Filters








22,411 Hits in 4.4 sec

Secure Primitive for Big Data Utilization [chapter]

Akinori Kawachi, Atsuko Miyaji, Kazuhisa Nakasho, Yiying Qi, Yuuki Takano
2020 Security Infrastructure Technology for Integrated Utilization of Big Data  
In this chapter, we describe two security primitives for big data utilization. One is a privacy-preserving data integration among databases distributed in different organizations.  ...  This primitive integrates the same data among databases kept in different organizations while keeping any different data in an organization secret to other organizations.  ...  for Big Data Utilization Secure Primitive for Big Data Utilization Secure Primitive for Big Data Utilization Secure Primitive for Big Data Utilization Secure Primitive for Big Data  ... 
doi:10.1007/978-981-15-3654-0_3 fatcat:b5e2addf6vblhnrtxt4fw3cly4

Introduction [chapter]

Atsuko Miyaji, Shinsaku Kiyomoto, Katsuya Tanaka, Yoshifumi Nishida, Koji Kitamura
2020 Security Infrastructure Technology for Integrated Utilization of Big Data  
Analysis of security basis: Any security primitive which is used for an infrastructure of big data utilization is based on cryptology algorithms.  ...  , and utilization of big data securely: 1.  ... 
doi:10.1007/978-981-15-3654-0_1 fatcat:pgtg3quf4bgdtfmsqptjphfvqe

Security with Privacy - A Research Agenda

Elisa Bertino, Bharath Kumar Samanthula
2014 Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing  
Due to the tremendous growth of data, the notion of big data has certainly gained momentum in recent years. Cloud computing is a key technology for storing, managing and analyzing big data.  ...  In this paper, we survey our research towards development of efficient and effective privacy-enhancing (PE) techniques for management and analysis of big data in cloud computing.  ...  Efficient Basic Primitives for Big Data. We emphasize that it is critical to develop more efficient solutions to various basic cryptographic primitives.  ... 
doi:10.4108/icst.collaboratecom.2014.257687 dblp:conf/colcom/BertinoS14 fatcat:phyvc6g7tjgmld6vxtkzgvwy2q

Big Data Analytics for Information Security

Krzysztof Szczypiorski, Liqiang Wang, Xiangyang Luo, Dengpan Ye
2018 Security and Communication Networks  
BDA in information security also changes our thinking about security algorithms; they must change from a small data paradigm to big ones.  ...  The performance discussion indicated that the proposed framework owned advantages in security guarantees and thus was more desirable for secure multiparty data aggregation and publishing. (2) X.  ...  Acknowledgments We would like to thank all the authors for their fine contributions to this special issue and all the reviewers who upheld the quality of this special issue by critically evaluating the  ... 
doi:10.1155/2018/7657891 fatcat:a5dy36szibccrde5uv7gt5d3ju

Security Analysis and Proposal of Kill Model using Modern Quantum Key Distribution in Big Data Mining

Sayantan Gupta
2017 International Journal of Engineering and Manufacturing  
This research paper represents the Security Analysis of modern Big Data technology with the various upcoming challenges and threats which has a vast effect on any organization working in this field and  ...  Data now days is of the utmost importance in our network system maybe be in Raw form or be it processed Information.  ...  Acknowledgements Firstly, I would like to Thank my Parents for supporting me thought the paper and my institution to help me with guidance.  ... 
doi:10.5815/ijem.2017.04.05 fatcat:trda3mls2vecxpshrirupybsjy

Demystifying the Internet of Things

Jeffrey Voas
2016 Computer  
Aggregators help in managing 'big' data. • Communication channel --a medium by which data is transmitted (e.g., physical via Universal Serial Bus [USB], wireless, wired, verbal, etc.). • eUtility (external  ...  These primitives are the basic building blocks for a NoT (including IoT) and are described as: • Sensor --an electronic utility that measures physical properties such as temperature, acceleration, weight  ... 
doi:10.1109/mc.2016.162 fatcat:5o5tnejfzjcazfdg7le2is42wu

An Efficient Secure and Flexible Data Sharing in Cloud Computing using Asymmetric Algorithm

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
RSA encryption and decryption algorithm is presented here for cloud security. The cloud can access the data only after receiving the user's encrypted message using RSA algorithm.  ...  Cloud Security is a technique of safeguarding applications, infrastructures and data involved in cloud computing.  ...  The method needs data owner to distribute every file into two blocks that is one small block and one big block. To the large one is encrypt that utilized the little block.  ... 
doi:10.35940/ijitee.c8923.029420 fatcat:xu6o4rgplrdmpfrp4hmua6tdmy

DP-Cryptography: Marrying Differential Privacy and Cryptography in Emerging Applications [article]

Sameer Wagh, Xi He, Ashwin Machanavajjhala, Prateek Mittal
2020 arXiv   pre-print
Due to security concerns arising from aggregating raw data at a single server, several real world deployments in industry have embraced the LDP model.  ...  However, systems based on the LDP model tend to have poor utility - "a gap" in the utility achieved as compared to systems based on the SDP model.  ...  How can we design such relaxed primitives? In the context of differentially-private data analysis, there is a trade-off between privacy and utility.  ... 
arXiv:2004.08887v1 fatcat:xkwpazhrd5gyndl2sbs3pquxni

Video Big Data Analytics in the Cloud: Research Issues and Challenges [article]

Aftab Alam, Shah Khalid, Muhammad Numan Khan, Tariq Habib Afridi, Irfan Ullah, Young-Koo Lee
2020 arXiv   pre-print
The current technology and market trends demand an efficient framework for video big data analytics.  ...  Finally, we identify and articulate several open research issues and challenges, which have been raised by the deployment of big data technologies in the cloud for video big data analytics.  ...  In the context of video big data management, the main issue is the extraction of semantic concepts from primitive features.  ... 
arXiv:2011.02694v1 fatcat:gbshlwsli5bxtnvnbpcdzvnzca

New Public Integrity Auditing Scheme for Cloud Data Storage Using Mac And Symmetric Key Cryptographic Algorithms

A. Emily Jenifer, S. Karthigaiveni
2016 International Journal of Applied Engineering Research  
The existing works consider the problem secure and efficient public integrity auditing for shared dynamic data storage.  ...  Moreover, it supports some properties such as, confidentiality, countability, efficiency and traceability for secure data storage.  ...  The current proof verification methodologies were not sufficient for large and complex data size. The big data challenge is an attractive research area to mine the interesting patterns. Jiang et al.  ... 
doi:10.37622/ijaer/11.3.2016.1894-1899 fatcat:flcgqm5tkzgengqu45gar24pfa

Efficient Scheduling Mechanisms for Secured Cloud Data Environment

2019 International journal of recent technology and engineering  
Big Data has won heaps of intrigue in light of the tremendous degree it presents for a higher comprehension of the business and decision making strategy for an enterprise.  ...  And misfortune can be a reason for significant data loss while applying hybrid security. As if information changes, then it is not valuable.  ...  Hence hybrid encryption is utilized for high security and validation for receiving data before data analysis. IV.  ... 
doi:10.35940/ijrte.b1171.0982s1119 fatcat:dggl6wtmcbdgzehgvvisylipcu

TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves [article]

Tobias Cloosters, Michael Rodler, Lucas Davi
2020 arXiv   pre-print
We develop TeeRex to automatically analyze enclave binary code for vulnerabilities introduced at the host-to-enclave boundary by means of symbolic execution.  ...  As we will show, TeeRex features a specifically tailored framework for SGX enclaves that allows simple proof-of-concept exploit construction to assess the discovered vulnerabilities.  ...  Furthermore, we especially thank our shepherd, Nathan Dautenhahn, for helping us to improve this work.  ... 
arXiv:2007.07586v2 fatcat:v7ri4j7tu5c2lhf6wtxzpubu5e

A Secure Mechanism for Big Data Collection in Large Scale Internet of Vehicle

Longhua Guo, Mianxiong Dong, Kaoru Ota, Qiang Li, Tianpeng Ye, Jun Wu, Jianhua Li
2017 IEEE Internet of Things Journal  
In this paper, a secure mechanism for big data collection in large scale IoV is proposed for improved security performance and efficiency.  ...  Two different secure protocols are proposed for business data and confidential data collection. The collected big data is stored securely using distributed storage.  ...  What's more, pk_veh encrypts key_vc as m3 which is used for protecting the messages between vehicle node and big data center. key_sc are utilized for ensuring the security between sink node and big data  ... 
doi:10.1109/jiot.2017.2686451 fatcat:uusyugohxfasjdxlr7jt65d2nu

Research Challenges at the Intersection of Big Data, Security and Privacy

Murat Kantarcioglu, Elena Ferrari
2019 Frontiers in Big Data  
AUTHOR CONTRIBUTIONS All authors listed have made a substantial, direct and intellectual contribution to the work, and approved it for publication.  ...  It turns out that blockchains may have important implications for big data security and privacy.  ...  As big data becomes the new oil for the digital economy, realizing the benefits that big data can bring requires considering many different security and privacy issues.  ... 
doi:10.3389/fdata.2019.00001 pmid:33693324 pmcid:PMC7931933 fatcat:4hvawvsaufexrdhw6ywbmk7jfa

Enhanced Homomorphic Re-Encryption using Laplacian for Preserving the Privacy in Big Data Analytics

2020 International journal of recent technology and engineering  
Big data offers various services like storing sensitive, private data and maintaining the data. Big data users may upload encrypted data rather than raw data for preserving data.  ...  The analysis completed on proves that our Preserving the Privacy of Big Data Processing method's to performance in terms of security is good on some datasets, inefficiency this also ensures the security  ...  Due to security issues, many parties may be unwilling to contract their personal data to the Big Data for analysis.  ... 
doi:10.35940/ijrte.d1012.1284s519 fatcat:75k2wib4vvgnpgblcbblmd7vdq
« Previous Showing results 1 — 15 out of 22,411 results