A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure Primitive for Big Data Utilization
[chapter]
2020
Security Infrastructure Technology for Integrated Utilization of Big Data
In this chapter, we describe two security primitives for big data utilization. One is a privacy-preserving data integration among databases distributed in different organizations. ...
This primitive integrates the same data among databases kept in different organizations while keeping any different data in an organization secret to other organizations. ...
for Big Data Utilization
Secure Primitive for Big Data Utilization
Secure Primitive for Big Data Utilization
Secure Primitive for Big Data Utilization
Secure Primitive for Big Data ...
doi:10.1007/978-981-15-3654-0_3
fatcat:b5e2addf6vblhnrtxt4fw3cly4
Introduction
[chapter]
2020
Security Infrastructure Technology for Integrated Utilization of Big Data
Analysis of security basis: Any security primitive which is used for an infrastructure of big data utilization is based on cryptology algorithms. ...
, and utilization of big data securely: 1. ...
doi:10.1007/978-981-15-3654-0_1
fatcat:pgtg3quf4bgdtfmsqptjphfvqe
Security with Privacy - A Research Agenda
2014
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing
Due to the tremendous growth of data, the notion of big data has certainly gained momentum in recent years. Cloud computing is a key technology for storing, managing and analyzing big data. ...
In this paper, we survey our research towards development of efficient and effective privacy-enhancing (PE) techniques for management and analysis of big data in cloud computing. ...
Efficient Basic Primitives for Big Data. We emphasize that it is critical to develop more efficient solutions to various basic cryptographic primitives. ...
doi:10.4108/icst.collaboratecom.2014.257687
dblp:conf/colcom/BertinoS14
fatcat:phyvc6g7tjgmld6vxtkzgvwy2q
Big Data Analytics for Information Security
2018
Security and Communication Networks
BDA in information security also changes our thinking about security algorithms; they must change from a small data paradigm to big ones. ...
The performance discussion indicated that the proposed framework owned advantages in security guarantees and thus was more desirable for secure multiparty data aggregation and publishing. (2) X. ...
Acknowledgments We would like to thank all the authors for their fine contributions to this special issue and all the reviewers who upheld the quality of this special issue by critically evaluating the ...
doi:10.1155/2018/7657891
fatcat:a5dy36szibccrde5uv7gt5d3ju
Security Analysis and Proposal of Kill Model using Modern Quantum Key Distribution in Big Data Mining
2017
International Journal of Engineering and Manufacturing
This research paper represents the Security Analysis of modern Big Data technology with the various upcoming challenges and threats which has a vast effect on any organization working in this field and ...
Data now days is of the utmost importance in our network system maybe be in Raw form or be it processed Information. ...
Acknowledgements Firstly, I would like to Thank my Parents for supporting me thought the paper and my institution to help me with guidance. ...
doi:10.5815/ijem.2017.04.05
fatcat:trda3mls2vecxpshrirupybsjy
Demystifying the Internet of Things
2016
Computer
Aggregators help in managing 'big' data. • Communication channel --a medium by which data is transmitted (e.g., physical via Universal Serial Bus [USB], wireless, wired, verbal, etc.). • eUtility (external ...
These primitives are the basic building blocks for a NoT (including IoT) and are described as: • Sensor --an electronic utility that measures physical properties such as temperature, acceleration, weight ...
doi:10.1109/mc.2016.162
fatcat:5o5tnejfzjcazfdg7le2is42wu
An Efficient Secure and Flexible Data Sharing in Cloud Computing using Asymmetric Algorithm
2020
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
RSA encryption and decryption algorithm is presented here for cloud security. The cloud can access the data only after receiving the user's encrypted message using RSA algorithm. ...
Cloud Security is a technique of safeguarding applications, infrastructures and data involved in cloud computing. ...
The method needs data owner to distribute every file into two blocks that is one small block and one big block. To the large one is encrypt that utilized the little block. ...
doi:10.35940/ijitee.c8923.029420
fatcat:xu6o4rgplrdmpfrp4hmua6tdmy
DP-Cryptography: Marrying Differential Privacy and Cryptography in Emerging Applications
[article]
2020
arXiv
pre-print
Due to security concerns arising from aggregating raw data at a single server, several real world deployments in industry have embraced the LDP model. ...
However, systems based on the LDP model tend to have poor utility - "a gap" in the utility achieved as compared to systems based on the SDP model. ...
How can we design such relaxed primitives? In the context of differentially-private data analysis, there is a trade-off between privacy and utility. ...
arXiv:2004.08887v1
fatcat:xkwpazhrd5gyndl2sbs3pquxni
Video Big Data Analytics in the Cloud: Research Issues and Challenges
[article]
2020
arXiv
pre-print
The current technology and market trends demand an efficient framework for video big data analytics. ...
Finally, we identify and articulate several open research issues and challenges, which have been raised by the deployment of big data technologies in the cloud for video big data analytics. ...
In the context of video big data management, the main issue is the extraction of semantic concepts from primitive features. ...
arXiv:2011.02694v1
fatcat:gbshlwsli5bxtnvnbpcdzvnzca
New Public Integrity Auditing Scheme for Cloud Data Storage Using Mac And Symmetric Key Cryptographic Algorithms
2016
International Journal of Applied Engineering Research
The existing works consider the problem secure and efficient public integrity auditing for shared dynamic data storage. ...
Moreover, it supports some properties such as, confidentiality, countability, efficiency and traceability for secure data storage. ...
The current proof verification methodologies were not sufficient for large and complex data size. The big data challenge is an attractive research area to mine the interesting patterns. Jiang et al. ...
doi:10.37622/ijaer/11.3.2016.1894-1899
fatcat:flcgqm5tkzgengqu45gar24pfa
Efficient Scheduling Mechanisms for Secured Cloud Data Environment
2019
International journal of recent technology and engineering
Big Data has won heaps of intrigue in light of the tremendous degree it presents for a higher comprehension of the business and decision making strategy for an enterprise. ...
And misfortune can be a reason for significant data loss while applying hybrid security. As if information changes, then it is not valuable. ...
Hence hybrid encryption is utilized for high security and validation for receiving data before data analysis.
IV. ...
doi:10.35940/ijrte.b1171.0982s1119
fatcat:dggl6wtmcbdgzehgvvisylipcu
TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves
[article]
2020
arXiv
pre-print
We develop TeeRex to automatically analyze enclave binary code for vulnerabilities introduced at the host-to-enclave boundary by means of symbolic execution. ...
As we will show, TeeRex features a specifically tailored framework for SGX enclaves that allows simple proof-of-concept exploit construction to assess the discovered vulnerabilities. ...
Furthermore, we especially thank our shepherd, Nathan Dautenhahn, for helping us to improve this work. ...
arXiv:2007.07586v2
fatcat:v7ri4j7tu5c2lhf6wtxzpubu5e
A Secure Mechanism for Big Data Collection in Large Scale Internet of Vehicle
2017
IEEE Internet of Things Journal
In this paper, a secure mechanism for big data collection in large scale IoV is proposed for improved security performance and efficiency. ...
Two different secure protocols are proposed for business data and confidential data collection. The collected big data is stored securely using distributed storage. ...
What's more, pk_veh encrypts key_vc as m3 which is used for protecting the messages between vehicle node and big data center. key_sc are utilized for ensuring the security between sink node and big data ...
doi:10.1109/jiot.2017.2686451
fatcat:uusyugohxfasjdxlr7jt65d2nu
Research Challenges at the Intersection of Big Data, Security and Privacy
2019
Frontiers in Big Data
AUTHOR CONTRIBUTIONS All authors listed have made a substantial, direct and intellectual contribution to the work, and approved it for publication. ...
It turns out that blockchains may have important implications for big data security and privacy. ...
As big data becomes the new oil for the digital economy, realizing the benefits that big data can bring requires considering many different security and privacy issues. ...
doi:10.3389/fdata.2019.00001
pmid:33693324
pmcid:PMC7931933
fatcat:4hvawvsaufexrdhw6ywbmk7jfa
Enhanced Homomorphic Re-Encryption using Laplacian for Preserving the Privacy in Big Data Analytics
2020
International journal of recent technology and engineering
Big data offers various services like storing sensitive, private data and maintaining the data. Big data users may upload encrypted data rather than raw data for preserving data. ...
The analysis completed on proves that our Preserving the Privacy of Big Data Processing method's to performance in terms of security is good on some datasets, inefficiency this also ensures the security ...
Due to security issues, many parties may be unwilling to contract their personal data to the Big Data for analysis. ...
doi:10.35940/ijrte.d1012.1284s519
fatcat:75k2wib4vvgnpgblcbblmd7vdq
« Previous
Showing results 1 — 15 out of 22,411 results