{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T17:31:36Z","timestamp":1778693496570,"version":"3.51.4"},"reference-count":36,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T00:00:00Z","timestamp":1664150400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BDCC"],"abstract":"<jats:p>In recent decades, big data analysis has become the most important research topic. Hence, big data security offers Cloud application security and monitoring to host highly sensitive data to support Cloud platforms. However, the privacy and security of big data has become an emerging issue that restricts the organization to utilize Cloud services. The existing privacy preserving approaches showed several drawbacks such as a lack of data privacy and accurate data analysis, a lack of efficiency of performance, and completely rely on third party. In order to overcome such an issue, the Triple Data Encryption Standard (TDES) methodology is proposed to provide security for big data in the Cloud environment. The proposed TDES methodology provides a relatively simpler technique by increasing the sizes of keys in Data Encryption Standard (DES) to protect against attacks and defend the privacy of data. The experimental results showed that the proposed TDES method is effective in providing security and privacy to big healthcare data in the Cloud environment. The proposed TDES methodology showed less encryption and decryption time compared to the existing Intelligent Framework for Healthcare Data Security (IFHDS) method.<\/jats:p>","DOI":"10.3390\/bdcc6040101","type":"journal-article","created":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T21:23:27Z","timestamp":1664313807000},"page":"101","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":98,"title":["An Efficient and Secure Big Data Storage in Cloud Environment by Using Triple Data Encryption Standard"],"prefix":"10.3390","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7181-703X","authenticated-orcid":false,"given":"Mohan Naik","family":"Ramachandra","sequence":"first","affiliation":[{"name":"Department of Electronics and Communication Engineering, Sri Dharmasthala Manjunatheshwara Institute of Technology (Affiliated to Visvesvaraya Technological University), Ujire 574240, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Madala","family":"Srinivasa Rao","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, PACE Institute of Technology and Sciences, Ongole 523272, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8778-9336","authenticated-orcid":false,"given":"Wen Cheng","family":"Lai","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, National Yunlin University of Science and Technology, Douliu 640301, Taiwan"},{"name":"Bachelor Program in Industrial Projects, National Yunlin University of Science and Technology, Douliu 640301, Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3997-5070","authenticated-orcid":false,"given":"Bidare Divakarachari","family":"Parameshachari","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, Nitte Meenakshi Institute of Technology, Bengaluru 560064, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6158-7616","authenticated-orcid":false,"given":"Jayachandra","family":"Ananda Babu","sequence":"additional","affiliation":[{"name":"Department of Information Science & Engineering, Malnad College of Engineering, Hassan 573202, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kivudujogappa Lingappa","family":"Hemalatha","sequence":"additional","affiliation":[{"name":"Department of ISE, Sri Krishna Institute of Technology, Bengaluru 560090, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2022,9,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1186\/s13677-020-00207-5","article-title":"An efficient and secure data sharing scheme for mobile devices in cloud computing","volume":"9","author":"Lu","year":"2020","journal-title":"J. Cloud Comput."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"151465","DOI":"10.1109\/ACCESS.2020.3016760","article-title":"An Authorized Public Auditing Scheme for Dynamic Big Data Storage in Cloud Computing","volume":"8","author":"Yu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_3","first-page":"16","article-title":"Digital transformation in the era of big data and cloud computing","volume":"9","author":"Chan","year":"2020","journal-title":"Int. J. Intell. Inf. Syst."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Ding, H., Sun, C., and Zeng, J. (2020). Fuzzy Weighted Clustering Method for Numerical Attributes of Communication Big Data Based on Cloud Computing. Symmetry, 12.","DOI":"10.3390\/sym12040530"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Daskevics, A., and Nikiforova, A. (2021, January 6\u20139). IoTSE-based open database vulnerability inspection in three Baltic countries: ShoBEVODSDT sees you. Proceedings of the 2021 8th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Gandia, Spain.","DOI":"10.1109\/IOTSMS53705.2021.9704952"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Ferrari, D., Carminati, M., Polino, M., and Zanero, S. (2020, January 7\u201311). NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services. Proceedings of the Annual Computer Security Applications Conference, Austin, TX, USA.","DOI":"10.1145\/3427228.3427260"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Nikiforova, A., Daskevics, A., and Azeroual, O. (2022). NoSQL security: Can my data-driven decision-making be affected from outside?. arXiv.","DOI":"10.1108\/978-1-80382-551-920231005"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cosrev.2016.05.001","article-title":"Security and privacy aspects in MapReduce on clouds: A survey","volume":"20","author":"Derbeko","year":"2016","journal-title":"Comput. Sci. Rev."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJAGR.2020010101","article-title":"Fog computing architecture for scalable processing of geospatial big data","volume":"11","author":"Barik","year":"2020","journal-title":"Int. J. Appl. Geospat. Res."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.jpdc.2019.10.008","article-title":"Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption","volume":"137","author":"Alabdulatif","year":"2020","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1016\/j.comcom.2020.06.015","article-title":"Cloud computing model for big data processing and performance optimization of multimedia communication","volume":"160","author":"Zhou","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"2545","DOI":"10.1007\/s11227-020-03366-z","article-title":"A cloud computing framework for analysis of agricultural big data based on Dempster\u2013Shafer theory","volume":"77","author":"Mokarram","year":"2020","journal-title":"J. Supercomput."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"102382","DOI":"10.1016\/j.ipm.2020.102382","article-title":"Blockchain-based public auditing for big data in cloud storage","volume":"57","author":"Li","year":"2020","journal-title":"Inf. Process. Manag."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/s10916-019-1250-4","article-title":"IFHDS: Intelligent framework for securing healthcare Big Data","volume":"43","author":"Essa","year":"2019","journal-title":"J. Med. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/j.ins.2016.09.005","article-title":"Intelligent cryptography approach for secure distributed big data storage in cloud computing","volume":"387","author":"Li","year":"2017","journal-title":"Inf. Sci."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1007\/s12065-020-00404-w","article-title":"Hybrid encryption framework for securing big data storage in multi-cloud environment","volume":"14","author":"Viswanath","year":"2021","journal-title":"Evol. Intell."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"21165","DOI":"10.1007\/s11042-021-10723-4","article-title":"Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems","volume":"80","author":"Denis","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"42593","DOI":"10.1109\/ACCESS.2021.3066212","article-title":"Efficient revocable multi-authority attribute-based encryption for cloud storage","volume":"9","author":"Ming","year":"2021","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"101671","DOI":"10.1016\/j.is.2020.101671","article-title":"CryptDICE: Distributed data protection system for secure cloud data storage and computation","volume":"96","author":"Rafique","year":"2021","journal-title":"Inf. Syst."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2427","DOI":"10.1007\/s11277-021-08562-5","article-title":"Cloud Dynamic Scheduling for Multimedia Data Encryption Using Tabu Search Algorithm","volume":"120","author":"Jayapandian","year":"2021","journal-title":"Wirel. Pers. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Venkatesan, B., and Chitra, S. (2021). An enhance the data security performance using an optimal cloud network security for big data cloud framework. Int. J. Commun. Syst., e4854.","DOI":"10.1002\/dac.4854"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.future.2021.08.008","article-title":"Effective and efficient skyline query processing over attribute-order-preserving-free encrypted data in cloud-enabled databases","volume":"126","author":"Cuzzocrea","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1007\/s12083-020-00940-3","article-title":"Enhanced attribute based access control with secure deduplication for big data storage in cloud","volume":"14","author":"Premkamal","year":"2021","journal-title":"Peer-Peer Netw. Appl."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"9363377","DOI":"10.1155\/2022\/9363377","article-title":"Enhanced Lorenz-Chaotic Encryption Method for Partial Medical Image Encryption and Data Hiding in Big Data Healthcare","volume":"2022","author":"Rashmi","year":"2022","journal-title":"Secur. Commun. Netw."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"2957","DOI":"10.1007\/s10586-021-03291-7","article-title":"Intelligent workflow scheduling for Big Data applications in IoT cloud computing environments","volume":"24","author":"Abualigah","year":"2021","journal-title":"Clust. Comput."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Awaysheh, F.M., Aladwan, M.N., Alazab, M., Alawadi, S., Cabaleiro, J.C., and Pena, T.F. (2021). Security by design for big data frameworks over cloud computing. IEEE Transactions on Engineering Management, IEEE.","DOI":"10.1109\/TEM.2020.3045661"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"107309","DOI":"10.1109\/ACCESS.2021.3100287","article-title":"Analyzing and evaluating critical challenges and practices for software vendor organizations to secure big data on cloud computing: An AHP-based systematic approach","volume":"9","author":"Khan","year":"2021","journal-title":"IEEE Access"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.comcom.2021.10.020","article-title":"Big data-driven scheduling optimization algorithm for Cyber\u2013Physical Systems based on a cloud platform","volume":"181","author":"Niu","year":"2022","journal-title":"Comput. Commun."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"7734","DOI":"10.1109\/TII.2021.3055818","article-title":"Computing resource optimization of big data in optical cloud radio access networked industrial Internet of Things","volume":"17","author":"Tyagi","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"5545648","DOI":"10.1155\/2021\/5545648","article-title":"A privacy protection scheme for IoT big data based on time and frequency limitation","volume":"2021","author":"Zhang","year":"2021","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Gudditti, V., and Krishna, P.V. (Mater. Today Proc., 2021). Light weight encryption model for map reduce layer to preserve security in the big data and cloud, Mater. Today Proc., in press.","DOI":"10.1016\/j.matpr.2021.01.190"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"8820","DOI":"10.1109\/ACCESS.2021.3049564","article-title":"Enhancing security of health information using modular encryption standard in mobile cloud computing","volume":"9","author":"Shabbir","year":"2021","journal-title":"IEEE Access"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"2195","DOI":"10.1080\/09720529.2021.2011096","article-title":"Secure online payment through facial recognition and proxy detection with the help of TripleDES encryption","volume":"24","author":"Venkatesan","year":"2021","journal-title":"J. Discret. Math. Sci. Cryptogr."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1054","DOI":"10.1016\/j.procs.2020.04.113","article-title":"An efficient optimization and secured triple data encryption standard using enhanced key scheduling algorithm","volume":"171","author":"Vuppala","year":"2020","journal-title":"Procedia Comput. Sci."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"26059","DOI":"10.1109\/ACCESS.2018.2832854","article-title":"A network coding and DES based dynamic encryption scheme for moving target defense","volume":"6","author":"Tang","year":"2018","journal-title":"IEEE Access"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Kavitha, C., Srividhya, S.R., Lai, W.-C., and Mani, V. (2022). IMapC: Inner MAPping Combiner to enhance the performance of MapReduce in Hadoop. Electronics, 11.","DOI":"10.3390\/electronics11101599"}],"container-title":["Big Data and Cognitive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2504-2289\/6\/4\/101\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:39:52Z","timestamp":1760143192000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2504-2289\/6\/4\/101"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,26]]},"references-count":36,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2022,12]]}},"alternative-id":["bdcc6040101"],"URL":"https:\/\/doi.org\/10.3390\/bdcc6040101","relation":{},"ISSN":["2504-2289"],"issn-type":[{"value":"2504-2289","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,26]]}}}