International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064




Downloads: 108 | Views: 207

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 10, October 2016 | Rating: 6.9 / 10


Security Methods for Privacy Preserving and Data Sharing Over Cloud Computing and Big Data Frameworks

Kapilesh S. Swami | Dr. P Sai Kiran


Abstract: The cloud computing is one of the widely used services for resource management by many IT (information technology) and non-IT organizations due to its different benefits in terms of time saving and cost savings to the companies. Such cloud computing frameworks are used to store the small to big data efficiently. Most of companies want to store huge amount of data and hence along with cloud computing it is important to have big data platforms to handle big data operations. The term big data is nothing but the huge amount of semi-structured, unstructured and structured which is having the ability of such huge information processing. Whereas cloud computing is technology which is used to provide the valuable IT services in term of resources like software, infrastructure, platform, storage etc. For both big data and cloud computing, data storage is main goal of any organization. As cloud computing is open environment technology, security is major challenge for each organization while storing their important data over the clouds. Therefore, security of data and privacy preserving is gaining the significant attention of many individual or group of researchers for both cloud computing and big data frameworks. In literature, number of security techniques introduced for data security and privacy preservation in cloud computing. The goal of this paper is to present the study over all recent data security and privacy preserving methods for cloud computing as well as big data frameworks with its comparative analysis.


Keywords: Cloud Computing, Encryption, Decryption, Privacy Preserving, Big Data, Cryptography, Data Sharing, Data Storage


Edition: Volume 5 Issue 10, October 2016,


Pages: 1345 - 1350



How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top