Downloads: 108 | Views: 272
Research Paper | Computer Science & Engineering | India | Volume 5 Issue 10, October 2016 | Popularity: 6.9 / 10
Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks
Kapilesh S. Swami, Dr. P Sai Kiran
Abstract: The cloud computing is one of the widely used services for resource management by many IT (information technology) and non-IT organizations due to its different benefits in terms of time saving and cost savings to the companies. Such cloud computing frameworks are used to store the small to big data efficiently. Most of companies want to store huge amount of data and hence along with cloud computing it is important to have big data platforms to handle big data operations. The term big data is nothing but the huge amount of semi-structured, unstructured and structured which is having the ability of such huge information processing. Whereas cloud computing is technology which is used to provide the valuable IT services in term of resources like software, infrastructure, platform, storage etc. For both big data and cloud computing, data storage is main goal of any organization. As cloud computing is open environment technology, security is major challenge for each organization while storing their important data over the clouds. Therefore, security of data and privacy preserving is gaining the significant attention of many individual or group of researchers for both cloud computing and big data frameworks. In literature, number of security techniques introduced for data security and privacy preservation in cloud computing. The goal of this paper is to present the study over all recent data security and privacy preserving methods for cloud computing as well as big data frameworks with its comparative analysis.
Keywords: Cloud Computing, Encryption, Decryption, Privacy Preserving, Big Data, Cryptography, Data Sharing, Data Storage
Edition: Volume 5 Issue 10, October 2016
Pages: 1345 - 1350
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 12, December 2022
Pages: 962 - 966Blockchain Based Certificate Validation
Srilatha Puli, Kandhi Vaman Reddy, Kankanala Vinay, Mughaisa Fatima
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 13 Issue 3, March 2024
Pages: 1036 - 1039An Investigation of the Applications of Artificial Intelligence and Other New Technologies in Smart Energy Infrastructure
Karan Chawla