4.6 Article

New Blockchain Based Special Keys Security Model With Path Compression Algorithm for Big Data

Journal

IEEE ACCESS
Volume 10, Issue -, Pages 94738-94753

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2022.3204289

Keywords

Big Data; Security; Blockchains; Data privacy; Data models; Medical diagnostic imaging; Authorization; Privacy; Big data; blockchain; path compression; privacy; security

Ask authors/readers for more resources

This study discusses the issues of big data security and privacy, and proposes a blockchain-based security model called BSKM. The BSKM model integrates confidentiality, integrity, and availability to ensure the security of big data. It provides a practical and flexible structure for all database operations and guarantees data confidentiality, integrity, and consistency.
In recent years, following the introduction of the IoT (Internet of Things) into our lives and thanks to the rapidly increasing number of digital applications, data is collected from a wide variety of sources at an astonishing rate, and the amount of data is increasing exponentially. Today, social networks, cloud computing and data analytics make it possible to collect huge amounts of data. The concept of big data has subsequently emerged and is an important topic in many fields. However, it is not only very difficult to store big data and analyze it, but it is also a serious threat to the security of an individual's sensitive information. This study describes the issues surrounding big data security and privacy, and provides a solution involving a new blockchain-based security model. This proposed model is called the Blockchain-based Special Key Security Model (BSKM). BSKM proposes, implements and integrates three elements (confidentiality, integrity and availability) of information security together for big data. With this proposed model, a more practical and flexible structure is established for all operations (read, write, update and delete) performed on a database with real data. In this study performed with a special key, all separate blockchain transactions were used for read, write, update and delete operations, and there was a structure that could ensure both confidentiality and integrity at the same time. By looking at a special key for all the blockchain transaction operations performed on the big data it has been shown what type of authorization and access control can be established between which processes and which users. Thus, in contrast to previous studies seen in published literature, data confidentiality, data integrity and data consistency were guaranteed for all transactions. The results of the proposed BSKM model have also been compared by conducting an experimental study of its application. Moreover, this study has shown the effectiveness and benefits of the path compression algorithm. This result has been shown with experimental studies modeling big data and also shows promise for further studies.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available