Big data security: survey on frameworks and algorithms
Technology today has progressed to an extent wherein collection of data is possible for
every granular aspect of a business, in real time. Electronic devices, power grids and …
every granular aspect of a business, in real time. Electronic devices, power grids and …
Current security threats and prevention measures relating to cloud services, Hadoop concurrent processing, and big data
Cloud services are widely used across the globe to store and analyze Big Data. These days
it seems the news is full of stories about security breaches to these services, resulting in the …
it seems the news is full of stories about security breaches to these services, resulting in the …
Big data security in the web-based cloud storage system using 3D-AES block cipher cryptography algorithm
NAN Adnan, S Ariffin - Soft Computing in Data Science: 4th International …, 2019 - Springer
Cloud storage is described as a place to store data on the net as opposed to on-premises
arrays. It is well-known that cloud computing has many ability advantages and lots of …
arrays. It is well-known that cloud computing has many ability advantages and lots of …
Big data security in healthcare: survey on frameworks and algorithms
S Chandra, S Ray, RT Goswami - 2017 IEEE 7th International …, 2017 - ieeexplore.ieee.org
Healthcare data is increasingly being digitized today and the data collected today coming in
from all modern devices, has reached a significant volume all over the world. In the US, UK …
from all modern devices, has reached a significant volume all over the world. In the US, UK …
A trustworthy cloud environment using homomorphic encryption: a review
Z Salman, WM Elmedany - 4th Smart Cities Symposium (SCS …, 2021 - ieeexplore.ieee.org
One of the proposed techniques for cloud data security is using Homomorphic Encryption
(HE). Homomorphic encryption can provide end-to-end security for big data analytic and …
(HE). Homomorphic encryption can provide end-to-end security for big data analytic and …
[HTML][HTML] Creating an environment for detecting Identity Deception
E van der Walt, J Eloff - … Berichte des Hasso-Plattner-Instituts für …, 2017 - books.google.com
In today's interconnected world we are all exposed to potentially harmful behaviour caused
by fake identities, be they those of people or machines. It is difficult to discern whether you …
by fake identities, be they those of people or machines. It is difficult to discern whether you …
Timestamp order-preserving encryption of network traffic traces
PK Manadhata, M Arlitt, MI Sarfraz - US Patent 10,878,122, 2020 - Google Patents
According to examples, an apparatus may include a proces sor and a memory on which is
stored machine readable instructions to cause the processor to access network traffic traces …
stored machine readable instructions to cause the processor to access network traffic traces …
Datos Personales de Salud: Un Modelo de Capacidades de Ciberseguridad para prevenir la fuga de datos en entornos de Big Data
CJ Sanchez Rubio, J Osorio Choque… - repositorioacademico.upc.edu.pe
En el sector sanitario se pueden encontrar diversas fuentes de datos que contienen gran
cantidad de información relacionada con pacientes, enfermedades, tratamientos, centros …
cantidad de información relacionada con pacientes, enfermedades, tratamientos, centros …