Data Trawling and Security Strategies

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6

Abstract

 Abstract: The amount of data in the world seems increasing and computers make it easy to save the data. Companies offer data storage by providing cloud services and the amount of data being stored in these servers is increasing rapidly. In data mining, the data is stored electronically and the search is automated or at least augmented by computer. As the volume of data increases, inexorably, the proportion of it that people understand decreases alarmingly. This paper presents the data leakage problem arises because the services like Facebook and Google store all your data unencrypted on their servers, making it easy for them, or governments and hackers, to monitor the data.

Authors and Affiliations

Aishwarya Asesh, G V Karthik

Keywords

Related Articles

 Survey on Various Security Issues and prevention method in Vehicular Ad hoc Networks

 Vehicular adhoc networks are a subset of mobile adhoc networks. This forms wireless network between vehicles for better communications and to break away from the hindrance caused by attackers. Various security ar...

 Design and Simulation of Dct Chip In Vhdl and Application in Watermark Extraction

 Abstract: The paper presented the design, modeling and chip implementation of 2D Discrete Cosine Transform (DCT) domain for copyright protection of images, as digital watermarking chip. Recent improvement in comput...

Enhanced Denoising Algorithm for Improving Quality of Objects in Frames for Video Surveillance

Abstract: In the 21st century’s security awareness scenario, video surveillance plays an important role in improving security to people and property. Fully automatic surveillance systems are much sought after by both pub...

Constrained Engineering DesignOptimization using Average Differential Evolution

The use of metaheuristics has a growing interest in solving constrained optimization problems due to the computational disadvantages of numerical methods. Metaheuristics are a powerful tool in reaching the global optimum...

 Cloudburst Predetermination System

Abstract: Cloudburst is a devastating disaster that usually occurs during rainy seasons at Himalayan regions.The recent floods in the ‘Kedarnath’ area, Uttarakhand are a classic example of flash floods in the MandakiniRi...

Download PDF file
  • EP ID EP100080
  • DOI -
  • Views 83
  • Downloads 0

How To Cite

Aishwarya Asesh, G V Karthik (2014).  Data Trawling and Security Strategies. IOSR Journals (IOSR Journal of Computer Engineering), 16(6), 57-59. https://europub.co.uk/articles/-A-100080