Standard (TDES) methodology is proposed to provide security for big data in the Cloud environment. The proposed TDES methodology provides a relatively simpler technique by increasing the sizes of keys in Data Encryption Standard (DES) to protect against attacks and defend the privacy of data. The experimental results showed that the proposed TDES method is effective in providing security and privacy to big healthcare data in the Cloud environment. The proposed TDES methodology showed less encryption and decryption time compared to the existing Intelligent Framework for Healthcare Data Security (IFHDS) method.

1. Introduction

Enterprises have generated huge amounts of big data due to faster development of Information Technology (IT) and these data need to be efficiently secured, stored and processed [1]. Cloud Computing (CC) is a fast developing business storage computing platform and it includes many advantages such as larger storage, scalability and lower cost [2]. Various enterprise users and individuals have opted to outsource the big data into servers of the Cloud for the purpose of processing and storage. The CC and big data emerged in the 1990s as the earlier stage of technology development in the business. The increase in big data showed the development in volume of data, variety and velocity [3]. The analytics of CC and big data evolved together with the development of information management from basic reporting and querying, advanced analytics, business intelligence and machine learning [4]. The application of CC and big data is on the basis of combining the resources, dynamic on-demand service, capabilities and requirements of integrated services [5]. CC quickly searches for the dynamic and real time information in a shorter period of time and can transfer the latest data, status of storage and real time information to the Cloud user to obtain the calculation outcome in a shorter time by enhancing the efficiency of economic benefits and distribution [6].
Cloud computing is an emergent technology in data analytics, which is used to retrieve, store and share big data in a distributed environment. Each day individuals and enterprises are storing their data in the server of the Cloud. The authorities of enterprises and individuals are starting to worry about the safety of big data in the Cloud [7]. The Cloud provides three types of services such as software, infrastructure and platform, but delivering the security to big data in the Cloud is the most difficult issue. Generally, the government data, medical data and military data include sensitive details that need to be stored in the environment of the Cloud, but users are not sure about the security given by the service providers [8]. The Cloud includes many advantages but still it lacks the security to store data. It is less popular to store the big data in a single Cloud because of the failure of resource availability and also it includes some conditions where the inside malicious attackers will steal the data from a single Cloud [9]. The existing privacy preserving approaches have several drawbacks such as lack of data privacy, inaccurate data analysis, and completely rely on third parties [10]. Therefore, the privacy of data is another major and important concern in the context of big data. There is a great public fear regarding the inappropriate use of private data, particularly through relating data from multiple sources. Handling privacy is a socio-technical problem, which must be realized to take advantage of big data. To overcome such an issue, Triple Data Encryption Standard (TDES) methodology is proposed in this article to further enhance security in the Cloud environment, especially related to healthcare applications. The contributions of this research are discussed as below:
  • Implementation of an effective TDES methodology to improve the security in healthcare applications. In this study, the input data are partitioned into three categories based on their importance, and then the encryption technique is applied. The TDES methodology partitions the data for balancing the key length and key strength. Triple encryption is applied for highly sensitive data, double encryption is applied for medium sensitive data, and single encryption is applied for low sensitive data.
  • Effective handling of symmetric key and data partition helps in better data structuring that improves the network efficiency. The three subkey and key padding techniques further assist in handling the data structure.
  • The proposed TDES methodology consumes an encryption time of 360 ms; of the existing methods, Tabu search requires 439 ms, MA-ABE technique requires 463 ms, and Hybrid encryption requires 535 ms of encryption time. In addition, the proposed TDES methodology has 98% of packet delivery ratio, while of the existing methods, Tabu has 95%, MA-ABE method has 95%, and Hybrid encryption has 91% of packet delivery ratio. The evaluation measures encryption time and packet delivery ratio show the effectiveness of the proposed TDES methodology.
The paper is organized as follows: the review of existing methods and problem statements are present in Section 2 and Section 3, the proposed approach for securing the big healthcare data in Cloud computing by using TDES methodology is explained in Section 4, the experimental results are explained in Section 5 and Section 6 describes the conclusion of proposed research.

2. Literature Review

Computing infrastructure, especially Cloud computing, plays a significant role in information and knowledge extraction. Efficient handling of big data often poses new security challenges for traditional data encryption standards, methodologies and algorithms. Previous studies of data encryption focused on small-to-medium-size data, which does not work well for big data due to issues in the performance and scalability. Thus, effective policies for data access control and safety management need to be formulated for dealing with big data and this requires incorporating new data management systems. The unprecedented networking among smart devices and computing platforms contributes to big data but poses privacy concerns, as it involves digitally recording an individual’s location, behavior and transactions. The existing techniques on the basis of big data on Cloud computing methods are reviewed in this section.
Zhicheng Zhou et al. [11] developed a Cloud computing method for processing big data and optimizing the performance of multimedia interaction. The radial basis function of neural networks in the Cloud of neural network performs Map-Reduce on Cloud computing. Map reduce and error back propagation algorithm is trained for effective mapping of multi-layer neural networks to process multimedia communication. The developed model has fewer iterations, faster convergence speed and better acceleration speed. The parallelization technique with the developed neural network was not suitable for large scale application of data distribution in computing environments.
Marzieh Mokarram et al. [12] developed a framework by combining Dempster–Shafer theory and Cloud computing for extracting the location to cultivate orange trees. The developed method was applied to obtain the weights for input parameter and Cloud computing was utilized to create the integrated solution that is cost effective by gathering the details from various geographic regions. The interpolation maps for every parameter were evaluated by using inverse distance weighting approach in geographic information system. The developed method successfully predicted the specific location for cultivating the trees by creating various maps. However, when the degree of confidence was increased, the values for land suitability to cultivate trees were decreased, because of the relative humidity in lesser parts that showed the precision value nearer to zero.
Jiaxing Li et al. [13] utilized the technique of blockchain and developed a public auditing approach. Initially, the data owner split the files into blocks and encrypted them to generate the tags of encrypted blocks by using the operation of hash. Then, the data owners established Merkle Hash Tree using hashtags and held the roots for the immediate confirmation of data integrity. Further, the hashtags were forwarded to other data owners which copy every tag stored in the network of blockchain and they uploaded the encrypted blocks to Cloud service provider. The developed method effectively protected against the malicious users and 51% of attacks in the network of blockchain. However, the security and effective services were limited in the developed blockchain based public auditing approach.
Youssef M. Essa et al. [14] developed an intelligent security method known as intelligent framework for the security of healthcare data called as IFHDS. Column based technique is applied large scale data security in developed system that has lesser impact on data processing. The developed technique masks the personal data and encrypt the sensitive data. The sensitive data were split into various parts on the basis of sensitivity levels where every part was separately stored in the distributed Cloud storage. The developed method secured the sensitive data of patients but with a higher computational time. The data owners manage the file configuration of data level security.
Yibin Li et al. [15] applied a distribution storage technique with effective security awareness to secure big data storage distribution in Cloud computing. The developed method utilized algorithms such as alternative data distribution, secure data distribution and efficient data conflation. The developed system divided the files and data were distributed separately in the distributed servers of Cloud. The alternative method was established to identify whether the data packets were split in order to lessen the operational time. The developed security aware method effectively defended the threats of the Clouds and reduced the computational time. However, encrypting all the data using a security algorithm significantly affects the performance requirements in healthcare organizations.
Viswanath and Krishna et al. [16] applied hybrid encryption technique of Advanced Encryption Standard (AES) with s-box and Feistal network to increase the security in the multi-Cloud environment. The hybrid encryption method framework partitions the data and performs the indexing and data encryption. The hybrid encryption framework has a higher performance than AES and Triple DES technique. The hybrid encryption framework technique is able to withstand the Denial of Service (DoS) attack, tampering attack and insider attack. The hybrid encryption framework involves encrypting the attributes and data, but it requires more computation time. Denis and Madhubala et al. [17] applied two-level Discrete Wavelet Transform steganography and combined it with hybrid encryption technique. The hybrid encryption technique, such as AES and Rivest Shamir Adleman (RSA), is applied for secure diagnosis of data that are embedded with Red Green Blue (RGB) channel in medical cover image. Still, the Adaptive Genetic Algorithm with Optimal Pixel Adjustment Process (AGA-OPAP) needs to enrich the data hiding ability for imperceptibility features.
Ming et al. [18] applied a revocable multi-authority attribute-based encryption (RMA-ABE) for secure Cloud storage. The RMA-ABE technique could withstand adaptive chosen plaintext attack and outperformed Diffie-Hellman problem. The Linear Secret Sharing Scheme (LSSS) technique was applied to boost access policy expressiveness, but it was computationally expensive. Rafique et al. [19] applied CryptDICE to increase the security of the data in the Cloud. The different data encryption techniques were supported by the CryptDICE and annotation was used for access search requirement. The CryptDICE provides appropriate trade-off and execution of encryption decision at various level of data granularity. Jayapandian et al. [20] applied Tabu search concept for the encryption technique and Tabu search technique ensures the reduction of the average encode and decode time in multi-media data. The CryptDICE and Tabu search techniques were effective in scheduling encryption, but they require a local memory table to store the data.
Venkatesan and Chitra [21] applied a security-based distribution storage (SB-DS) technique to reduce the execution time of data partition in the Cloud. The secure data processing, data converging, and data distribution process are present in the model. The fuzzy techniques are applied in this model to partition the sensitive data from normal data. Cuzzocrea et al. [22] applied an attribution-based technique to increases the security of the data in the Cloud. The developed method applied suitable encryption technique for domination relationship. However, the SB-DS technique and the traditional attribution-based technique increases the computation time, while processing the larger databases. Premkamal et al. [23] applied secure deduplication and enhanced attribute-based access control (EABAC-SD) to increase the security of the Cloud data. The EABAC-SD model uses the group key for dynamic ownership management to upload the data and increases the security. However, the EABAC-SD model increases the communication and computation overhead for the encryption and deduplication process. Rashmi et al. [24] applied Improved Chaos Encryption (ICE) method to increase the security based on randomness, but it was a complex process in the large scale databases. The Chaos encryption method is applied with Lorentz 96 technique to improve the security.
In order to address the aforementioned concerns, a new encryption methodology, TDES, is proposed in this research manuscript for efficient and secure big data storage in the Cloud environment with limited computational time.

3. Problem Statement

Reviewing the existing studies reveals that most of the encryption techniques increase the computation time, because they require encryption for large scale attributes and data. The IFHDS, AES, genetic algorithm, CryptDICE, SB-DS, ICE, and Tabu search techniques have large key lengths, which is due to the optimization technique becoming trapped into local optima. The existing techniques do not maintain proper structure of data, which leads to higher computation time. To address this concern, a new encryption methodology, TDES, is proposed in this manuscript. The main motivation of this study is to provide efficient and secure big data storage in a Cloud environment with limited computational time.

4. Proposed Methodology

In this research, TDES methodology is proposed to provide security for big data in the Cloud environment, especially related to healthcare applications. The initial step in the proposed TDES methodology is data selection or input selection, wherein Healthcare-based big data are considered as an input. After data acquisition, data selection is processed, in which the encryption of these input data is done by using TDES methodology. The TDES is a standard open encryption methodology, which provides key strength of 112 bits and 168 bits for encryption. The encrypted healthcare-based big data are stored in the Cloud environments. Once the encryption process is completed, after requesting specific data, the decryption process is performed on the corresponding requested data in order to retrieve the data from the Cloud environments. The process of data decryption is accomplished by using TDES methodology. The block diagram of proposed method is shown in Figure 1 and TDES methodology for Healthcare Cloud data is shown in Figure 2.

4.1. Data Selection

The initial step in the proposed method is data selection or input selection, where the healthcare dataset is considered as an input. In this manuscript, the real time healthcare dataset is used for experimental investigation. The dataset includes 17 attributes such as patient name, gender, age, month, symptoms, location, disease, resting blood pressure, resting electrocardiographic results, serum cholesterol, maximum heart rate achieved, past history, consultant name, body mass index, body weight, height and job type and has 3024 instances. From the patients’ attributes, the required data are selected and considered for the process of encryption. Before performing encryption, the administrator creates a mask for the personal information attributes such as patient name, gender, age, month, location, past history, consultant name, job type and body weight. The example data with personal information attributes and key attributes are mentioned in Table 1 and Table 2.
The data are considered as an assortment of characters that are interpreted for the purpose of analysis. The expression of input data is explained in Equation (1)
S i = S 1 , S 2 , S 3 , ,   S n
where S i is the number of inputs selected; S n is the n number of input fields in selection.

4.2. Data Encryption

After selecting the data, next process is input encryption by using TDES methodology. The TDES is a standard open encryption methodology that provides 112 bits and strength of 168 bits for encryption. The TDES utilizes a symmetric key methodology to transmit, read and write the data. The TDES methodology is the effective one, as it utilizes symmetric generation of keys and delivers better security. After the process of encryption, the data are stored in big data. The TDES methodology is generally defined in Equation (2).
E 1 = E 3 = E , E 2 = D
where E is the single encryption function in TDES, E 2 is the double encryption function in TDES, E 3 is the triple encryption function in TDES and D is the counterpart of decryption.

Triple Data Encryption Standard (TDES) Methodology

The TDES is a beneficial methodology for encryption as well as decryption because it includes larger sized key lengths, which are longer than many key lengths used in the existing encryption models. The advanced encryption standard is replaced by Data Encryption Standard (DES); it is considered as outdated at present [25]. It is obtained by using single DES thrice and utilizes three subkeys and padding of keys. The keys are augmented to the length of 64 bits, which is recognized for compatibility and flexibility, then converted to inclusion of TDES. There are several types of TDES encryption that are normally recognized in three ways [25], which are explained in the following:
  • DES-3EES: The three data encryption standard using three types of different key.
  • DES-EDES: The different keys for every three operation of data encryption standard such ad encryption, decryption and encryption.
  • DES-EEE2 and DES-EDES2: The different keys for secondary decryption operation.
The E K ( I ) and D k ( I ) is the encryption and decryption of data encryption standard of I by using K key of DES accordingly. The TDES encryption and decryption operations stands as a compound operation of DES for encryption and decryption, the operations are utilized as below explained.
  • Encryption operation of TDES: The I block of 64 bits is converted to block 0 of 64 bits, which is as shown in Equation (3):
O = E K 3 ( D K 2 ( E k 1 ( I ) ) )
  • Decryption operation of TDES: The I block of 64 bits is converted to block 0 of 64 bits which is as shown in Equation (4):
O = D K 1 ( E K 2 ( D K 3 ( I ) ) )  
There are three ways to utilize the combination of subkeys that are considered as standard in the process of encryption and decryption by using TDES which are explained as follows:
  • Key option 1: The three subkeys such as K 1 ,   K 2 ,   K 3 are considered as the independent keys, which includes different combination such as 3K3DES.
  • Key option 2: The three subkeys such as K 1 ,   K 2 ,   K 3 are considered, where the K 1   a n d   K 2 will have independent or different combination and K 1 and K 3 will include similar combination such as (2K3DES)
  • Key option 3: The three subkeys such as K 1 ,   K 2 ,   K 3 are considered, where all the keys are of similar combination, as shown in Equation (5):
K 1 = K 2 = K 3
In the three key options to utilize the subkeys, the first option is best because all the three subkeys includes different combination having effective key length of 168 bits. Therefore, it is difficult to encrypt the data using first option and it is difficult to resolve the usage of the second and third option. The second option includes effective key length of 112 bits where the initial subkey includes similar combination as third subkey. However, the second option is better than utilizing the twice DES encryption. The third option is weak as compared with the first and second option where the first subkey and second subkey are neglected in the process of encryption and decryption, so the key used in the third option is effective, with 56 bits length as similar as the key length utilized in DES cryptographic models.
The TDES operation stands effectively with the counterpart of single DES by using well matched keying options of TDES operations, such as:
  • The encrypted plaintexts are calculated by using single DES by decrypting properly by means of effective TDES operation.
  • The encrypted plaintexts are calculated by using single TDES by decrypting properly by means of effective DES operation.

4.3. Big Data Storage in Cloud

The encrypted big health care data are stored in the Cloud environments, where it effectively supports read–write operations in storage [25,26]. Generally, the structural design of big data includes redundant and scalable supplies of direct attached storage pools clustered or scale-out network attached storage, or the infrastructure will be centered as a storage of object format [27,28,29,30]. The infrastructure of big data storage is linked to Cloud computing server nodes that allow quicker processing and retrieval of big data measures. The spark over the Hadoop distributed environment is utilized, which provides memories in Cloud and encryption key distribution to worker machines easily. The key management system is improved for data encryption on column instead of row. The keys are handled by key management system in Hadoop environment. The master nodes are generated for keys at every security level, and to store the keys in key management system to utilize when the queries of end users are stored. In the TDES methodology, the queries of clients by distribution of required keys are related to the workers’ queries in the Cloud. All data are running in Yet Another Resource Negotiator (YARN) federations so every Cloud environment utilizes its own resource manager which maintains data processing in a similar Cloud of spark [31,32]. The single YARN data scales use this technique to many nodes of sub-data YARN federating. From the view of application, the federation combines sub-data together as single larger YARN cluster to an application.

4.4. Data Decryption

In the data decryption process, the cloud environment data are retrieved by using TDES methodology. The TDES methodology enables the data owner to retrieve data from the Cloud of healthcare organizations. The Hadoop cluster resources manager provides access to data owners to retrieve the data [33,34]. The resource manager will have the access to map the tables of huge data among various data nodes or providers. Every attribute on security level basis uses appropriate decryption key is used to decrypt the data in TDES methodology. The workers in YARN are able to utilize Hadoop decryption in key management system. The resource manager provides many locations in various data nodes once the client requests data from Hadoop or Cloud providers [35,36]. Then, the data nodes send data to TDES methodology and TDES reads the security level of every attribute by using similar methodology. After TDES completes its process, the Hadoop decrypts the data in the directory of output that is configured by users.

5. Results and Discussion

The Cloud includes many advantages but still it has limitations in providing the security for storage of big data. Various existing methods were developed to provide the security for big data storage in the Cloud. The existing privacy preserving approaches showed several drawbacks such as a lack of data privacy and accurate data analysis, a lack of efficiency of performance and reliance on a third party, which considers the vulnerability of security and reveals the private data of the individual. The TDES methodology is proposed to improve security of medical data in Cloud computing using Python software on a system with 6 GB GPU, 16 GB RAM, i7 core processor and Windows 10 OS environment. The TDES methodology evaluation uses performance measures as explained in this section. The comparison of the proposed method with the existing methods is described in this section.

5.1. Performance Measures

The proposed TDES methodology for big health care data storage in Cloud environment is evaluated using the following metrics. The few security measures that can be used to improve the Cloud computing environment are described below.
  • Execution Time
Execution time is also called as CPU time of a particular task is defined as time taken by the system to complete or execute the task; it is defined in Equation (6).
E x e c u t i o n   T i m e = I C P I T
where I is the number of instructions in the program, C P I is the average cycles per instruction and T is the time of clock cycle.
  • Network Usage
The network utilization is the overall percentage of network bandwidth that is consumed by the traffic of network. The network utilization indicates the point at which the network gets slowdown and shows a need for changes. It is calculated by using Equation (7).
N e t w o r k   U s a g e = N e t w o r k   B n a d w i d t h N e t w o r k   T r a f f i c × 100
  • CPU utilization
Central Processing Unit utilization is the overall work handled by CPU and it is utilized to evaluate performance of system. It is calculated by using Equation (8).
C P U   u t i l i z a t i o n = ( 100 % T i m e   s p e n t   i n   a n   i d l e   t a s k )

5.2. Comparative Analysis

The values obtained for the proposed TDES methodology to provide security for the big medical data in Cloud computing and existing methods are explained in this section. The comparison among proposed TDES methodology and existing methods such as IFHDS [14] and SA_EDS_AES [15] in terms of performance measures is given in Table 3.
Table 3 shows the performance of the proposed method and existing methods in terms of execution time, network utilization and CPU usage. The time taken for encryption, transmission and decryption in medical data is execution time in TDES methodology. The network utilization for the TDES methodology to encrypt, decrypt and transmit the data is estimated. The end-to-end execution utilizes the CPU to deliver better performance and to meet the requirements of security. The proposed TDES methodology has a reduced execution time of 48 min for encryption, storage and decryption as compared to existing methods. The network utilization of proposed method is 85 GB where existing methods used 80 GB and 83 GB. The CPU utilization of to execute the task of proposed TDES methodology is 93%. The proposed TDES methodology provides a simpler technique by increasing the sizes of keys in DES to protect against the attacks and defends the privacy of data. The plotted graph of proposed TDES methodology with the existing method is shown in Figure 3.
Table 4 shows the execution time of the proposed TDES methodology for 100 to 500 data size as compared with the existing methods. The execution time will be based on security level of methodology. The proposed TDES has a lower execution time and shows effective encryption, decryption and storage performance. The execution time of proposed TDES methodology for the data size of 500 is 55 min and it provides effective security to the model. The existing IFHDS [14] and SA_EDS_AES [15] consumed more execution time and did not meet all the security requirements. The graphical representation of proposed TDES methodology with existing method in terms of execution time is shown in Figure 4.
The Table 5 shows the network usage of proposed TDES methodology for 100 to 500 data sizes as compared with the existing methods. The network utilization for the TDES methodology to encrypt, decrypt and transmit the data is estimated. The network utilization of proposed method is higher compared to existing methods. The network utilization is the amount of data transmitted among the workers over the clusters during the process of encryption and decryption. The proposed TDES methodology utilizes the network of 0.55 GB for the 500 data size. The proposed TDES methodology provides a simpler technique by increasing the sizes of keys in DES to protect against the attacks and defends the privacy of data. The graphical representation of proposed TDES methodology with existing method in terms of network usage is shown in Figure 5.
The comparison table of the proposed TDES methodology with existing methods in terms of CPU utilization is shown. Table 6 shows the CPU utilization of the proposed TDES methodology for 100 to 500 data sizes compared with the existing methods. The end-to-end execution utilizes the CPU to deliver better performance and to meet the requirements of security. The proposed TDES methodology utilizes the CPU of 33% for 500 data size, whereas the existing IFHDS [14] method utilized CPU of 35% and SA_EDS_AES [15] of 34%. The proposed TDES methodology provides a simpler technique by increasing the sizes of keys in DES to protect against the attacks and defends the privacy of data. The graphical representation of the proposed TDES methodology compared with existing methods in terms of CPU utilization is shown in Figure 6.
The TDES methodology and existing techniques were implemented with the same data and in the same environment to test their performance. Some recent existing methods such as Hybrid Encryption [16], MA-ABE [18], and Tabu [20] were compared with TDES methodology in the network.
The encryption time of TDES and existing methodologies for various number of blocks were measured and compared, as shown in Table 7 and Figure 7. The number of blocks varied from 100 to 800 to evaluate the TDES and existing methodologies’ performance. The TDES methodology has the advantage of balancing the key length and strength of the key based on the importance of data. This methodology helps to reduce the encryption time of the data compared to existing techniques. The symmetric key is applied to handle the structure of data, which supports reading, storing and editing. The proper structure of data handling further reduces the encryption time in TDES methodology. The Hybrid encryption [16] and MA-ABE [18] techniques require encryption for attributes and data that increases the encryption time of the model. The Tabu search techniques has local optima that provides more key length and increases the encryption time. The TDES methodology requires encryption time of 360 ms, Tabu search [20] requires 439 ms encryption time, MA-ABE [18] technique requires 463 ms encryption time and Hybrid encryption requires 535 ms encryption time.
Decryption time of the TDES and existing techniques was measured and compared for various numbers of blocks, as shown in Table 8 and Figure 8. The TDES shows significant reduction of decryption time compared to existing techniques in Cloud data security. The TDES methodology has the advantages of handling structured data using symmetric key and balance key length–strength, based on the importance of data. The decryption time is significantly reduced due to key and structure handling. The triple encryption is applied to sensitive data and increases the strength of encryption. The Tabu search techniques [20] uses large key strength to encrypt the data due to local optima in search process. The MA-ABE [18] and Hybrid encryption [16] techniques require decrypting the attribute and data, which increases the decryption time. The TDES methodology requires 475 ms decryption time, Tabu search [20] requires 603 ms, MA-ABE [18] requires 740 ms and Hybrid encryption [16] requires 793 ms decryption time for 800 blocks of data.
The running time of TDES and existing techniques was measured and compared for various numbers of blocks, as shown in Table 9 and Figure 9. The TDES running time is less compared to existing techniques, due to its efficiency in data structure handling and balance of key length–strength. The TDES methodology partitions the data into three categories based on importance: high sensitive data are applied with triple encryption, medium sensitive data are applied with double encryption, and low sensitive data are applied with single encryption. This methodology helps to reduce total running time of the model compared to existing techniques. The Hybrid encryption [16] and MA-ABE [18] technique have more running time due to encrypting and decrypting both attributes and data. The Tabu [20] search has a high running time and high key strength due to local optima in the search process.
Latency of TDES and existing techniques were measured and compared for various numbers of blocks, as shown in Table 10 and Figure 10. The TDES has significantly lower latency in the model compared to existing techniques, due to its proper structure of data using symmetric key. The Tabu [20], MA-ABE [18] and Hybrid encryption [16] do not maintain proper structure of data, which involves increases in the latency of the model. The TDES methodology has 78 ms latency, Tabu [20] has 119 ms, MA-ABE has 140 ms and Hybrid encryption has 144 ms latency for 800 number of blocks.
The TDES and existing techniques throughput were measured and compared in Table 11 and Figure 11. The TDES methodology supports higher throughput than existing techniques due to its efficiency in structure data handling using symmetric key. The TDES methodology partition the data into three categories based on data importance. The TDES methodology transfers the low sensitive data in high speed due to its single encryption. The Tabu [20], MA-ABE [18] and Hybrid encryption [16] methods do not maintain proper structure and this reduces the throughput of the network. The TDES has throughput of 120 MBPS, and existing Tabu [20] has 106 MBPS, MA-ABE [18] has 68 MBPS throughput, and Hybrid encryption [16] has 60 MBPS throughput.
The packet delivery ratio of TDES and existing techniques were measured and compared for various numbers of blocks, as shown in Table 12 and Figure 12. The TDES methodology has higher packet delivery ratio due to the partitioning of data and structure of handling. The Tabu [20], MA-ABE [18] and Hybrid encryption [16] methods do not maintain proper structure and this reduces the packet delivery ratio in the network. The TDES methodology has 98% packet delivery ratio, Tabu [20] has 95%, MA-ABE method has 95% and Hybrid encryption has 91% packet delivery ratio.

6. Conclusions

The CC and big data evolved together with the development of information management from basic reporting and querying, advanced analytics, business intelligence and machine learning. The privacy and security of big data is a problematic issue that restricts organizations in utilizing Cloud services. In order to solve such an issue, TDES methodology is proposed to provide security for the big data in Cloud environments by using healthcare data. Initially, the input selection was carried out where the healthcare dataset was considered as an input. The datasets include attributes of patients such as name, gender, age, month, symptoms and location. After selecting the data, input was encrypted by using TDES methodology. The encrypted big health care data are then stored in the Cloud environments, where it superiorly supports read-write operations on storage. To retrieve the data from the Cloud environment, the process of data decryption is utilized by using TDES methodology. The proposed TDES methodology provided a simpler technique by increasing the sizes of keys in DES to protect against the attacks and defend the privacy of data. The experimental results proved that the proposed TDES method is effective in providing security and privacy to big healthcare data in Cloud environment. However, the proposed model requires higher network utilization and CPU usage. Therefore, as a future extension, a modified elliptic curve based cryptographic methodology will be integrated with the block-chain technology to further reduce the CPU usage, network utilization and computational time in the Cloud environment, which are the major concerns described in the literature section. In addition to this, the proposed model is tested on image and audio files to further enhance and ensure security for Cloud-based services, because the multimodal data analysis is effective in precise treatment and early disease diagnosis.

Author Contributions

The paper investigation, resources, data curation, writing—original draft preparation, writing—review and editing and visualization were done by M.N.R. and M.S.R. The paper conceptualization and software were conducted by J.A.B. and K.L.H. The validation and formal analysis, methodology, supervision, project administration and funding acquisition of the version to be published were conducted by W.C.L. and B.D.P. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Ethical review and approval were waived for this study, since this article doesn’t involve any clinical research or practices in it.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

All data generated or analyzed during this study are included in this published article. Publicly available datasets were analyzed in this study. This data can be found here: https://github.com/Parameshachari/Healthcare-Dataset-for-cloud-security#healthcare-dataset-for-cloud-security (accessed on 9 September 2022).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lu, X.; Pan, Z.; Xian, H. An efficient and secure data sharing scheme for mobile devices in cloud computing. J. Cloud Comput. 2020, 9, 60. [Google Scholar] [CrossRef]
  2. Yu, H.; Lu, X.; Pan, Z. An Authorized Public Auditing Scheme for Dynamic Big Data Storage in Cloud Computing. IEEE Access 2020, 8, 151465–151473. [Google Scholar] [CrossRef]
  3. Chan, J.O.P. Digital transformation in the era of big data and cloud computing. Int. J. Intell. Inf. Syst. 2020, 9, 16. [Google Scholar]
  4. Ding, H.; Sun, C.; Zeng, J. Fuzzy Weighted Clustering Method for Numerical Attributes of Communication Big Data Based on Cloud Computing. Symmetry 2020, 12, 530. [Google Scholar] [CrossRef]
  5. Daskevics, A.; Nikiforova, A. IoTSE-based open database vulnerability inspection in three Baltic countries: ShoBEVODSDT sees you. In Proceedings of the 2021 8th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Gandia, Spain, 6–9 December 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–8. [Google Scholar]
  6. Ferrari, D.; Carminati, M.; Polino, M.; Zanero, S. NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services. In Proceedings of the Annual Computer Security Applications Conference, Austin, TX, USA, 7–11 December 2020; Association for Computing Machinery: New York, NY, USA, 2020; pp. 567–581. [Google Scholar]
  7. Nikiforova, A.; Daskevics, A.; Azeroual, O. NoSQL security: Can my data-driven decision-making be affected from outside? arXiv 2022, arXiv:2206.11787. [Google Scholar]
  8. Derbeko, P.; Dolev, S.; Gudes, E.; Sharma, S. Security and privacy aspects in MapReduce on clouds: A survey. Comput. Sci. Rev. 2016, 20, 1–28. [Google Scholar] [CrossRef]
  9. Barik, R.K.; Priyadarshini, R.; Lenka, R.K.; Dubey, H.; Mankodiya, K. Fog computing architecture for scalable processing of geospatial big data. Int. J. Appl. Geospat. Res. 2020, 11, 1–20. [Google Scholar] [CrossRef]
  10. Alabdulatif, A.; Khalil, I.; Yi, X. Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption. J. Parallel Distrib. Comput. 2020, 137, 192–204. [Google Scholar] [CrossRef]
  11. Zhou, Z.; Zhao, L. Cloud computing model for big data processing and performance optimization of multimedia communication. Comput. Commun. 2020, 160, 326–332. [Google Scholar] [CrossRef]
  12. Mokarram, M.; Khosravi, M.R. A cloud computing framework for analysis of agricultural big data based on Dempster–Shafer theory. J. Supercomput. 2020, 77, 2545–2565. [Google Scholar] [CrossRef]
  13. Li, J.; Wu, J.; Jiang, G.; Srikanthan, T. Blockchain-based public auditing for big data in cloud storage. Inf. Process. Manag. 2020, 57, 102382. [Google Scholar] [CrossRef]
  14. Essa, Y.M.; Hemdan, E.E.D.; El-Mahalawy, A.; Attiya, G.; El-Sayed, A. IFHDS: Intelligent framework for securing healthcare Big Data. J. Med. Syst. 2019, 43, 124. [Google Scholar] [CrossRef] [PubMed]
  15. Li, Y.; Gai, K.; Qiu, L.; Qiu, M.; Zhao, H. Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf. Sci. 2017, 387, 103–115. [Google Scholar] [CrossRef]
  16. Viswanath, G.; Krishna, P.V. Hybrid encryption framework for securing big data storage in multi-cloud environment. Evol. Intell. 2021, 14, 691–698. [Google Scholar] [CrossRef]
  17. Denis, R.; Madhubala, P. Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems. Multimed. Tools Appl. 2021, 80, 21165–21202. [Google Scholar] [CrossRef]
  18. Ming, Y.; He, B.; Wang, C. Efficient revocable multi-authority attribute-based encryption for cloud storage. IEEE Access 2021, 9, 42593–42603. [Google Scholar] [CrossRef]
  19. Rafique, A.; Van Landuyt, D.; Beni, E.H.; Lagaisse, B.; Joosen, W. CryptDICE: Distributed data protection system for secure cloud data storage and computation. Inf. Syst. 2021, 96, 101671. [Google Scholar] [CrossRef]
  20. Jayapandian, N. Cloud Dynamic Scheduling for Multimedia Data Encryption Using Tabu Search Algorithm. Wirel. Pers. Commun. 2021, 120, 2427–2447. [Google Scholar] [CrossRef]
  21. Venkatesan, B.; Chitra, S. An enhance the data security performance using an optimal cloud network security for big data cloud framework. Int. J. Commun. Syst. 2021, e4854. [Google Scholar] [CrossRef]
  22. Cuzzocrea, A.; Karras, P.; Vlachou, A. Effective and efficient skyline query processing over attribute-order-preserving-free encrypted data in cloud-enabled databases. Future Gener. Comput. Syst. 2022, 126, 237–251. [Google Scholar] [CrossRef]
  23. Premkamal, P.K.; Pasupuleti, S.K.; Singh, A.K.; Alphonse, P.J.A. Enhanced attribute based access control with secure deduplication for big data storage in cloud. Peer-Peer Netw. Appl. 2021, 14, 102–120. [Google Scholar] [CrossRef]
  24. Rashmi, P.; Supriya, M.C.; Hua, Q. Enhanced Lorenz-Chaotic Encryption Method for Partial Medical Image Encryption and Data Hiding in Big Data Healthcare. Secur. Commun. Netw. 2022, 2022, 9363377. [Google Scholar] [CrossRef]
  25. Abualigah, L.; Diabat, A.; Elaziz, M.A. Intelligent workflow scheduling for Big Data applications in IoT cloud computing environments. Clust. Comput. 2021, 24, 2957–2976. [Google Scholar] [CrossRef]
  26. Awaysheh, F.M.; Aladwan, M.N.; Alazab, M.; Alawadi, S.; Cabaleiro, J.C.; Pena, T.F. Security by design for big data frameworks over cloud computing. In IEEE Transactions on Engineering Management; IEEE: Piscataway, NJ, USA, 2021. [Google Scholar]
  27. Khan, A.W.; Khan, M.U.; Khan, J.A.; Ahmad, A.; Khan, K.; Zamir, M.; Kim, W.; Ijaz, M.F. Analyzing and evaluating critical challenges and practices for software vendor organizations to secure big data on cloud computing: An AHP-based systematic approach. IEEE Access 2021, 9, 107309–107332. [Google Scholar] [CrossRef]
  28. Niu, C.; Wang, L. Big data-driven scheduling optimization algorithm for Cyber–Physical Systems based on a cloud platform. Comput. Commun. 2022, 181, 173–181. [Google Scholar] [CrossRef]
  29. Tyagi, S.K.S.; Mukherjee, A.; Boyang, Q.; Jain, D.K. Computing resource optimization of big data in optical cloud radio access networked industrial Internet of Things. IEEE Trans. Ind. Inform. 2021, 17, 7734–7742. [Google Scholar] [CrossRef]
  30. Zhang, L.; Huo, Y.; Ge, Q.; Ma, Y.; Liu, Q.; Ouyang, W. A privacy protection scheme for IoT big data based on time and frequency limitation. Wirel. Commun. Mob. Comput. 2021, 2021, 5545648. [Google Scholar] [CrossRef]
  31. Gudditti, V.; Krishna, P.V. Light weight encryption model for map reduce layer to preserve security in the big data and cloud. Mater. Today Proc. 2021; in press. [Google Scholar] [CrossRef]
  32. Shabbir, M.; Shabbir, A.; Iwendi, C.; Javed, A.R.; Rizwan, M.; Herencsar, N.; Lin, J.C.W. Enhancing security of health information using modular encryption standard in mobile cloud computing. IEEE Access 2021, 9, 8820–8834. [Google Scholar] [CrossRef]
  33. Venkatesan, R.; Anni Princy, B.; Ambeth Kumar, V.D.; Raghuraman, M.; Gupta, M.K.; Kumar, A.; Kumar, A.; Khan, A.K. Secure online payment through facial recognition and proxy detection with the help of TripleDES encryption. J. Discret. Math. Sci. Cryptogr. 2021, 24, 2195–2205. [Google Scholar] [CrossRef]
  34. Vuppala, A.; Roshan, R.S.; Nawaz, S.; Ravindra, J.V.R. An efficient optimization and secured triple data encryption standard using enhanced key scheduling algorithm. Procedia Comput. Sci. 2020, 171, 1054–1063. [Google Scholar] [CrossRef]
  35. Tang, H.; Sun, Q.T.; Yang, X.; Long, K. A network coding and DES based dynamic encryption scheme for moving target defense. IEEE Access 2018, 6, 26059–26068. [Google Scholar] [CrossRef]
  36. Kavitha, C.; Srividhya, S.R.; Lai, W.-C.; Mani, V. IMapC: Inner MAPping Combiner to enhance the performance of MapReduce in Hadoop. Electronics 2022, 11, 1599. [Google Scholar] [CrossRef]
Figure 1. The TDES block diagram in encryption.
Figure 1. The TDES block diagram in encryption.
Bdcc 06 00101 g001
Figure 2. Block diagram of proposed TDES for secure big healthcare data storage in Cloud computing.
Figure 2. Block diagram of proposed TDES for secure big healthcare data storage in Cloud computing.
Bdcc 06 00101 g002
Figure 3. TDES methodology is compared with existing techniques.
Figure 3. TDES methodology is compared with existing techniques.
Bdcc 06 00101 g003
Figure 4. TDES methodology in comparison with existing methods in terms of execution time.
Figure 4. TDES methodology in comparison with existing methods in terms of execution time.
Bdcc 06 00101 g004
Figure 5. TDES network usage is compared with existing techniques.
Figure 5. TDES network usage is compared with existing techniques.
Bdcc 06 00101 g005
Figure 6. TDES CPU usage comparison with existing techniques.
Figure 6. TDES CPU usage comparison with existing techniques.
Bdcc 06 00101 g006
Figure 7. TDES and existing techniques encryption time for various numbers of blocks.
Figure 7. TDES and existing techniques encryption time for various numbers of blocks.
Bdcc 06 00101 g007
Figure 8. TDES and existing techniques decryption time for various number of blocks.
Figure 8. TDES and existing techniques decryption time for various number of blocks.
Bdcc 06 00101 g008
Figure 9. TDES and existing techniques running time for various number of blocks.
Figure 9. TDES and existing techniques running time for various number of blocks.
Bdcc 06 00101 g009
Figure 10. Comparing TDES and existing techniques’ latency for various numbers of blocks.
Figure 10. Comparing TDES and existing techniques’ latency for various numbers of blocks.
Bdcc 06 00101 g010
Figure 11. Throughput of TDES and existing techniques for various running times.
Figure 11. Throughput of TDES and existing techniques for various running times.
Bdcc 06 00101 g011
Figure 12. Packet delivery ratio of TDES and existing techniques for various numbers of blocks.
Figure 12. Packet delivery ratio of TDES and existing techniques for various numbers of blocks.
Bdcc 06 00101 g012
Table 1. Example data with personal information.
Table 1. Example data with personal information.
Personal InformationPatient Mask ID
Patient NameGenderAgeMonthLocationPast HistoryConsultant NameJob TypeBody Weight
V.J.M47JuneJaipurYM.N.Software engineer62XXY001
B.U.M21SeptemberChennaiYM.I.Student54XXY002
M.H.M39MarchChennaiNS.Y.Bank manager78XXY003
S.A.F33MarchCochinNS.Y.Flim director58XXY004
V.M.M64JulyDelhiYN.A.Farmer64XXY005
L.H.M36MayMumbaiYK.A.Farmer68XXY006
Male—M, Female—F, Yes—Y, and No—N.
Table 2. Example data with key attributes.
Table 2. Example data with key attributes.
Patient Mask IDDiseaseSymptomsRBP (mmhg)Serum Cholesterol (mg/dL)Heart Rate (BPM)Height (cm)BMIRER (BPM)
XXY001DiabetesHeartburn901821401722189
XXY002HepatitisNausea11217811718016.778
XXY003CardiopathyFatigue10918013317724.990
XXY004TuberculosisSudden dizziness8819412216222.174
XXY005CardiopathyHeartburn9319816717221.688
XXY006CardiopathyHand pain8218813817522.273
Resting blood pressure—RBP, beats per minute—BPM, Body Mass Index—BMI, and resting electrocardiographic results—RER.
Table 3. Comparison table of proposed TDES methodology with existing methods.
Table 3. Comparison table of proposed TDES methodology with existing methods.
MethodsExecution Time (Min)Network Utilization (GB)CPU Usage (%)
IFHDS538090
SA_EDS_AES558370
TDES488593
Table 4. TDES methodology is compared with existing techniques in terms of execution time.
Table 4. TDES methodology is compared with existing techniques in terms of execution time.
Data SizeIFHDS (Min)SA_EDS_AES (Min)TDES (Min)
100282520
200303025
300353530
400484340
500686055
Table 5. Network usage of TDES is compared with existing techniques.
Table 5. Network usage of TDES is compared with existing techniques.
Data SizeIFHDS (GB)SA_EDS_AES (GB)TDES (GB)
1000.190.180.21
2000.260.240.29
3000.330.320.36
4000.380.350.40
5000.510.490.55
Table 6. TDES CPU usage comparison with existing techniques.
Table 6. TDES CPU usage comparison with existing techniques.
Data SizeIFHDS (%)SA_EDS_AES (%)TDES (%)
100252524
200252524
300282628
400323130
500353433
Table 7. Encryption time of TDES and comparison with existing techniques.
Table 7. Encryption time of TDES and comparison with existing techniques.
Number of BlockHybrid Encryption (ms)MA-ABE (ms)Tabu (ms)TDES (ms)
00000
100484400394204
200486405398260
300487418399266
400496433403277
500521438405327
600521439411328
700529442430334
800535463439360
Table 8. Decryption time of TDES and comparison with existing methodologies.
Table 8. Decryption time of TDES and comparison with existing methodologies.
Number of BlockHybrid Encryption (ms)MA-ABE (ms)Tabu (ms)TDES (ms)
00000
100767673633428
200767739673472
300776730606415
400783700602560
500785671657425
600789679697457
700792701657522
800793740603475
Table 9. Running time of TDES and comparison with existing technique.
Table 9. Running time of TDES and comparison with existing technique.
Number of BlockHybrid Encryption (ms)MA-ABE (ms)Tabu (ms)TDES (ms)
00000
10013931227971833
200134812851026832
300134411121023816
40012761113979985
500127211971043887
60012671115954997
70012401286902946
800123912471016911
Table 10. Latency of TDES and comparison with existing technique.
Table 10. Latency of TDES and comparison with existing technique.
Number of BlockHybrid Encryption (ms)MA-ABE (ms)Tabu (ms)TDES (ms)
00000
10084715414
20084788245
3001031068956
4001061189158
5001161229461
6001171319966
70013413510372
80014414011978
Table 11. Throughput of TDES in comparison with existing techniques.
Table 11. Throughput of TDES in comparison with existing techniques.
Running Time (ms)Hybrid Encryption (MBPS)MA-ABE (MBPS)Tabu (MBPS)TDES (MBPS)
00000
10015407196
20017447299
300244680100
400325481100
500505982106
600526387113
7005265104120
8006068106120
Table 12. Packet delivery ratio of TDES and comparison with existing techniques.
Table 12. Packet delivery ratio of TDES and comparison with existing techniques.
Number of BlockHybrid Encryption (%)MA-ABE (%)Tabu (%)TDES (%)
00000
10088868891
20088878991
30089889093
40089909093
50090929293
60091939294
70091959497
80091959598
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ramachandra, M.N.; Srinivasa Rao, M.; Lai, W.C.; Parameshachari, B.D.; Ananda Babu, J.; Hemalatha, K.L. An Efficient and Secure Big Data Storage in Cloud Environment by Using Triple Data Encryption Standard. Big Data Cogn. Comput. 2022, 6, 101. https://doi.org/10.3390/bdcc6040101

AMA Style

Ramachandra MN, Srinivasa Rao M, Lai WC, Parameshachari BD, Ananda Babu J, Hemalatha KL. An Efficient and Secure Big Data Storage in Cloud Environment by Using Triple Data Encryption Standard. Big Data and Cognitive Computing. 2022; 6(4):101. https://doi.org/10.3390/bdcc6040101

Chicago/Turabian Style

Ramachandra, Mohan Naik, Madala Srinivasa Rao, Wen Cheng Lai, Bidare Divakarachari Parameshachari, Jayachandra Ananda Babu, and Kivudujogappa Lingappa Hemalatha. 2022. "An Efficient and Secure Big Data Storage in Cloud Environment by Using Triple Data Encryption Standard" Big Data and Cognitive Computing 6, no. 4: 101. https://doi.org/10.3390/bdcc6040101

APA Style

Ramachandra, M. N., Srinivasa Rao, M., Lai, W. C., Parameshachari, B. D., Ananda Babu, J., & Hemalatha, K. L. (2022). An Efficient and Secure Big Data Storage in Cloud Environment by Using Triple Data Encryption Standard. Big Data and Cognitive Computing, 6(4), 101. https://doi.org/10.3390/bdcc6040101

Article Metrics

Back to TopTop