An Proposal of Securing the Data at Application Level using Enhanced Schmidt Samoa in Big Data
DOI:
https://doi.org/10.26438/ijcse/v6i1.104107Keywords:
Cryptography, Policy, Data Encryption, Privileged User, Enhanced Schmidt SamoaAbstract
In the Big data world securing the sensitive data become more complex and time consuming process. In the big data sharing of sensitive, it exacerbates the threat of sensitive data falling into the un-authorized. To combat this sensitive data threat, enterprises turn to cryptosystem. In the cryptosystem encryption is the process of encoding sensitive data so that only authorized or privileged parties can decrypt and read the sensitive data applying this methodology in application level we provide complete security on the sensitive data.
References
http://www.sas.com/en_us/insights/big-data/what-is-big-data.html
https://globalecco.org/big-data-insider-threats-and-international-intelligence-sharing
"Sensitive Information" (definition) Aug. 23, 1996. Retrieved Feb. 9 2013.
"DEPARTMENT OF INDUSTRY: PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT" Canada Gazette, Apr. 03 2002. Retrieved Feb. 9 2013.
http://motherboard.vice.com/read/even-tor-cant-save-small-time-hackers
https://www.qubole.com/blog/big-data/hadoop-security-issues/
https://securosis.com/assets/library/reports/Securing_Hadoop_Final_V2.pdf
https://securosis.com/blog/securing-hadoop-architectural-security-issues
http://www.bmc.com/blogs/big-data-security-issues-challenges-for-2016/
https://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act
http://searchdatamanagement.techtarget.com/definition/HIPAA
Performance analysis of Jordan Totient RSA (JkRSA) and NTRU, International Journal of Scientific & Engineering Research, Volume 5, Issue 3, March-2014 1099 ISSN 2229-5518
https://www.vormetric.com/data-security-solutions/use-cases/privileged-user
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
