A Survey on Big Data Security and Related Techniques to Improve Security
Journal Title: Bonfring International Journal of Software Engineering and Soft Computing - Year 2019, Vol 9, Issue 2
Abstract
Upgrade of security and protection in portable server farms is challengeable with proficient security key administration. For promoting and research, huge numbers of the organizations utilize huge information, however might not have the major resources especially from a security viewpoint. Security of Big Data is a major concern. In expansive sense Big Data contains two sorts of information, for example, organized and unstructured. To give security to unstructured information is more troublesome than that of organized. In this paper manages an overview on enormous information security and proposed new system called huge information security suite with quantum cryptographic key administration conspire. The best possible security norms of calculations can be actuated utilizing and which has been interfaced with the information hub. Unstructured information by considering the kinds of the information and their affectability levels. We have looked into the changed examination strategies for Big Data, which gives us the office to manufacture an information hub of databases of various kinds of information. Each kind of information has been additionally characterized to give satisfactory security and improve the overhead of the security framework.
Authors and Affiliations
Gowsalya R, Dr. Thirumoorthy P
Provisioning of Data Security for File Transformation on Multi Cloud Storage
In file transformation utilizing proxy re-signatures, once a user in the group is revoked; the data cloud server is able to re-sign the blocks, which were signed by the revoked user, with a resigning key. As a result, th...
Security Enhancement and Time Delay Consumption for Cloud Computing Using AES and RC6 Algorithm
Cloud computing is an Internet based computing. It provides the services to the organizations like storage, applications and servers. In cloud storage User can store their data remotely without maintaining local copy of...
A Thorough Investigation on Software Protection Techniques against Various Attacks
Software security and protection plays an important role in software engineering. Considerable attempts have been made to enhance the security of the computer systems because of various available software piracy and viru...
Parallel and Multiple E-Data Distributed Process with Progressive Duplicate Detection Model
In present, duplicate detection methods need to process ever larger datasets in ever shorter time: It is difficult to maintain the dataset. This project presents progressive duplicate detection algorithm that gradually i...
Heuristics Approach for Analyzing the Geo-Distributed Data
Big data analytic is and cloud service for analysis useful information. Traditionally, data sets are stored and processed in a single data center. As the amount of data grows at a high rate, using of one data centre is l...