2014 IEEE 5th International Conference on Software Engineering and Service Science 2014
DOI: 10.1109/icsess.2014.6933621
|View full text |Cite
|
Sign up to set email alerts
|

A new solution of data security accessing for Hadoop based on CP-ABE

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 5 publications
0
7
0
Order By: Relevance
“…Information protection is of more interest and importance to all within the world of technology now, whether you are a smartphone or a computer user, this is why information security remains of the common essential in our daily experience, and in the IT technology areas [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19]. Information security research contains many ideas including issues that every IT specialist must master or possess amazing basics of experience and knowledge of information security, they are just a few essentials for all those affected in the IT sector.…”
Section: Security Issuesmentioning
confidence: 99%
See 1 more Smart Citation
“…Information protection is of more interest and importance to all within the world of technology now, whether you are a smartphone or a computer user, this is why information security remains of the common essential in our daily experience, and in the IT technology areas [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19]. Information security research contains many ideas including issues that every IT specialist must master or possess amazing basics of experience and knowledge of information security, they are just a few essentials for all those affected in the IT sector.…”
Section: Security Issuesmentioning
confidence: 99%
“…Eventually the RSA private key is secured using IDEA (international data encryption algorithm). Zhou et al [9] They present CP-ABE (Cipher text policy attribute based encryption) scheme for access control instead of the traditional schemes like PKI, which requires all relevant customer data to be sent to the resource provider, thus destroying the privacy of the user, and takes more bandwidth and overhead processing. Jam et al [10] point out that currently, the core technology of cloud computing are services security and data privacy.…”
mentioning
confidence: 99%
“…Eventually, the results moved to the output folder of HDFS (Dean & Ghemawat, 2008). MapReduce in Hadoop is an application software designed for processing huge volumes of data sets over machine set (Zhou & Wen, 2014). MapReduce is the core scheme used by the Hadoop system for spreading a bunch of work.…”
Section: Big Data and Hadoopmentioning
confidence: 99%
“…Eventually, the RSA private key is secured using the IDEA (International Data Encryption Algorithm). Huixiang Zhou et al (Zhou & Wen, 2014) They present CP-ABE (Ciphertext policy attribute-based encryption) scheme for access control instead of the traditional schemes like PKI, which requires all relevant customer data to be sent to the resource provider, thus destroying the privacy of the user, and takes more bandwidth and overhead processing. Masoumeh Rezaei Jam et al (Jam, Khanli, Akbari & Javan, 2014 ) point out that currently, the core technology of cloud computing are services security and data privacy.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, CP-ABE is a better choice in some applications. Currently ABE has been widely used in the access control, such as Zhou [4] , Xu [5] , Guo [6] .…”
Section: Introductionmentioning
confidence: 99%