A review on security and privacy challenges of big data

M Singh, MN Halgamuge, G Ekici… - Cognitive Computing for …, 2018 - Springer
Big data has a growing number of confidentiality and security issues. New technology
doubtlessly brings people benefits, privileges, convenience and efficiencies, with …

Database security using encryption

P Singh, K Kaur - 2015 International Conference on Futuristic …, 2015 - ieeexplore.ieee.org
Security of Data is the most important task in today's world. Over the years various
encryption schemes have been developed in order to protect the database from various …

Light weight and secure database encryption using tsfs algorithm

D Manivannan, R Sujarani - 2010 Second International …, 2010 - ieeexplore.ieee.org
Database security has paramount importance in industrial, civilian and government
domains. Organizations are storing huge amount of data in database for data mining and …

[PDF][PDF] Query with SUM aggregate function on encrypted floating-point numbers in cloud

T Zhu, X Zou, J Pan - Journal of Information Processing Systems, 2017 - koreascience.kr
Cloud computing is an attractive solution that can provide low cost storage and powerful
processing capabilities for government agencies or enterprises of small and medium size …

[PDF][PDF] Lightweight symmetric encryption algorithm for secure database

H Al-Souly, A Al-Sheddi, H Kurdi - Science and Information Conference, 2013 - Citeseer
Virtually all of today's organizations store their data in huge databases to retrieve,
manipulate and share them in an efficient way. Due to the popularity of databases for storing …

Improvement of ETSFS algorithm for secure database

P Uduthalapally, B Zhou - 2016 4th international symposium …, 2016 - ieeexplore.ieee.org
In the present era, one of the major encounters is data security. Most organizations store
their data in huge databases that enables uncomplicated retrieval, manipulations, and also …

Big data security, privacy protection, tools and applications

A Shahzad, HUR Kayani, AA Malik, MA Raza… - Pakistan Journal of …, 2023 - pjosr.com
Innovative and sophisticated technologies have been rapidly developing in recent years.
These cutting-edge advancements encompass a wide spectrum of devices like mobile …

Multi-Layered Security Model for Hadoop Environment: Security Model for Hadoop

PV Paul, D Veeraiah - International Journal of Handheld Computing …, 2017 - igi-global.com
In this article, a novel security model for the Hadoop environment has been developed to
enhance security credentials of handheld systems. The proposed system deals with …

Notice of Removal: New proposed Z-transform based encryption algorithm

F Al-Anzi, M Al-Enezi, J Soni - 2016 6th International Conference on …, 2016 - computer.org
The foremost aim of designing of any encryption algorithm must be security against unlawful
attacks. However, performance and the cost of implementation could be some another …

Interactive multi-layer policies for securing relational databases

MH Abdel-Aziz, IM El-Henawy… - … on Information Society (i …, 2012 - ieeexplore.ieee.org
The security of database depends on a set of systems, roles, procedures, and processes that
protect the entire database from unintended activities. These unintended activities can be …