Nothing Special   »   [go: up one dir, main page]

Filaly et al., 2023 - Google Patents

Hybrid Encryption Algorithm for Information Security in Hadoop

Filaly et al., 2023

Document ID
388267980025828740
Author
Filaly Y
Berros N
Younes El Bouzekri E
et al.
Publication year
Publication venue
International Journal of Advanced Computer Science and Applications

External Links

Snippet

Network security has gained importance in recent years. Information system security is greatly aided by the development of encryption as a solution. To safeguard the shared information, several strategies are required. Thanks to the cutting-edge Internet, networking …
Continue reading at search.proquest.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material

Similar Documents

Publication Publication Date Title
Chinnasamy et al. Efficient data security using hybrid cryptography on cloud computing
Tahir et al. CryptoGA: a cryptosystem based on genetic algorithm for cloud data security
Daniel et al. LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment
Zhang et al. Data security sharing model based on privacy protection for blockchain‐enabled industrial Internet of Things
Ahmad et al. Hybrid cryptographic approach to enhance the mode of key management system in cloud environment
Huang et al. Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing
Ukwuoma et al. Post-quantum cryptography-driven security framework for cloud computing
Suresh et al. Securing personal health record system in cloud using user usage based encryption
Gajmal et al. Blockchain-based access control and data sharing mechanism in cloud decentralized storage system
Mythili et al. An attribute-based lightweight cloud data access control using hypergraph structure
Jin et al. Blockchain-based secure and privacy-preserving clinical data sharing and integration
Shen et al. BMSE: Blockchain-based multi-keyword searchable encryption for electronic medical records
Thangapandiyan et al. Quantum key distribution and cryptography mechanisms for cloud data security
Vamsi et al. Electronic health record security in cloud: Medical data protection using homomorphic encryption schemes
Wang et al. A User‐Centered Medical Data Sharing Scheme for Privacy‐Preserving Machine Learning
Filaly et al. Hybrid Encryption Algorithm for Information Security in Hadoop
Mohanraj et al. Hybrid encryption algorithm for big data security in the Hadoop distributed file system
Mahapatra et al. Security model for preserving privacy of image in cloud
Rowe et al. The curious case of the half-half bitcoin ECDSA nonces
Kanagala et al. Effective encryption approach to improving the secure cloud framework through fuzzy-based encrypted cryptography
Satheesh et al. AB-DAM: attribute-based data access model in blockchain for healthcare applications
Baseera et al. Enhancing Blockchain Security Using Ripple Consensus Algorithm.
Ul Haq et al. A novel data classification-based scheme for cloud data security using various cryptographic algorithms
Ghanbarafjeh et al. Developing a secure architecture for internet of medical things using attribute-based encryption
Narula et al. A novel review on healthcare data encryption techniques