Open Access   Article Go Back

An Proposal of Securing the Data at Application Level using Enhanced Schmidt Samoa in Big Data

Narayana Galla1 , Padmavathamma Mokkala2

  1. Dept. of Computer Science, Rayalaseema University, Kurnool, India.
  2. Dept. of Computer Science, S.V.University, Tirupati, India.

Correspondence should be addressed to: phd.narayana@gmail.com.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-1 , Page no. 104-107, Jan-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.104107

Online published on Jan 31, 2018

Copyright © Narayana Galla, Padmavathamma Mokkala . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Narayana Galla, Padmavathamma Mokkala, “An Proposal of Securing the Data at Application Level using Enhanced Schmidt Samoa in Big Data,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.104-107, 2018.

MLA Style Citation: Narayana Galla, Padmavathamma Mokkala "An Proposal of Securing the Data at Application Level using Enhanced Schmidt Samoa in Big Data." International Journal of Computer Sciences and Engineering 6.1 (2018): 104-107.

APA Style Citation: Narayana Galla, Padmavathamma Mokkala, (2018). An Proposal of Securing the Data at Application Level using Enhanced Schmidt Samoa in Big Data. International Journal of Computer Sciences and Engineering, 6(1), 104-107.

BibTex Style Citation:
@article{Galla_2018,
author = {Narayana Galla, Padmavathamma Mokkala},
title = {An Proposal of Securing the Data at Application Level using Enhanced Schmidt Samoa in Big Data},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2018},
volume = {6},
Issue = {1},
month = {1},
year = {2018},
issn = {2347-2693},
pages = {104-107},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1641},
doi = {https://doi.org/10.26438/ijcse/v6i1.104107}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i1.104107}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1641
TI - An Proposal of Securing the Data at Application Level using Enhanced Schmidt Samoa in Big Data
T2 - International Journal of Computer Sciences and Engineering
AU - Narayana Galla, Padmavathamma Mokkala
PY - 2018
DA - 2018/01/31
PB - IJCSE, Indore, INDIA
SP - 104-107
IS - 1
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
620 407 downloads 341 downloads
  
  
           

Abstract

In the Big data world securing the sensitive data become more complex and time consuming process. In the big data sharing of sensitive, it exacerbates the threat of sensitive data falling into the un-authorized. To combat this sensitive data threat, enterprises turn to cryptosystem. In the cryptosystem encryption is the process of encoding sensitive data so that only authorized or privileged parties can decrypt and read the sensitive data applying this methodology in application level we provide complete security on the sensitive data.

Key-Words / Index Term

Cryptography – Policy – Data Encryption - Privileged User – Enhanced Schmidt Samoa

References

[1] http://www.sas.com/en_us/insights/big-data/what-is-big-data.html
[2] https://globalecco.org/big-data-insider-threats-and-international-intelligence-sharing
[3] "Sensitive Information" (definition) Aug. 23, 1996. Retrieved Feb. 9 2013.
[4] "DEPARTMENT OF INDUSTRY: PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT" Canada Gazette, Apr. 03 2002. Retrieved Feb. 9 2013.
[5] http://motherboard.vice.com/read/even-tor-cant-save-small-time-hackers
[6] https://www.qubole.com/blog/big-data/hadoop-security-issues/
[7] https://securosis.com/assets/library/reports/Securing_Hadoop_Final_V2.pdf
[8] https://securosis.com/blog/securing-hadoop-architectural-security-issues
[9] http://www.bmc.com/blogs/big-data-security-issues-challenges-for-2016/
[10] https://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act
[11] http://searchdatamanagement.techtarget.com/definition/HIPAA
[12] http://blog.vormetric.com/2015/06/23/locking-down-data-full-disk-encryption-vs-file-level-encryption/
[13] Performance analysis of Jordan Totient RSA (JkRSA) and NTRU, International Journal of Scientific & Engineering Research, Volume 5, Issue 3, March-2014 1099 ISSN 2229-5518
[14] https://www.vormetric.com/data-security-solutions/use-cases/privileged-user