Security Algorithms for Privacy Protection and Security in Aadhaar

Authors(3) :-Arpana Chaturvedi, Dr. Meenu Dave, Dr. Vinay Kumar

Government is enforcing the citizens to link Aadhaar details with various government services to provide services to right beneficiaries. At the same time resident of India are worried about their privacy and security. In recent months, many cases of fraudulent increased the worry of all citizens. The Aadhaar project is the largest biometric identity project, a great initiative taken by the Planning Commission of India in 2009.The project has taken care of all aspects of privacy protection and security issues. Then after the fraudulent and theft of identity related issues keep on taking place. In this paper, various security measures are discussed which can be implemented to be safe from insider’s attacks. Authentication, Authorization, Data Encryption, Security against various attacks are the key levels of data and information security in the Hadoop environment. In recent years, various efforts made to manage more effectively each and every level of security. Kerberos is one such effort in order to attain Authentication and Authorization and it succeeded in doing so, but with the attackers having new technologies and hacking tools attackers can easily bypass the security provided by Hadoop's Kerberos Authentication system and then the data at storage level is unencrypted can easily be stolen or damaged which is a big concern. A new encryption technique to secure data in HDFS environment is the combination of AES and Map Reduce. It performs encryption in parallel using AES-MR (an Advanced Encryption standard based encryption using Map Reduce) technique in Map Reduce paradigm. To provide network security Quantum Cryptography and Biometric based Security solution using BB84 protocol is suggested protocol. This paper also explained the various suggested algorithms and security measure to implement on the Network level security Layer, Database level Security Layer and Application Level security Layer.

Authors and Affiliations

Arpana Chaturvedi
Assistant Professor, Jagannath International Management School, JIMS, GGSIPU, New Delhi, India
Dr. Meenu Dave
Professor, Jagannath University, Jaipur, Rajasthan, India
Dr. Vinay Kumar
Professor, Vivekananda School of IT, VIPS, GGSIPU, New Delhi, India

UIDAI, CIDR, QKD, BB84, AES-MR, HDFS, Cryptography, Kerberos.

  1. Kadre V.,Chaturvedi S., "AES-MR: A Novel Encryption Scheme for securing Data in HDFS Environment using Map Reduce" , www.ijcaonline.org/ research/ volume129/ number12/kadre-2015-ijca-906994.pdf
  2. Mehak, Gagan, "Improving Data Storage Security in Cloud using Hadoop ",ISSN : 2248-9622, Vol. 4, Issue 9( Version 3), September 2014, pp.133-138   , http:// www.ijera.com/papers/Vol4_issue9/Version%203/U4903133138.pdf
  3. Weeks B.,Bean M.,Rozylowicz T., Ficke C. ,"Hardware Performance Simulations of Round 2 Advanced Encryption Standard Algorithms ,National Security", https://csrc.nist.gov/CSRC/media/Projects/Cryptographic-Standards-and-Guidelines/documents/aes-development/NSA-AESfinalreport.pdf doi=10.1.1.35.6941
  4. Clunie D.,Public Comments on the XTS-AES Mode," https://csrc.nist.gov/csrc/media/projects/.../comments/xts/collected_xts_comments.pdf
  5. Public Comments-Modes Development - Block Cipher Techniques,"https://csrc.nist.gov/Projects/Block-Cipher-Techniques/BCM/Public-Comments-Modes-Development ", Comments submitted to EncryptionModes nist.gov.
  6. Dr. Hawthorne, NY, Computing Arbitrary Functions of Encrypted Data Craig Gentry IBM T.J. Watson Research Center 19 Skyline ,cbgentry us.ibm.com https://crypto.stanford.edu/craig/easy-fhe.pdf.
  7. Desai S.,Park Y.,Gao J.,Sang-Yoon Chang,Chungsik Song, "Improving Encryption Performance Using Mapreduce",  Published in: High Performance Computing and Communications (HPCC), IEEE 17th International Conference, ISBN: 978-1-4799-8937-9 ,  http:// ieeexplore. ieee.org / document/7336355/
  8. G. Sujitha, M. Varadharajan, B. Raj Kumar and S. Mercy Shalinie ,"Provisioning Mapreduce for Improving Security of Cloud Data ",http:// scialert.net/ qredirect.php? doi = jai.2013.220.228&linkid=pdf, International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89-105, 2016.
  9. Alexander Uskov, Adam Byerly, Colleen Heinemann ,"Advanced Encryption Standard Analysis With Multimedia Data on Intel® AES-NI Architecture", Department of Computer Science and Information Systems, and interlabs Research Institute Bradley University, 1501 West Bradley Avenue Peoria, Illinois 61625, U.S.A. auskov bradley.edu http://www.tmrfindia.org/ijcsa/v13i26.pdf
  10. Demir L.,Thiery M.,Roca V., Jean-Louis Roch, Jean-Michel Tenkes, "Improving dm-crypt performance for XTS-AES mode through extended requests ", Nov 21, 2016 The 4th International Symposium on Research in Grey-Hat Hacking - aka GreHack , Nov 2016, Grenoble, France https://hal.inria.fr/hal-01399967
  11. Philip Derbeko, Shlomi Dolev, Ehud Gudes, Shantanu Sharma"Security and Privacy Aspects in mapreduce on Clouds: A Survey",www.https://arxiv.org/abs/1605.00677,   (Submitted on 2 May 2016) 4. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012
  12. Liskov M., Minematsu K. , " Comments on XTS-AES" September 2, 2008  This is a comment in response to the request for comment on XTS-AES, as specified in IEEE Std. 1619-2007 September 2, 2008, https://csrc.nist.gov/ csrc /media/projects/block-cipher-techniques/ documents/ bcm/ comments / xts/xts_comments-liskov_minematsu.pdf..
  13. Kirat Pal Singh, Shiwani ,"An Efficient Hardware design and Implementation of Advanced Encryption Standard (AES) Algorithm ", https :// eprint.iacr.org/ 2016/ 789.pdf.
  14. Vaidyaa M. , Dr Shrinivas Deshpandeb ," Study of Performance Parameters on Distributed File Systems using mapreduce ",www.sciencedirect.com International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015, https://ac.els-cdn.com/ S18770509 16000399/1-s2.0-S1877050916000399-main.pdf ?_tid=78 c69a4a-e233-11e7-8cfd-00000aab0f01& acdnat=15134098 15_ d18af66cf2c2e5fa578411397b06ce28
  15. Epuru Madhavarao,ChikkalaJayaRaju,Pedasanaganti Divya,A.S.K.Ratnam,"Data Security Using Cryptography And  Stegnography", ISSN: 2278-1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012, http://ijarcet.org/wp-content/uploads/IJARCET-VOL-1-ISSUE-5-319-325.pdf
  16. Sahu S.,Bhadoria A.,"Survey on Cloud computing security using steganography",http:// ijsetr .org / wp-content/uploads/2015/08/IJSETR-VOL-4-ISSUE-8-2975-2978.pdf, Volume 4, Issue 8, August 2015 2975 ISSN: 2278-7798.
  17. Vaikuntanathan V., University of Toronto ,"Computing Blindfolded: New Developments in Fully Homomorphic Encryption", http://www.cs.utoronto.ca/~vinodv/FHE-focs-survey.pdf
  18. Seny Kamara ,Microsoft Research , Mariana Raykova , Columbia University, "Parallel Homomorphic Encryption", https://eprint.iacr.org/2011/596.pdf
  19. Shai Halevi ,"Homomorphic Encryption ",(IBM Research) April 2017 ,https://shaih.github.io/pubs/he-chapter.pdf
  20. Dr. E. Laxmi Lydia, Dr. M.Ben Swarup ,"Analysis of Big data through Hadoop Ecosystem Components like Flume, Mapreduce, Pig and Hive", www.ijcse.net/docs/IJCSE16-05-01-021.pdf.
  21. Anju Rani ; Avanindra Kumar Lal ; Shalini Sharma ; Latha Banda ; Amit Kant Pandit. ,"Quantum Cryptography Based Biometric Encryption for Network Security ",IEEE XPlore: 09 October 2014, ISBN: 978-0-7695-5013-8, INSPEC Accession Number : 14651794 , DOI : 10.1109/ ICMIRA .2013.19 , http://ieeexplore.ieee.org /iel7/6917607 /6918774 / 06918796.pdf
  22. G. Sujitha, M. Varadharajan, B. Raj Kumar and S. Mercy Shalinie ,"Provisioning Mapreduce for Improving Security of Cloud Data ", http:// scialert.net/ qredirect.php ?doi=jai.2013.220.228&linkid=pdf, International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89-105, 2016.
  23. Kumar M., Gupta A., Shah K.,Saurabh A.,Saxena P., Tiwari V., "Data Security Using Stegnography and Quantum Cryptography" , http://www .iiste.org/ Journals /i ndex.php / NCS/article/view/1672
  24. Philip Derbeko, Shlomi Dolev, Ehud Gudes, Shantanu Sharma"Security and Privacy Aspects in mapreduce on Clouds: A Survey",www.https://arxiv.org/abs/1605.00677,   (Submitted on 2 May 2016) 4. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012
  25. Liskov, Minematsu , " Comments on XTS-AES" September 2, 2008, A comment in response to the request for comment on XTS-AES, as specified in IEEE Std. 1619-2007, https://csrc.nist.gov/csrc/media/ projects/block-cipher-techniques/ documents/ bcm/comments/ xts/xts_comments-liskov_minematsu.pdf.
  26. Morris Dworkin , Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices ,http://nvlpubs.nist. gov/ nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf, NIST  Special Publication 800-38E January, 2010

Publication Details

Published in : Volume 2 | Issue 6 | November-December 2017
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 1072-1080
Manuscript Number : CSEIT1726298
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Arpana Chaturvedi, Dr. Meenu Dave, Dr. Vinay Kumar, "Security Algorithms for Privacy Protection and Security in Aadhaar", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.1072-1080, November-December-2017. |          | BibTeX | RIS | CSV

Article Preview