Data Trawling and Security Strategies

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6

Abstract

 Abstract: The amount of data in the world seems increasing and computers make it easy to save the data. Companies offer data storage by providing cloud services and the amount of data being stored in these servers is increasing rapidly. In data mining, the data is stored electronically and the search is automated or at least augmented by computer. As the volume of data increases, inexorably, the proportion of it that people understand decreases alarmingly. This paper presents the data leakage problem arises because the services like Facebook and Google store all your data unencrypted on their servers, making it easy for them, or governments and hackers, to monitor the data.

Authors and Affiliations

Aishwarya Asesh, G V Karthik

Keywords

Related Articles

 Displaying All Bangla Compound Letters & Alphabets By 32-Segment

 Abstract: Different approaches have been proposed for representing Bangla and English alphabets and numerals by segment display. But there is no complete and accurate scheme has been done yet for Bangla compound...

Digital Image Compression using Hybrid Transform with Kekre  Transform and Other Orthogonal Transforms 

 This paper presents image compression technique using hybrid transform. Concept of hybrid wavelet transform can be extended to generate hybrid transform. In hybrid wavelet transform first few rows represent &nbsp...

 Protection of Direct and Indirect Discrimination using Prevention  Methods

 Along with privacy, discrimination is a very important issue when considering the legal and ethical aspects of data mining. It is more than observable that the majority people do not want to be discriminated &nbs...

 Enhancement of Security Levels Using a Secure Intrusion Detection System in Manets

Abstract: A Mobile Ad hoc Network (MANET) is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies .A Security is an important issue for ad hoc networks, especiall...

 Distinct Revocable Data Hiding In Ciphered Image

 Abstract: This scheme proposes a secure and authenticated reversible data hiding in cipher images.Nowadays, we pay more attention to reversible data hiding in encrypted images, as the original cover can bereversibl...

Download PDF file
  • EP ID EP100080
  • DOI -
  • Views 71
  • Downloads 0

How To Cite

Aishwarya Asesh, G V Karthik (2014).  Data Trawling and Security Strategies. IOSR Journals (IOSR Journal of Computer Engineering), 16(6), 57-59. https://europub.co.uk/articles/-A-100080