1,806 Hits in 8.3 sec

A survey of cryptographic approaches to securing big-data analytics in the cloud

Sophia Yakoubov, Vijay Gadepally, Nabil Schear, Emily Shen, Arkady Yerukhimovich
2014 2014 IEEE High Performance Extreme Computing Conference (HPEC)  
The growing demand for cloud computing motivates the need to study the security of data received, stored, processed, and transmitted by a cloud.  ...  We introduce a cloud computing model that captures a rich class of big-data use-cases and allows reasoning about relevant threats and security goals.  ...  ACKNOWLEDGMENT The authors would like to thank Sasha Berkoff, as well as the HPEC reviewers, for their helpful feedback on this paper.  ... 
doi:10.1109/hpec.2014.7040943 dblp:conf/hpec/YakoubovGSSY14 fatcat:jinnrastevhkzn5y4plfkh7baq


P Shobha Rani, Vigneswari D
2016 International Journal on Intelligent Electronic Systems  
Hence this Veracity is becoming a new dimension in the bigdata era. In this paper, we present a survey on various techniques that impose security and privacy over the bigdata.  ...  The other upcoming challenge in the area of bigdata is Veracity, which means the trustworthiness of the data that is how secure the data is received, stored, processed and transmitted.  ...  Here we consider some of the cryptographic approaches to securing big data analytics in the cloud.  ... 
doi:10.18000/ijies.30155 fatcat:er3iikkthjho3hxufa5c6pmkwq

Security with Privacy - A Research Agenda

Elisa Bertino, Bharath Kumar Samanthula
2014 Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing  
Due to the tremendous growth of data, the notion of big data has certainly gained momentum in recent years. Cloud computing is a key technology for storing, managing and analyzing big data.  ...  In this paper, we survey our research towards development of efficient and effective privacy-enhancing (PE) techniques for management and analysis of big data in cloud computing.  ...  in a database and playing a role of the gateway between the user and the cloud data analytical servers; and (iii) a cloud user storing data in the cloud database server and outsourcing data analytical  ... 
doi:10.4108/icst.collaboratecom.2014.257687 dblp:conf/colcom/BertinoS14 fatcat:phyvc6g7tjgmld6vxtkzgvwy2q

A Brief Survey on Various Technologies Involved in Cloud Computing Security

Vindhuja E., Dr.N. Umadevi
2020 Asian journal of applied science and technology  
For this article, we performed a detailed survey to look at different forms of possible defense approaches associated with cloud computing security issues.  ...  Data Protection Level Non-cryptographic approaches are given fewer secure data than encrypted approaches.  ... 
doi:10.38177/ajast.2020.4316 fatcat:upcqppapsnezvahckbwdw5345e

Homomorphic Encryption for Secure Computation on Big Data

Roger A. Hallman, Mamadou H. Diallo, Michael A. August, Christopher T. Graves
2018 Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security  
With the ubiquity of mobile devices and the emergence of Internet of Things (IoT) technologies, most of our activities contribute to ever-growing data sets which are used for big data analytics for a variety  ...  In this paper, we argue that, with sufficient investment, HE will become a practical tool for secure processing of big data sets. Hallman, R., Diallo, M., August, M. and Graves, C.  ...  doing big data analytics.  ... 
doi:10.5220/0006823203400347 dblp:conf/iotbd/HallmanDAG18 fatcat:lrnpccq3srf45dr7zprua5xjk4

Sharing the Secured Cloud Storage with Elliptic Curve Algorithm

Nuka Raju Kolli, Dinesh Kumar Y
2017 International Journal of Trend in Scientific Research and Development  
Users store vast amounts of data on a big data platform.  ...  CONCLUSION We presented a computation model for big data analytics in the cloud and surveyed several cryptographic techniques that can be used to secure these analytics in a variety of settings.  ...  Big Data In order to make the confidential big data of tenants secure, we propose a secure cloud big data storage scheme based on cryptographic virtual mapping of the big data, and the concept is shown  ... 
doi:10.31142/ijtsrd8207 fatcat:golbvtczt5bkhli4irwdkribj4

A Survey on Blockchain for Big Data: Approaches, Opportunities, and Future Directions [article]

Natarajan Deepa, Quoc-Viet Pham, Dinh C. Nguyen, Sweta Bhattacharya, B Prabadevi, Thippa Reddy Gadekallu, Praveen Kumar Reddy Maddikunta, Fang Fang, Pubudu N. Pathirana
2021 arXiv   pre-print
In this article, we provide a comprehensive survey on blockchain for big data, focusing on up-to-date approaches, opportunities, and future directions.  ...  Despite many advantages and applications, there are many challenges in big data to be tackled for better quality of service, e.g., big data analytics, big data management, and big data privacy and security  ...  In this section, we survey the blockchain-based approaches and services for big data.  ... 
arXiv:2009.00858v2 fatcat:o5hckr36qjaytg2zrj23rprliq

Big Data in Homeland Security

Lidong Wang, Cheryl Ann Alexander
2015 Journal of Information  
This study contributes in the existing literature and presents technology progress and applications of Big Data in Homeland Security, especially in cybersecurity and cyber defense.  ...  Big Data challenges in security are also discussed.  ...  The sensitivity of data being processed in the cloud is increasing; and it is possible to make use of cryptographic advances to secure processing in the cloud to address a growing veracity of big data  ... 
doi:10.18488/journal.104/2015.1.2/ fatcat:uzq3ifmznfhabbgsqlcxxcgqla

Scalable Privacy Preservation in Big Data a Survey

S. Vennila, J. Priyadarshini
2015 Procedia Computer Science  
A survey have been taken for the MapReduce framework based big data privacy preservation in Cloud environment.  ...  Increase in data volume leads to flexible and scalable privacy preservation of such dataset over the MapReduce framework is BigData applications.  ...  CONCLUSION Currently, security in Big data is a challenging research issue.  ... 
doi:10.1016/j.procs.2015.04.033 fatcat:ptyt3zbxyjdqjpmc3vcnpqvqxe

Security and Privacy-preserving Challenges of e-Health Solutions in Cloud Computing

Shekha Chenthara, Khandakar Ahmed, Hua Wang, Frank Whittaker
2019 IEEE Access  
We surveyed, investigated, and reviewed various aspects of several articles and identified the following tasks: 1) EHR security and privacy; 2) security and privacy requirements of e-health data in the  ...  Since big data provide a great mine of information and knowledge in e-Health applications, serious privacy and security challenges that require immediate attention exist.  ...  ACKNOWLEDGMENT The authors would like to thank Prof. Yuan Miao and Dr. Hui Cui for their valuable comments, suggestions and reviews.  ... 
doi:10.1109/access.2019.2919982 fatcat:3sawv3nb5ndnncdzzk5q2anuwq

Emerging Technologies in Big Data

P. Nandhini
2018 International Journal for Research in Applied Science and Engineering Technology  
Today, the Big Data and its analysis plays a major role in the world of Information Technology with the applications of Cloud Technology, Data Mining, Hadoop and MapReduce.  ...  Since all traditional technologies are applicable for only their structured data, we required a new technology to secure and make privacy in the structured, semi-structured and unstructured data (Big Data  ...  [9] presents a survey about the security perspectives on deployment of big data using cloud.  ... 
doi:10.22214/ijraset.2018.6313 fatcat:ilw5b5kcbnfl7bpdhpdq2qruku

A Survey on Security Challenges of Healthcare Analysis Over Cloud

Jaishree Jain, Dr. Ajit Singh
2017 International Journal of Engineering Research and  
Various approaches have been used to preserve the security of the health information in the cloud environment.  ...  Security strength defines the success of any network service. This survey paper aims to discuss, analyze security challenges and available solutions in cloud computing.  ...  Big data analytics helps analyze patient data to provide right intervention to the right patient at the right time.  ... 
doi:10.17577/ijertv6is040719 fatcat:56sqctq2lzgtdmxrfcx2kcvuee

A Review of Secure and Privacy-Preserving Medical Data Sharing

Hao Jin, Yan Luo, Peilong Li, Jomol Mathew
2019 IEEE Access  
This paper surveys the state-of-the-art schemes on secure and privacy-preserving medical data sharing of the past decade with a focus on blockchain-based approaches.  ...  In the digital healthcare era, it is of the utmost importance to harness medical information scattered across healthcare institutions to support in-depth data analysis and achieve personalized healthcare  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous referees for their reviews and insightful suggestions to improve this paper.  ... 
doi:10.1109/access.2019.2916503 fatcat:6ys5ofwtmjgldjcsvvus7hpn2a

Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions

Sahar Shah, Mahnoor Khan, Ahmad Almogren, Ihsan Ali, Lianwen Deng, Heng Luo, Muazzam A. Khan, Shah Nazir
2020 Scientific Programming  
Many surveys have been carried out in cloud security and privacy. The existing survey papers do not specify the classifications on the basis of cloud computing components.  ...  Unlike the previously existing surveys, the literature review of this paper includes the latest research papers in the field of cloud security.  ...  To make the big data of tenants secure, a secure cloud big data cryptographic-based virtual mapping storage scheme is proposed.  ... 
doi:10.1155/2020/8871315 fatcat:z7shzh55lnai5m4s5pygr7u4oq

Simulation and Security Calibration of Weather Management System for the Least Rainy Areas of Pakistan through Quantum Key Distribution

Nimra Dilawar, Sara Nadeem, Sania Arooj, Muhammad Rizwan, Fahad Ahmad
2018 EAI Endorsed Transactions on Scalable Information Systems  
In this paper we first discuss the technology behind quantum computer then proposed a secure architecture by employing quantum computers to ensure the security of data transmission for weather management  ...  The aim of this research is to manage the movement of clouds from heavy rainfall areas to those areas where there is paucity of water, through satellite using electromagnetic waves.  ...  Hence, in this research Quantum based approach is used to secure and analyse the big data for weather management system of Pakistan [6] .  ... 
doi:10.4108/eai.13-7-2018.159794 fatcat:5ayojknhpvgnlcsmiy4ff6fjvq
« Previous Showing results 1 — 15 out of 1,806 results