Secure Big Data Access Control Policies for Cloud Computing Environment
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2017, Vol 5, Issue 2
Abstract
As the term indicates the Big data it means we are work for the something big or can say something large in the Amount, Data the high volume is known as the big data.Now a Day for storing the data file in the Computer Science Engineering we are used the Hard disk, some of the storage place , these storage device may store the data in a Giga byte capability and Terabyte capability or many more, Now a day we are used the some new technology call the cloud environment. So in this work I am study the big data storing process in the Cloud environment, big data fetching from the cloud in a securer manner. So in this dissertation work I am also include the some information about the existing work and some of the algorithm that war already proposed by the researcher in the various paper. My work is based on the Attribute-Based Encryption(ABE) is promising technique to ensure the end-to-end security of big data in the cloud However, the policy updating has always been a challenging issue when ABE is used to construct access control schemes.
Authors and Affiliations
Taniya Jain
GIS Based Route Optimization for Effective Traffic Management: A Case Study of Srinagar City
One of the most crucial requirements for effective traffic management in cities is route optimization. Geographical information system (GIS) spatial analysis technique is important for route optimization. Route optimizat...
In Tharaka South, Eastern Kenya, Socio-Economic Variables Influence the Use of Rainwater Collecting and Conservation Methods
Rainwater harvesting and conserving technologies are essential interventions for water supply and food production in Kenya's dry and semi-arid regions due to low soil moisture levels. Despite extensive study on the subje...
Precision Irrigation in Agriculture Using an IoT Based Smart Water Management Platform: A Review Paper
Water is available for something like the world's public's energy security, with agribusiness accounted for 70% of river use. Leaks in transit and land management, while also suitable processing practices, are the leadin...
Prediction of Financial Crime Using Machine Learning
The purpose of data analytics is to uncover previously unknown patterns and make use of such patterns to help in making educated decisions across a wide range of contexts. Because of advances in modern technology and the...
An Overview on Neurotoxic Pollutants by Biochemical Markers
Neurotoxins produce molecular and biochemical processes that suggest early-stage effects on exposed people much before or below open illness development. Studying these early occurrences may be a legitimate way to create...