An Enhanced Schmidt Samoa Cryptosystem for Securing Health Care information in Big Data Scenario
Keywords:
Cryptography, Policy, Data Encryption, Enhanced Schmidt Samoa, Privileged UserAbstract
In Data sources for information feed into a Big Data achievement as you might expect contain sensitive or confined information or key logical property along with non-sensitive data. In the Big data world securing the sensitive data be renewed into more intricate and time overwhelming process. In the big data distribution of sensitive, it exacerbates the threat of sensitive data falling into the un-authorized. To battle this sensitive data threat, enterprises turn to cryptosystem. In the cryptosystem encryption is the process of encoding sensitive data so that only authorized or privileged parties can decrypt and read the sensitive data applying this methodology in application level we provide complete security on the sensitive data.
References
[1] http://www.sas.com/en_us/insights/big-data/what-is-big-data.html
[2] https://globalecco.org/big-data-insider-threats-and-international-intelligence-sharing
[3] "Sensitive Information" (definition) Aug. 23, 1996. Retrieved Feb. 9 2013.
[4] "DEPARTMENT OF INDUSTRY: PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT" Canada Gazette, Apr. 03 2002. Retrieved Feb. 9 2013.
[5] http://motherboard.vice.com/read/even-tor-cant-save-small-time-hackers
[6] https://www.qubole.com/blog/big-data/hadoop-security-issues/
[7] https://securosis.com/assets/library/reports/Securing_Hadoop_Final_V2.pdf
[8] https://securosis.com/blog/securing-hadoop-architectural-security-issues
[9] http://www.bmc.com/blogs/big-data-security-issues-challenges-for-2016/
[10] https://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act
[11] http://searchdatamanagement.techtarget.com/definition/HIPAA
[13] Performance analysis of Jordan Totient RSA (JkRSA) and NTRU, International Journal of Scientific & Engineering Research, Volume 5, Issue 3, March-2014 1099 ISSN 2229-5518
[14] https://www.vormetric.com/data-security-solutions/use-cases/privileged-user
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Narayana Galla, Padmavathamma Mokkala

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
