Mahmoud et al., 2018 - Google Patents
An approach for big data security based on Hadoop distributed file systemMahmoud et al., 2018
View PDF- Document ID
- 17190515314014553580
- Author
- Mahmoud H
- Hegazy A
- Khafagy M
- Publication year
- Publication venue
- 2018 International Conference on Innovative Trends in Computer Engineering (ITCE)
External Links
Snippet
Cloud computing appeared for huge data because of its ability to provide users with on- demand, reliable, flexible, and low-cost services. With the increasing use of cloud applications, data security protection has become an important issue for the cloud. In this …
- 238000000034 method 0 description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mahmoud et al. | An approach for big data security based on Hadoop distributed file system | |
JP2022133423A (en) | Encrypted asset encryption key parts that allow assembly of asset encryption keys using a subset of encrypted asset encryption key parts | |
US9118645B2 (en) | Distributed authentication using persistent stateless credentials | |
US10608813B1 (en) | Layered encryption for long-lived data | |
US20170163413A1 (en) | System and Method for Content Encryption in a Key/Value Store | |
Selvakumar et al. | PDDS-Improving cloud data storage security using data partitioning technique | |
US10476663B1 (en) | Layered encryption of short-lived data | |
CN116635847A (en) | Implementing resilient deterministic encryption | |
US11683159B2 (en) | Hybrid content protection architecture | |
CN106919348A (en) | Distributed memory system and storage method that anti-violence is cracked | |
CN111726230A (en) | Data storage method, data recovery method, device and equipment | |
Yousif et al. | Enhancing approach for information security in hadoop | |
CA3056814A1 (en) | Symmetric cryptographic method and system and applications thereof | |
Khedkar et al. | Data partitioning technique to improve cloud data storage security | |
US11290277B2 (en) | Data processing system | |
WO2016202089A1 (en) | Method, apparatus, and system for encrypting data of remote storage device | |
US11283600B2 (en) | Symmetrically encrypt a master passphrase key | |
US11356254B1 (en) | Encryption using indexed data from large data pads | |
Grover et al. | A framework for cloud data security | |
Alrehaili et al. | Cloud computing security challenges | |
Sundarakumar et al. | Authorization for secured cloud storage through SHA-256 | |
Bhalibar et al. | Centralize Storage System with Encryption vs Decentralize Storage System Using Blockchain | |
Khafagy et al. | Hybrid-Key Stream Cipher Mechanism for Hadoop Distributed File System Security | |
JP2013207368A (en) | Data management device, data division device, and data restoration device | |
Dwivedi et al. | Analysis of Novel Hybrid Encryption Algorithm for Providing Security in Big Data |