Filters








15,971 Hits in 2.5 sec

Big Data Security Issues and Quantum Cryptography for Cloud Computing

Vijey Thayananthan, Aiiad Albeshri
2018 International Journal of Computer Applications  
The managing key for individual user participated in the mobile cloud will be the problem when big data is handled without efficient security key management.  ...  Hiding the big data in the light through this research methodology will be the conclusion of the future security. General Terms In this paper, we consider quantum cryptography (QC) as a general term.  ...  Big data security based on QC Big data security based on QC increases the protection for improving cloud computing.  ... 
doi:10.5120/ijca2018916876 fatcat:gmrttuukwjcmng7d42xc4icomm

Cryptography Core Technology [chapter]

Chen-Mou Cheng, Kenta Kodera, Atsuko Miyaji, Shinya Okumura
2020 Security Infrastructure Technology for Integrated Utilization of Big Data  
The security of elliptic curve cryptography is closely related to the computational complexity of the elliptic curve discrete logarithm problem (ECDLP).  ...  These two security bases have important roles in each protocol described in Sect. 2.2.4.2 Analysis on ECDLP Introduction In recent years, elliptic curve cryptography is gaining momentum in deployment because  ...  The development of the efficiency and security of both post-quantum cryptography and HE is strongly desirable.  ... 
doi:10.1007/978-981-15-3654-0_2 fatcat:l5avyfoh6vgwffotnijyxauwq4

A Quantum Cryptography Protocol for Access Control in Big Data

Abiodun O. Odedoyin, Helen O. Odukoya, Ayodeji O. Oluwatope
2018 International Journal on Cryptography and Information Security  
A framework was constructed for realizing the protocol, considering some characteristics of big data and conceptualized using defined propositions and theorems.  ...  The strength of modern cryptography is being weakened and with advances of big data, could gradually be suppressed.  ...  Special thanks to Stephen Olabode Odedoyin, a postgraduate research student of the Department of Economics, Faculty of Social Sciences, Obafemi Awolowo University, Ile-Ife for his contributions, technical  ... 
doi:10.5121/ijcis.2018.8201 fatcat:mo4thaf46rgnpjy2totyvyi73e

Big Data Security Issues Based on Quantum Cryptography and Privacy with Authentication for Mobile Data Center

Vijey Thayananthan, Aiiad Albeshri
2015 Procedia Computer Science  
So, light based on quantum cryptography and PairHand protocols will be the best for this research.  ...  Enhancement of security and privacy in mobile data centers is challengeable with efficient security key management.  ...  Quantum cryptography for big data security In this research, quantum cryptography provides maximum protection with less complexity that increases the storage capacity and security strength of the big data  ... 
doi:10.1016/j.procs.2015.04.077 fatcat:tyzgexpycfbc3pmpkexcbhxyky

A Quantum Cryptography Protocol For Access Control In Big Data

Abiodun O. Odedoyin, Helen O. Odukoya, Ayodeji O. Oluwatope
2018 Zenodo  
A framework was constructed for realizing the protocol, considering some characteristics of big data and conceptualized using defined propositions and theorems.  ...  The strength of modern cryptography is being weakened and with advances of big data, could gradually be suppressed.  ...  Special thanks to Stephen Olabode Odedoyin, a postgraduate research student of the Department of Economics, Faculty of Social Sciences, Obafemi Awolowo University, Ile-Ife for his contributions, technical  ... 
doi:10.5281/zenodo.1304105 fatcat:fiw2mkhohrggdefcnvlkh44jai

HYBRID ENCRYPTION OF BIG DATA SECURITY USING IMPROVED ELLIPTIC CURVE CRYPTOGRAPHY

Dr. B. Arputhamary, A. Benita
2020 International journal of computer science and mobile computing  
In terms of identifying the attacker, the Big Data environment helps resolving cyber security problems. There are big data security concerns as well as safety issues that the analyst must understand.  ...  Data is prone to possible security risks despite several measures for protecting data including encryption, decryption, and compression.  ...  This thesis is intended to provide an enhanced security service in Big data using an enhanced Elliptic Curve Cryptography algorithm for securing user data.  ... 
doi:10.47760/ijcsmc.2020.v09i10.011 fatcat:6eytmn2e7remzjzqwos7m64pwy

Data Security in Cloud using Hybrid Cryptography Algorithms

Abhishek H M
2019 International Journal for Research in Applied Science and Engineering Technology  
Using single algorithm will not contribute highly for greater level security of data in cloud.  ...  But whichever the area is, security of data would be the prominent entity. Cryptography is the best technique to store and retrieve data efficiently and securely.  ...  In the paper entitled "A Space-and-Time Efficient Technique for Big Data Security Analytics"propsed by the authors Suliman A.  ... 
doi:10.22214/ijraset.2019.5009 fatcat:unz3p7ua5rddpkb6ucicwnbe3y

Sharing the Secured Cloud Storage with Elliptic Curve Algorithm

Nuka Raju Kolli, Dinesh Kumar Y
2017 International Journal of Trend in Scientific Research and Development  
Users store vast amounts of data on a big data platform.  ...  This paper proposes a framework for secure sensitive data sharing on a big data platform, including secure data delivery, storage, trusted big data sharing platform.  ...  Analysis, comparison and simulation prove that the proposed scheme is efficient and secure for the big data of Cloud n using elliptic curve cryptography can be defined as transmission of data.  ... 
doi:10.31142/ijtsrd8207 fatcat:golbvtczt5bkhli4irwdkribj4

Privacy Preservation in Big Data

Anjana Gosain, Nikita Chugh
2014 International Journal of Computer Applications  
In this paper we discuss these privacy preservation methods for big data and how differential privacy is a better solution for big data privacy.  ...  This reliance of big data on web model poses serious security concerns. Traditional security methods cannot be applied to big data due to its large volume, variety and volume.  ...  This method of securing big data is based on relationships among attributes present in big data.  ... 
doi:10.5120/17619-8322 fatcat:pgqfvqirdff3rft4akaep3oeli

Big Data Security Analytics in Clinical Data using Cryptographic Algorithms

2019 International journal of recent technology and engineering  
The objective of this paper is to examine a set of cryptographic algorithms for cloud platforms to secure clinical data.  ...  So there is a necessity to protect that data against unauthorized access, modification or denial of access etc. we analyzed the use of cryptography in securing clinical data sets using evaluation parameters  ...  Big data security is considered as a huge complication for researchers in this field and it should be addressed.  ... 
doi:10.35940/ijrte.a1819.078219 fatcat:6dc7uuexr5hwje3cwtyzzskhsu

Improvisation of Network Security using Encryption Technique for Big Data Technology

Geeta Yadav, Sandeep Dalal
2015 International Journal of Computer Applications  
Most critical aspect of big data technology lies in security. Leak of security can prove to be dangerous for any business success considering data confidentiality.  ...  This research paper show design of a new algorithm which improve security aspect of big data technology and makes application of big data technology safer to operate by organizations.  ...  OBJECTIVE OF RESEARCH WORK Step 1: It is necessary to study the concept of cryptography in Big Data. How a big data challenge security and how this challenge can be dealt?  ... 
doi:10.5120/ijca2015905647 fatcat:kx7ayfvye5dajoetctt3unytxm

FLEXIBLE SCHEME FOR PROTECTING BIG DATA AND ENABLE SEARCH AND MODIFICATIONS OVER ENCRYPTED DATA DIRECTLY

Sirisha N
2020 JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES  
The proposed big data security methodology uses Jalastic cloud as the storage destination.  ...  Whatever be the storage destination, cryptographic primitives are widely used to protect data from malicious attacks. There are other methods like auditing for data integrity.  ...  Therefore, it is essential to have an alternative for big data security and outsource big data to cloud with flexible encryption mechanisms.  ... 
doi:10.26782/jmcms.2020.04.00022 fatcat:tx5upzl32rfmvpjqv56djoiz64

Table of Contents

2020 2020 International Conference on Networking and Network Applications (NaNA)  
Data, College of Computer Science and Technology, Institute of Cryptography and Data Security, Guizhou University), and Wei Jie Tan (State Key Laboratory of Public Big Data, College of Computer Science  ...  of Computer Science and Technology, Institute of Cryptography and Data Security, Guizhou University), You Liang Tian (State Key Laboratory of Public Big Data, College of Computer Science and Technology  ... 
doi:10.1109/nana51271.2020.00004 fatcat:hfomxqm755dktg26hwmqupzp4u

Study A Public Key in RSA Algorithm

Taleb Samad Obaid
2020 European Journal of Engineering Research and Science  
The software helps us to hold very big prime numbers to generate the required keys which enhanced the security of transmitted information and we expected to be difficult for a hacker to interfere with  ...  So, encryption/decryption, stenographic and vital cryptography may be adapted to care for the required important information.  ...  As a result, reliable secured results and better security transfer data were big prime integer numbers chosen for both the public / private keys [6] , [7] .  ... 
doi:10.24018/ejers.2020.5.4.1843 fatcat:bia52fsu6fcqnp6bqbmv5wu7sa

MapReduced Based: A New Stream Cipher Technique for Data Encryption

2020 International Journal of Engineering and Advanced Technology  
The biggest challenge, however, is big data security and cryptography is one of the most secure techniques.  ...  Nowadays, data keeps increasing; this in turn makes big data one of the hot topics in the modern era of technology.  ...  There are two techniques for securing big data: cryptography and steganography, both are very similar.  ... 
doi:10.35940/ijeat.e9394.069520 fatcat:qq6qxyr75zgxvfsuylu4icw7me
« Previous Showing results 1 — 15 out of 15,971 results