Downloads: 115 | Views: 241
Research Paper | Computer Science & Engineering | India | Volume 6 Issue 10, October 2017 | Popularity: 6.3 / 10
An Approach for Outsourced Big Data to Provide Security
Veladandi Divya
Abstract: Big data refers to the data that is regarded as by volume, velocity and variety. Spaced out from this it is also attributed to provide big value to the enterprise that harness big data in order to have full business intelligence. Cloud computing is the newly ongoing technology that provides source of huge computing sources in pay per use fashion. Cloud has positive enterprises to outsource big data as it can provide gainful services wanted. As cloud is increasingly used by data creators, it is essential to have privacy and security to be added to big data. Another reason for cause of concern is that the servers of cloud service providers are treated as unhealthy. Many researchers contributed towards providing techniques that can protect big data besides providing privacy. However, the existing research on big data privacy and security is not enough. There is room for further research to have a propose a approach in providing complete security to the outsourced data besides ensuring privacy of data owners. Towards, this research aims to propose and implement a skeleton that can have security and privacy mechanisms to ensure pool proof security to outsourced big data. The data changes are to be entertained in a secure environment. The proposed skeleton is expected to have a robust and scalable security and privacy mechanisms to provide to the needs of owners of big data.
Keywords: business intelligence, bigdata, security, privacy, data owners
Edition: Volume 6 Issue 10, October 2017
Pages: 1271 - 1272
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar, Hima Saxena, Dr. Suman Sharma
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022
Pages: 455 - 459Real World IoT Applications in Daily Domain
Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad
Downloads: 0
Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 7, July 2022
Pages: 1023 - 1029A Survey and High-Level Design on Human Activity Recognition
Abhishikat Kumar Soni, Dhruv Agrawal, Md. Ahmed Ali, Dr. B. G. Prasad