Data Trawling and Security Strategies

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6

Abstract

 Abstract: The amount of data in the world seems increasing and computers make it easy to save the data. Companies offer data storage by providing cloud services and the amount of data being stored in these servers is increasing rapidly. In data mining, the data is stored electronically and the search is automated or at least augmented by computer. As the volume of data increases, inexorably, the proportion of it that people understand decreases alarmingly. This paper presents the data leakage problem arises because the services like Facebook and Google store all your data unencrypted on their servers, making it easy for them, or governments and hackers, to monitor the data.

Authors and Affiliations

Aishwarya Asesh, G V Karthik

Keywords

Related Articles

 Investigating DHCP and DNS Protocols Using Wireshark

For different computers to communicate on the same network or on different networks they need to know one another’s IP address or MAC address. Involving the IP address and MAC address has led to a challenging task for a...

 Facial Expression Recognition Using Artificial Neural Networks

 In many face recognition systems the important part is face detection. The task of detecting face is complex due to its variability present across human faces including colour, pose, expression, position and...

 Intent Search and Centralized Sybil Defence Mechanism for Social Network

Abstract: Sybil attacks are the major problems occurred in the distributed systems without trusted identities. It occur when the one-to-one relationship between a node and its identity is violated. This is occurred by an...

 Providing efficient measurable key by using unital based key pre-distribution scheme for wireless sensor networks

 Abstract: Resource limitations and potential WSNs application and key management are the challenging issues for WSNs. Network scalability is one of the important things in designing a key management scheme. So we a...

 Microscopic Image Analysis of Nanoparticles by Edge Detection  Using Ant Colony Optimization

 In this paper, I present an approach for analyzing nanoparticles microscopic images by edge detection using Ant Colony Optimization (ACO) algorithm to obtain a well-connected image edge map. Microscope image a...

Download PDF file
  • EP ID EP100080
  • DOI -
  • Views 79
  • Downloads 0

How To Cite

Aishwarya Asesh, G V Karthik (2014).  Data Trawling and Security Strategies. IOSR Journals (IOSR Journal of Computer Engineering), 16(6), 57-59. https://europub.co.uk/articles/-A-100080