Prevention of Attacks on Big Data Records by Multiple Security Strategies
Journal Title: International Journal of Engineering and Science Invention - Year 2018, Vol 7, Issue 4
Abstract
This Project Formulates The Several Types Of Big Data Relational Database Securities As A Constrained Efficient Techniques To Solve The Security Problems. While Transferring Data From One Server To Another There Are Many Possibilities Of Attacking The Data By Intruders. This Proposed System Will Provide Efficient Data To The Receiver Without Any Intruders Stealing The Data. This System Address The Novel Problems Of Securely Sending Provenance For Data Security Using Range Partitioning, J-Bit Encoding, Des Algorithm And Secure Data Hiding Algorithm (Sdha).In Range Partitioning, It Divides The Table Records And Assigns Partition Number To It. In J-Bit Encoding Each Bit Was Encoded. That Made An Original Dataset To Encoded Data. It Works By Manipulate Bits Of Data To Reduce The Size And Optimize Input For Other Algorithm. Then Des Encryption Was Implemented. It Is A Symmetric-Key Algorithm For The Encryption Of Electronic Data. Finally The Sdha Was Implemented To Secure The Original Data. The Text Can Be Known As Cover Text Which Embedded With Original Data To Prevent Alterations To Original Data. These Security Features Can Provide An Efficient Way Of Providing Security For Of Big Data Dataset.
Authors and Affiliations
Aiswarya S, Hindu Priyadharshini M
Sensor And Location Selection Problem For Tethered Surveillance Aerostats
Today, Tethered Aerostats are one of the major Intelligence, Surveillance and Reconnaissance Systems which are used for fighting against smuggling, preventing illegal trade, monitoring terrorism and migration ways. The u...
Synthesis, Characterization and Antimicrobial screening of some new bipyridinyl substituted coumarin
The synthesis of various 7-methoxy-4-methyl-8-(4'-aryl-2',2''-bipyridin-6'-yl)coumarins (5a-c); 7- methoxy-4-methyl-8-(4'-aryl-2',3''-bipyridin-6'-yl)coumarins (6a-c) and 7-methoxy-4-methyl-8-(4'-aryl-2',4''- bipyridin-6...
Review on the Role of Mathematical Modeling in Energy Sectors
Energy plays very important roles for social and economic development of a country. It increases technological, industrial and agricultural aspects of the country. The demand for energy is also increasing day by day. In...
Pétrographie et minéralogiedes intrusions alcalines du domaine SASCA (Sud-Ouest de la Côte d’Ivoire, Craton Ouest Africain), comparaison avec d’autres plutons alcalins
Alkaline plutons in southwestern Côte d'Ivoire, mainly in the SASCA domain (Okrouyo locality), are mainly composed of silica-saturated syenite massifs, which are pyroxene-amphibole syenites and amphibole syenites, as wel...
Graph Theory Based Software Clustering Algorithm
Modern software systems are scaling up manifold in terms of size as well as complexity. The ever demanding field of software engineering makes software project development even more challenging. The implementation of suc...