A platform for research: civil engineering, architecture and urbanism
Protecting and Securing Sensitive Data in a Big Data Using Encryption
The Transaction data which contains a sensitive data, a program like a android app or a browser, does not adequatelyprotect information such as unique values or related payment information, more or likely a privacy concern. In most of thecases, security breaches, which involve the unstructured data like documents and files, will reveal all sensitive information.To address this issue the transaction data can be processed across the nodes based on Advanced Encryption Standard(AES)algorithm for generating keys and also by using MapReduce algorithm to check number of sensitive data, where we willpartition the data based on set key value pairs, whereby protecting the raw data using real-time security monitoring. Thedata, which requires an extra protection, needs to be identified, based on that data can be encrypted.
Protecting and Securing Sensitive Data in a Big Data Using Encryption
The Transaction data which contains a sensitive data, a program like a android app or a browser, does not adequatelyprotect information such as unique values or related payment information, more or likely a privacy concern. In most of thecases, security breaches, which involve the unstructured data like documents and files, will reveal all sensitive information.To address this issue the transaction data can be processed across the nodes based on Advanced Encryption Standard(AES)algorithm for generating keys and also by using MapReduce algorithm to check number of sensitive data, where we willpartition the data based on set key value pairs, whereby protecting the raw data using real-time security monitoring. Thedata, which requires an extra protection, needs to be identified, based on that data can be encrypted.
Protecting and Securing Sensitive Data in a Big Data Using Encryption
Praveen Banasode (author) / Sunita Padmannavar (author)
2020
Article (Journal)
Electronic Resource
Unknown
Metadata by DOAJ is licensed under CC BY-SA 1.0
Technology: Protecting sensitive patient data
British Library Online Contents | 2006
Securing remote data centre management
British Library Online Contents | 2007
|TIBKAT | 1977
An Energy-Efficient Virtualization-Based Secure Platform for Protecting Sensitive User Data
DOAJ | 2017
|