Big Data Security Methodology

772 Words4 Pages

K.S.Rangasamy College of Technology
Tiruchengode, Namakkal.
Employing Attribute Relationship Methodology for Big Data Security
Authors:
Ramya.P E-mail: ramya1061994@gmail.com
Manjula.R
Karthikeyan.S
Abstract

There has been an increasing interest in big data and big data security with the expansion of network technology and cloud computing. However, big data is not an entirely new technology but an lean-to data mining. In this paper, we describe the background of big data, data mining and big data features, and suggest attribute selection methodology for big data for shielding the value of big data. Extracting important information is the main aim of analyzing big data which desires to be confined.
Therefore, weight between attributes …show more content…

Initially, established cryptographic primitives for the idea of data security protection cannot be directly adopted due to the users loss of control of data in Cloud Computing. Therefore, confirmation of correct data storage in the cloud must be conducted without a explicit knowledge of the whole data. Taking into consideration that various kinds of data for each user stored in the cloud and the claim of long term continuous declaration of their data safety, the problem of verifying exactness of data storage in the cloud becomes even more demanding.
Secondly, the Cloud Computing is not just considered as a third party data warehouse. The data stored in the cloud may be recurrently updated by the users, including deletion, insertion, modification, appending, reordering, etc.
The disadvantage of these techniques, which can be useful to ensure the storage accuracy without having users possessing data, cannot address all the security threats in the cloud data storage, while they are all focusing on single server set-up and most of them do not reflect on dynamic data

Open Document