Prevention of Attacks on Big Data Records by Multiple Security Strategies

Journal Title: International Journal of Engineering and Science Invention - Year 2018, Vol 7, Issue 4

Abstract

This Project Formulates The Several Types Of Big Data Relational Database Securities As A Constrained Efficient Techniques To Solve The Security Problems. While Transferring Data From One Server To Another There Are Many Possibilities Of Attacking The Data By Intruders. This Proposed System Will Provide Efficient Data To The Receiver Without Any Intruders Stealing The Data. This System Address The Novel Problems Of Securely Sending Provenance For Data Security Using Range Partitioning, J-Bit Encoding, Des Algorithm And Secure Data Hiding Algorithm (Sdha).In Range Partitioning, It Divides The Table Records And Assigns Partition Number To It. In J-Bit Encoding Each Bit Was Encoded. That Made An Original Dataset To Encoded Data. It Works By Manipulate Bits Of Data To Reduce The Size And Optimize Input For Other Algorithm. Then Des Encryption Was Implemented. It Is A Symmetric-Key Algorithm For The Encryption Of Electronic Data. Finally The Sdha Was Implemented To Secure The Original Data. The Text Can Be Known As Cover Text Which Embedded With Original Data To Prevent Alterations To Original Data. These Security Features Can Provide An Efficient Way Of Providing Security For Of Big Data Dataset.

Authors and Affiliations

Aiswarya S, Hindu Priyadharshini M

Keywords

Related Articles

Sensor And Location Selection Problem For Tethered Surveillance Aerostats

Today, Tethered Aerostats are one of the major Intelligence, Surveillance and Reconnaissance Systems which are used for fighting against smuggling, preventing illegal trade, monitoring terrorism and migration ways. The u...

Synthesis, Characterization and Antimicrobial screening of some new bipyridinyl substituted coumarin

The synthesis of various 7-methoxy-4-methyl-8-(4'-aryl-2',2''-bipyridin-6'-yl)coumarins (5a-c); 7- methoxy-4-methyl-8-(4'-aryl-2',3''-bipyridin-6'-yl)coumarins (6a-c) and 7-methoxy-4-methyl-8-(4'-aryl-2',4''- bipyridin-6...

Review on the Role of Mathematical Modeling in Energy Sectors

Energy plays very important roles for social and economic development of a country. It increases technological, industrial and agricultural aspects of the country. The demand for energy is also increasing day by day. In...

Pétrographie et minéralogiedes intrusions alcalines du domaine SASCA (Sud-Ouest de la Côte d’Ivoire, Craton Ouest Africain), comparaison avec d’autres plutons alcalins

Alkaline plutons in southwestern Côte d'Ivoire, mainly in the SASCA domain (Okrouyo locality), are mainly composed of silica-saturated syenite massifs, which are pyroxene-amphibole syenites and amphibole syenites, as wel...

Graph Theory Based Software Clustering Algorithm

Modern software systems are scaling up manifold in terms of size as well as complexity. The ever demanding field of software engineering makes software project development even more challenging. The implementation of suc...

Download PDF file
  • EP ID EP396711
  • DOI -
  • Views 108
  • Downloads 0

How To Cite

Aiswarya S, Hindu Priyadharshini M (2018). Prevention of Attacks on Big Data Records by Multiple Security Strategies. International Journal of Engineering and Science Invention, 7(4), 12-16. https://europub.co.uk/articles/-A-396711