International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 114

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 10, October 2017


An Approach for Outsourced Big Data to Provide Security

Veladandi Divya


Abstract: Big data refers to the data that is regarded as by volume, velocity and variety. Spaced out from this it is also attributed to provide big value to the enterprise that harness big data in order to have full business intelligence. Cloud computing is the newly ongoing technology that provides source of huge computing sources in pay per use fashion. Cloud has positive enterprises to outsource big data as it can provide gainful services wanted. As cloud is increasingly used by data creators, it is essential to have privacy and security to be added to big data. Another reason for cause of concern is that the servers of cloud service providers are treated as unhealthy. Many researchers contributed towards providing techniques that can protect big data besides providing privacy. However, the existing research on big data privacy and security is not enough. There is room for further research to have a propose a approach in providing complete security to the outsourced data besides ensuring privacy of data owners. Towards, this research aims to propose and implement a skeleton that can have security and privacy mechanisms to ensure pool proof security to outsourced big data. The data changes are to be entertained in a secure environment. The proposed skeleton is expected to have a robust and scalable security and privacy mechanisms to provide to the needs of owners of big data.


Keywords: business intelligence, bigdata, security, privacy, data owners


Edition: Volume 6 Issue 10, October 2017,


Pages: 1271 - 1272


How to Cite this Article?

Veladandi Divya, "An Approach for Outsourced Big Data to Provide Security", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART20177468, Volume 6 Issue 10, October 2017, 1271 - 1272

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'business intelligence'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1789 - 1791

The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence

Vina Lomte, Saloni Shah

Share this Article

Downloads: 103

Review Papers, Computer Science & Engineering, India, Volume 7 Issue 5, May 2018

Pages: 1579 - 1580

A Review of Incremental Data Load on Premises to Azure

Tejaswee Poya, Rahul Mishra

Share this Article

Similar Articles with Keyword 'bigdata'

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2599 - 2602

Variable Size Bin Packing Algorithm for IoT

Kshitija Kalaskar

Share this Article

Downloads: 105

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1482 - 1485

Overview of Big Data

Nivedita Manohar

Share this Article

Similar Articles with Keyword 'security'

Downloads: 115 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 134 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Similar Articles with Keyword 'privacy'

Downloads: 134 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Similar Articles with Keyword 'data owners'

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this Article

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

Similar Articles with Keyword 'business'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1789 - 1791

The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence

Vina Lomte, Saloni Shah

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1188 - 1193

Profit Contribution of Bank Customer from Different Business Liabilities

Vinod Desai, Shalini B Ullagaddi, Vittal A Odeyar

Share this Article

Similar Articles with Keyword 'intelligence'

Downloads: 136 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1789 - 1791

The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence

Vina Lomte, Saloni Shah

Share this Article
Top