Filaly et al., 2023 - Google Patents
Hybrid Encryption Algorithm for Information Security in HadoopFilaly et al., 2023
- Document ID
- 388267980025828740
- Author
- Filaly Y
- Berros N
- Younes El Bouzekri E
- et al.
- Publication year
- Publication venue
- International Journal of Advanced Computer Science and Applications
External Links
Snippet
Network security has gained importance in recent years. Information system security is greatly aided by the development of encryption as a solution. To safeguard the shared information, several strategies are required. Thanks to the cutting-edge Internet, networking …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chinnasamy et al. | Efficient data security using hybrid cryptography on cloud computing | |
Tahir et al. | CryptoGA: a cryptosystem based on genetic algorithm for cloud data security | |
Daniel et al. | LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment | |
Zhang et al. | Data security sharing model based on privacy protection for blockchain‐enabled industrial Internet of Things | |
Ahmad et al. | Hybrid cryptographic approach to enhance the mode of key management system in cloud environment | |
Huang et al. | Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing | |
Ukwuoma et al. | Post-quantum cryptography-driven security framework for cloud computing | |
Suresh et al. | Securing personal health record system in cloud using user usage based encryption | |
Gajmal et al. | Blockchain-based access control and data sharing mechanism in cloud decentralized storage system | |
Mythili et al. | An attribute-based lightweight cloud data access control using hypergraph structure | |
Jin et al. | Blockchain-based secure and privacy-preserving clinical data sharing and integration | |
Shen et al. | BMSE: Blockchain-based multi-keyword searchable encryption for electronic medical records | |
Thangapandiyan et al. | Quantum key distribution and cryptography mechanisms for cloud data security | |
Vamsi et al. | Electronic health record security in cloud: Medical data protection using homomorphic encryption schemes | |
Wang et al. | A User‐Centered Medical Data Sharing Scheme for Privacy‐Preserving Machine Learning | |
Filaly et al. | Hybrid Encryption Algorithm for Information Security in Hadoop | |
Mohanraj et al. | Hybrid encryption algorithm for big data security in the Hadoop distributed file system | |
Mahapatra et al. | Security model for preserving privacy of image in cloud | |
Rowe et al. | The curious case of the half-half bitcoin ECDSA nonces | |
Kanagala et al. | Effective encryption approach to improving the secure cloud framework through fuzzy-based encrypted cryptography | |
Satheesh et al. | AB-DAM: attribute-based data access model in blockchain for healthcare applications | |
Baseera et al. | Enhancing Blockchain Security Using Ripple Consensus Algorithm. | |
Ul Haq et al. | A novel data classification-based scheme for cloud data security using various cryptographic algorithms | |
Ghanbarafjeh et al. | Developing a secure architecture for internet of medical things using attribute-based encryption | |
Narula et al. | A novel review on healthcare data encryption techniques |