Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Big Data – Privacy and Management

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 107 - Number 6
Year of Publication: 2014
Authors:
Sanjay Thimmarayappa
Megha V
10.5120/18754-0012

Sanjay Thimmarayappa and Megha V. Article: Big Data - Privacy and Management. International Journal of Computer Applications 107(6):13-16, December 2014. Full text available. BibTeX

@article{key:article,
	author = {Sanjay Thimmarayappa and Megha V},
	title = {Article: Big Data - Privacy and Management},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {107},
	number = {6},
	pages = {13-16},
	month = {December},
	note = {Full text available}
}

Abstract

With big data dimensions increasing exponentially, the privacy and security issues surrounding it also magnify. Therefore, traditional security mechanisms tailored to secure small-scale, static data are insufficient. Along with the security concerns, data management also becomes an important factor to be considered. This paper discusses about big data and the challenges faced by big data with regard to privacy and management while proposing possible alternatives to overcome these challenges.

References

  • Anagnostopoulos, Aris, Michael T. Goodrich, and Roberto Tamassia. "Persistent authenticated dictionaries and their applications. " Information Security. Springer Berlin Heidelberg, 2001. 379-393.
  • Bagga, Walid, and Refik Molva. "Collusion-free policy-based encryption. "Information Security. Springer Berlin Heidelberg, 2006. 233-245.
  • Boneh, Dan, Craig Gentry, and Brent Waters. "Collusion resistant broadcast encryption with short ciphertexts and private keys. " Advances in Cryptology–CRYPTO 2005. Springer Berlin Heidelberg, 2005.
  • Feng, Jun, Yu Chen, and Pu Liu. "Bridging the missing link of cloud data storage security in AWS. " Consumer Communications and Networking Conference (CCNC), 2010 7th IEEE. IEEE, 2010.
  • Kallahalla, Mahesh, et al. "Plutus: Scalable Secure File Sharing on Untrusted Storage. " Fast. Vol. 3. 2003.
  • Majuntke, Matthias, et al. "Abortable fork-linearizable storage. " Principles of Distributed Systems. Springer Berlin Heidelberg, 2009. 255-269.
  • Onieva, Jose A. , and Jianying Zhou. Secure multi-party non-repudiation protocols and applications. Vol. 43. Springer, 2008.
  • Popa, Raluca Ada, et al. "Enabling Security in Cloud Storage SLAs with CloudProof. " USENIX Annual Technical Conference. Vol. 242. 2011.
  • Wang, Cong, et al. "Privacy-preserving public auditing for data storage security in cloud computing. " INFOCOM, 2010 Proceedings IEEE. Ieee, 2010.
  • Duhigg, Charles. "How companies learn your secrets. " New York Times 16 (2012).
  • Barbaro, Michael, Tom Zeller, and Saul Hansell. "A face is exposed for AOL searcher no. 4417749. " New York Times 9. 2008 (2006): 8For.
  • Gentry, Craig. "Computing arbitrary functions of encrypted data. "Communications of the ACM 53. 3 (2010): 97-105.
  • A. Hough. "Google engineer fired for privacy breach after 'stalking and harassing teenagers'". The Telegraph. Sept 15, 2010.
  • Haeberlen, Andreas, Benjamin C. Pierce, and Arjun Narayan. "Differential Privacy Under Fire. " USENIX Security Symposium. 2011.