Computer Science &Amp; Information Technology ( CS &Amp; IT ) 2015
DOI: 10.5121/csit.2015.51515
|View full text |Cite
|
Sign up to set email alerts
|

A Mathematical Model of Access Control in Big Data Using Confidence Interval and Digital Signature

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 32 publications
(18 reference statements)
0
3
0
Order By: Relevance
“…Although there are a lot of benefits of using Big Data-asa-Service platform but security and privacy of the data kept in this environment becomes very critical issue. Researchers have developed various methods, frameworks and architectures that can provide the security and privacy of data but still there is a scope to address the issue of security and privacy such as access control, exposure of data, data breaches, and malicious adversary by cloud users [21] [23]. Thus, we come to know that level of protection that is needed for big data security and privacy is not assured by the cloud providers.…”
Section: Introductionmentioning
confidence: 99%
“…Although there are a lot of benefits of using Big Data-asa-Service platform but security and privacy of the data kept in this environment becomes very critical issue. Researchers have developed various methods, frameworks and architectures that can provide the security and privacy of data but still there is a scope to address the issue of security and privacy such as access control, exposure of data, data breaches, and malicious adversary by cloud users [21] [23]. Thus, we come to know that level of protection that is needed for big data security and privacy is not assured by the cloud providers.…”
Section: Introductionmentioning
confidence: 99%
“…At present, cryptography has been widely used in data access control, such as digital signature [14,15], secret sharing [16,17], ABE [18], access control encryption (ACE) [19] and so on.…”
Section: Introductionmentioning
confidence: 99%
“…A frame work which provides a big data driven model for the optimization of healthcare processes is discussed in [31]. An enlightened optimize model of access controller in big data using assurance interval and digital signatures dis-cussed in [2]. A survey of cost effective big data in healthcare applications [32] which considerably reduce the cost incurred in health care systems.…”
Section: Introductionmentioning
confidence: 99%