Secure Data Sharing in Big Data
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 5
Abstract
The Storage of data is gradually increased in a huge amount. The data may contains some important or sensitive information store on a big data platform. The main use of this sharing is to share the data between the users in the secured way. which helps in reducing the cost for the enterprises and also helps in providing the value added services to the users. This paper proposes a framework for sharing the data in the secured way including storage ,usage, data delivery and destruction. We are using the ciphertext key technique in order to provide the data sharing process in secure and also safely. This framework provides security to the users information and share the data in a secure way. The owners will have the complete control on the data they have shared and also they will maintain the data that a particular user have been accessed. In this way this will protects the data securely and share the data safely.
Authors and Affiliations
J. V. N. S. Prasanth, Pattabiraman. V
Review on Real Time Data Encryption in H.264/Avc Video Streams by Exploiting IPCM Microblocks
In daily life, there is an increase in the use of multimedia applications such video conferencing, video telephony, stream video/audio online etc. For the purpose of highly secure data transmission safely, there is a re...
Improvement of Pavement Soil Subgrade by using Burnt Brick Dust
To stabilize the clayey soil, an experiment is conducted to evaluate the properties of soil blending with different percentage of Burnt Brick Dust of 10%, 20%, 30%, 40% and 50% by weight and then the tests are performed...
Heat Transfer Enhancement Techniques for Solar Air Heater – A Review
Solar air heater is one of the most valuable heat sources of energy with variety of applications such as industrial process heating, space heating, drying of fruits and vegetables, etc. It is renewable as well as pollut...
CRA Role in Identity-Based Encryption for Its Applications
Identicalness based Cryptography is an id based cryptography which depends on the user identity, (IBE) is a world Key cryptoorganisation and eliminates the need of public paint infrastructure (PKI) and certicate adminis...
Inherent Selection Of Tuberculosis Using Graph Cut Segmentation
Tuberculosis (TB) is a major global health threat. An estimated one-third of the world’s population has been exposed to TB, and millions of new infections are occurring every year. Tuberculosis naturally affects the lun...