International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 10, October 2017

An Approach for Outsourced Big Data to Provide Security

Veladandi Divya

Big data refers to the data that is regarded as by volume, velocity and variety. Spaced out from this it is also attributed to provide big value to the enterprise that harness big data in order to have full business intelligence. Cloud computing is the newly ongoing technology that provides source of huge computing sources in pay per use fashion. Cloud has positive enterprises to outsource big data as it can provide gainful services wanted. As cloud is increasingly used by data creators, it is essential to have privacy and security to be added to big data. Another reason for cause of concern is that the servers of cloud service providers are treated as unhealthy. Many researchers contributed towards providing techniques that can protect big data besides providing privacy. However, the existing research on big data privacy and security is not enough. There is room for further research to have a propose a approach in providing complete security to the outsourced data besides ensuring privacy of data owners. Towards, this research aims to propose and implement a skeleton that can have security and privacy mechanisms to ensure pool proof security to outsourced big data. The data changes are to be entertained in a secure environment. The proposed skeleton is expected to have a robust and scalable security and privacy mechanisms to provide to the needs of owners of big data.

Keywords: business intelligence, bigdata, security, privacy, data owners

Edition: Volume 6 Issue 10, October 2017

Pages: 1271 - 1272


How to Cite this Article?

Veladandi Divya, "An Approach for Outsourced Big Data to Provide Security", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20177468, Volume 6 Issue 10, October 2017, 1271 - 1272

23 PDF Views | 19 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'business intelligence'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1789 - 1791

The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence

Vina Lomte, Saloni Shah

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 572 - 576

A Research Article on Data Mining in Addition to Process Mining: Similarities and Dissimilarities

S. Sowjanya Chintalapati, Ch.G.V.N.Prasad, J. Sowjanya, R.Vineela

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1445 - 1448

Impala: Open Source, Native Analytic Database for Apache Hadoop - A Review Paper

Prof. Pramod Patil, Amit Patange

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 1769 - 1774

Ontology Driven Information Base Facts Retrieval

Vishal Patil

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 788 - 789

Impact of Data Warehouse in Decision Making Process

Abhishek Dabas, Vandana Dabass, Heena Mehta

Share this article

Similar Articles with Keyword 'bigdata'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1676 - 1680

A Survey on Big Data Mining Algorithms

S. Sivasankar, T. Prabhakaran

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2599 - 2602

Variable Size Bin Packing Algorithm for IoT

Kshitija Kalaskar

Share this article

Case Studies, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1486 - 1492

An Outlook on India?s Healthcare System with a Medical Case Study and Review on Big Data and its Importance in Healthcare

Saikrishna Depuru, Dr. R. Raj Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1248 - 1253

An Enhanced Approach for Resource Management Optimization in Hadoop

R. Sandeep Raj, G. Prabhakar Raju

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2103 - 2107

Analyzing Big Data Problem Using Hadoop and Cloud Technology

Hemlata S. Urade

Share this article

Similar Articles with Keyword 'security'

Research Paper, Computer Science & Engineering, United States of America, Volume 9 Issue 5, May 2020

Pages: 1472 - 1477

Cloud Computing Security Issues and their Data Privacy Concerns

Amal Matrouk Aljohani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this article

Similar Articles with Keyword 'privacy'

Research Paper, Computer Science & Engineering, United States of America, Volume 9 Issue 5, May 2020

Pages: 1472 - 1477

Cloud Computing Security Issues and their Data Privacy Concerns

Amal Matrouk Aljohani

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 709 - 711

Survey on K-Nearest Neighbor Categorization over Semantically Protected Encrypted Relational Information

Pranali D. Desai, Vinod S. Wadne

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 751 - 753

Study of Secret Sharing Schemes Using Access Structure

Ashwini Satpute, Reshma Batule, Shweta Wakalkar, Pooja Shelar

Share this article

Similar Articles with Keyword 'data owners'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1398 - 1401

A Review on Encryption Techniques to Secure a Cloud

Ramandeep Kaur, Ashish Verma

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1912 - 1916

Survey on Privacy Preserving and Data Security Techniques

Pramila Kharat, Amar Buchade

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1880 - 1884

A Dynamic Secure Group Sharing in Cloud Computing

Shobha D. Patil, Dr. Sulochana B. Sonkamble

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1821 - 1823

A Survey Paper on Cloud Storage Auditing with Key Exposure Resistance

Sneha Singha, S. D. Satav

Share this article

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1788 - 1790

Attribute Base Keyword Search Is Confirmable Over the Outsource Encrypted Data

Amruta N. Deshmukh, Komal B. Bijwe

Share this article

Top