An Proposal of Securing the Data at Application Level using Enhanced Schmidt Samoa in Big Data
Narayana Galla1 , Padmavathamma Mokkala2
- Dept. of Computer Science, Rayalaseema University, Kurnool, India.
- Dept. of Computer Science, S.V.University, Tirupati, India.
Correspondence should be addressed to: phd.narayana@gmail.com.
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-1 , Page no. 104-107, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.104107
Online published on Jan 31, 2018
Copyright © Narayana Galla, Padmavathamma Mokkala . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Narayana Galla, Padmavathamma Mokkala, “An Proposal of Securing the Data at Application Level using Enhanced Schmidt Samoa in Big Data,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.104-107, 2018.
MLA Style Citation: Narayana Galla, Padmavathamma Mokkala "An Proposal of Securing the Data at Application Level using Enhanced Schmidt Samoa in Big Data." International Journal of Computer Sciences and Engineering 6.1 (2018): 104-107.
APA Style Citation: Narayana Galla, Padmavathamma Mokkala, (2018). An Proposal of Securing the Data at Application Level using Enhanced Schmidt Samoa in Big Data. International Journal of Computer Sciences and Engineering, 6(1), 104-107.
BibTex Style Citation:
@article{Galla_2018,
author = {Narayana Galla, Padmavathamma Mokkala},
title = {An Proposal of Securing the Data at Application Level using Enhanced Schmidt Samoa in Big Data},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2018},
volume = {6},
Issue = {1},
month = {1},
year = {2018},
issn = {2347-2693},
pages = {104-107},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1641},
doi = {https://doi.org/10.26438/ijcse/v6i1.104107}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i1.104107}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1641
TI - An Proposal of Securing the Data at Application Level using Enhanced Schmidt Samoa in Big Data
T2 - International Journal of Computer Sciences and Engineering
AU - Narayana Galla, Padmavathamma Mokkala
PY - 2018
DA - 2018/01/31
PB - IJCSE, Indore, INDIA
SP - 104-107
IS - 1
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
748 | 538 downloads | 419 downloads |
Abstract
In the Big data world securing the sensitive data become more complex and time consuming process. In the big data sharing of sensitive, it exacerbates the threat of sensitive data falling into the un-authorized. To combat this sensitive data threat, enterprises turn to cryptosystem. In the cryptosystem encryption is the process of encoding sensitive data so that only authorized or privileged parties can decrypt and read the sensitive data applying this methodology in application level we provide complete security on the sensitive data.
Key-Words / Index Term
Cryptography – Policy – Data Encryption - Privileged User – Enhanced Schmidt Samoa
References
[1] http://www.sas.com/en_us/insights/big-data/what-is-big-data.html
[2] https://globalecco.org/big-data-insider-threats-and-international-intelligence-sharing
[3] "Sensitive Information" (definition) Aug. 23, 1996. Retrieved Feb. 9 2013.
[4] "DEPARTMENT OF INDUSTRY: PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT" Canada Gazette, Apr. 03 2002. Retrieved Feb. 9 2013.
[5] http://motherboard.vice.com/read/even-tor-cant-save-small-time-hackers
[6] https://www.qubole.com/blog/big-data/hadoop-security-issues/
[7] https://securosis.com/assets/library/reports/Securing_Hadoop_Final_V2.pdf
[8] https://securosis.com/blog/securing-hadoop-architectural-security-issues
[9] http://www.bmc.com/blogs/big-data-security-issues-challenges-for-2016/
[10] https://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act
[11] http://searchdatamanagement.techtarget.com/definition/HIPAA
[12] http://blog.vormetric.com/2015/06/23/locking-down-data-full-disk-encryption-vs-file-level-encryption/
[13] Performance analysis of Jordan Totient RSA (JkRSA) and NTRU, International Journal of Scientific & Engineering Research, Volume 5, Issue 3, March-2014 1099 ISSN 2229-5518
[14] https://www.vormetric.com/data-security-solutions/use-cases/privileged-user