Jha et al., 2017 - Google Patents
Big data security and privacy: A review on issues challenges and privacy preserving methodsJha et al., 2017
View PDF- Document ID
- 14056946606036286533
- Author
- Jha A
- Dave M
- Madan S
- Publication year
- Publication venue
- International Journal of Computer Applications
External Links
Snippet
In recent years the rapid growth of Internet, IOT and Cloud Computing has led to voluminous data in almost every organization, academics and business area. Big data has rapidly developed into a hot topic that attracts extensive attention from such area around the world …
- 238000000034 method 0 abstract description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
- G06F17/30595—Relational databases
- G06F17/30598—Clustering or classification
- G06F17/30601—Clustering or classification including cluster or class visualization or browsing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/24—Editing, e.g. insert/delete
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/27—Automatic analysis, e.g. parsing
- G06F17/2765—Recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dhinakaran et al. | Protection of data privacy from vulnerability using two-fish technique with Apriori algorithm in data mining. | |
Koo et al. | Security and privacy in big data life cycle: a survey and open challenges | |
Fang et al. | A survey of big data security and privacy preserving | |
CN111149332B (en) | System and method for implementing centralized privacy controls in a decentralized system | |
US10572684B2 (en) | Systems and methods for enforcing centralized privacy controls in de-centralized systems | |
US10043035B2 (en) | Systems and methods for enhancing data protection by anonosizing structured and unstructured data and incorporating machine learning and artificial intelligence in classical and quantum computing environments | |
Silva et al. | Privacy in the cloud: A survey of existing solutions and research challenges | |
Jha et al. | Big data security and privacy: A review on issues challenges and privacy preserving methods | |
Senosi et al. | Classification and evaluation of privacy preserving data mining: a review | |
Parikh et al. | Privacy-Preserving Machine Learning Techniques, Challenges And Research Directions | |
Arshad et al. | Characterisation and quantification of user privacy: Key challenges, regulations, and future directions | |
Yadav et al. | Big data hadoop: Security and privacy | |
El Haourani et al. | Knowledge Based Access Control a model for security and privacy in the Big Data | |
El Haourani et al. | Big data security and privacy techniques | |
Kapil et al. | Securing big healthcare data using attribute and honey-based encryption in cloud environment | |
Özkoç | Privacy preserving data mining | |
Poorani et al. | Privacy-Preserving Cloud Data Security: Integrating the Novel Opacus Encryption and Blockchain Key Management. | |
Gholami et al. | Privacy-preservation for publishing sample availability data with personal identifiers | |
Jia et al. | Machine Learning Security Defense Algorithms Based on Metadata Correlation Features. | |
Jain et al. | Privacy-preserving record linkage with block-chains | |
Baumer | Identification and evaluation of concepts for privacy-enhancing big data analytics using de-identification methods on wrist-worn wearable data | |
Wadhwa et al. | Security and Privacy Challenges in Big Data | |
Gupta et al. | Privacy Challenges In Image Processing Applications | |
Adhau et al. | Information Security and Data Mining in Big Data | |
Vardalachakis et al. | Privacy Preservation in IoT: Anonymization Methods and Best Practices |