Open Access iconOpen Access



High Security for De-Duplicated Big Data Using Optimal SIMON Cipher

A. Muthumari1, J. Banumathi2, S. Rajasekaran3, P. Vijayakarthik4, K. Shankar5, Irina V. Pustokhina6, Denis A. Pustokhin7,*

1 Department of Computer Science and Engineering, University College of Engineering, Ramanathapuram, 623513, India
2 Department of Information Technology, University College of Engineering, Nagercoil, 629004, India
3 Department of EEE, PSN College of Engineering (Anna University), Tirunelveli, 627152, India
4 Department of Information Science and Engineering, Sir M. Visvesvaraya Institute of Technology, Bangalore, 56215, India
5 Department of Computer Applications, Alagappa University, Karaikudi, 63003, India
6 Department of Entrepreneurship and Logistics, Plekhanov Russian University of Economics, Moscow, 117997, Russia
7 Department of Logistics, State University of Management, Moscow, 109542, Russia

* Corresponding Author: Denis A. Pustokhin. Email: email

Computers, Materials & Continua 2021, 67(2), 1863-1879.


Cloud computing offers internet location-based affordable, scalable, and independent services. Cloud computing is a promising and a cost-effective approach that supports big data analytics and advanced applications in the event of forced business continuity events, for instance, pandemic situations. To handle massive information, clusters of servers are required to assist the equipment which enables streamlining the widespread quantity of data, with elevated velocity and modified configurations. Data deduplication model enables cloud users to efficiently manage their cloud storage space by getting rid of redundant data stored in the server. Data deduplication also saves network bandwidth. In this paper, a new cloud-based big data security technique utilizing dual encryption is proposed. The clustering model is utilized to analyze the Deduplication process hash function. Multi kernel Fuzzy C means (MKFCM) was used which helps cluster the data stored in cloud, on the basis of confidence data encryption procedure. The confidence finest data is implemented in homomorphic encryption data wherein the Optimal SIMON Cipher (OSC) technique is used. This security process involving dual encryption with the optimization model develops the productivity mechanism. In this paper, the excellence of the technique was confirmed by comparing the proposed technique with other encryption and clustering techniques. The results proved that the proposed technique achieved maximum accuracy and minimum encryption time.


Cite This Article

APA Style
Muthumari, A., Banumathi, J., Rajasekaran, S., Vijayakarthik, P., Shankar, K. et al. (2021). High security for de-duplicated big data using optimal SIMON cipher. Computers, Materials & Continua, 67(2), 1863-1879.
Vancouver Style
Muthumari A, Banumathi J, Rajasekaran S, Vijayakarthik P, Shankar K, Pustokhina IV, et al. High security for de-duplicated big data using optimal SIMON cipher. Comput Mater Contin. 2021;67(2):1863-1879
IEEE Style
A. Muthumari et al., "High Security for De-Duplicated Big Data Using Optimal SIMON Cipher," Comput. Mater. Contin., vol. 67, no. 2, pp. 1863-1879. 2021.

cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1925


  • 1201


  • 0


Share Link