Behera et al., 2018 - Google Patents
Big data security threats and prevention measures in cloud and HadoopBehera et al., 2018
- Document ID
- 7738113603247566109
- Author
- Behera M
- Rasool A
- Publication year
- Publication venue
- Data Management, Analytics and Innovation: Proceedings of ICDMAI 2018, Volume 1
External Links
Snippet
Big Data, collection of huge data sets is a widely used concept in present world. Although being stored and analyzed by Cloud services, it poses the greatest challenge of security threats, occurring in the exposure of enormous amount of data. This paper we are going to …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
- G06F17/30144—Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12143395B2 (en) | Low trust privileged access management | |
| US20200228574A1 (en) | Policy management for data migration | |
| US11757850B2 (en) | Distributed logging for securing non-repudiable multi-party transactions | |
| BR112016015458B1 (en) | SYSTEM AND METHOD FOR BIOMETRIC PROTOCOL STANDARDS | |
| US11575499B2 (en) | Self auditing blockchain | |
| CN118260264A (en) | A user-friendly encrypted storage system and method for distributed file systems | |
| Meetei et al. | Security issues in cloud computing | |
| Mehak et al. | Security aspects of database-as-a-service (DBaaS) in cloud computing | |
| Kaur et al. | Enhancing features of cloud computing using cloud access security brokers to avoid data breaches | |
| Behera et al. | Big data security threats and prevention measures in cloud and Hadoop | |
| US11880482B2 (en) | Secure smart containers for controlling access to data | |
| Ngo et al. | Serverless computing architecture security and quality analysis for back-end development | |
| Lakhe | Practical Hadoop Security | |
| Shahin et al. | Big data platform privacy and security, a review | |
| Madhura et al. | Designing an optimized confidential-data management system using preeminent access-control and block-chain | |
| Belhadaoui et al. | A Role-Attribute Based Access Control Model for Dynamic Access Control in Hadoop Ecosystem. | |
| Kirkman et al. | Bridging the cloud trust gap: Using orcon policy to manage consumer trust between different clouds | |
| Solsol et al. | Security mechanisms in NoSQL dbms’s: A technical review | |
| Beleuta | Data privacy and security in Business Intelligence and Analytics | |
| Karlzén | An Analysis of Security Information and Event Management Systems-The Use or SIEMs for Log Collection, Management and Analysis | |
| Sánchez et al. | An Intercepting API-Based Access Control Approach for Mobile Applications. | |
| Medvinsky et al. | From social engineering to quantum threats: safeguarding user wallets with FailSafe | |
| Vijay | Chaurasiya., et al | |
| Chu | Apache Hadoop: A Review on Security Issues and Solutions for HDFS | |
| LEBDAOUI et al. | Preliminary Analysis of HDFS Read Operation, Threats Impacts and Mitigation |