2013 International Conference on IT Convergence and Security (ICITCS) 2013
DOI: 10.1109/icitcs.2013.6717808
|View full text |Cite
|
Sign up to set email alerts
|

Attribute Relationship Evaluation Methodology for Big Data Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0
1

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 48 publications
(18 citation statements)
references
References 6 publications
0
17
0
1
Order By: Relevance
“…Attribute based encryption can also be used for big data privacy [11,12]. This method of securing big data is based on relationships among attributes present in big data.…”
Section: Traditional Data Privacy Preservation Methodsmentioning
confidence: 99%
“…Attribute based encryption can also be used for big data privacy [11,12]. This method of securing big data is based on relationships among attributes present in big data.…”
Section: Traditional Data Privacy Preservation Methodsmentioning
confidence: 99%
“…However, it does not support or tackle the issue of data classification; i.e., it does not discuss handling different data types such as images, regular documents, tables, and realtime information (e.g., VoIP communications). In [3], the authors investigated the security issues encountered by big data when used in cloud networks. The main issues covered by this work are network security, information security, and privacy.…”
Section: Related Workmentioning
confidence: 99%
“…Potential challenges for big data handling consist of the following elements [3]: (i) Analysis: this process focuses on capturing, inspecting, and modeling of data in order to extract useful information.…”
Section: Introductionmentioning
confidence: 99%
“…we have studied various forms of big data analytical techniques which 34 are associated with potential applications of big data such as patients records in big organizations, breaching cannot be completely removed. Figure 2 elaborates the details of the architecture which mitigate and minimize the breaching problems.…”
Section: Mitigation Of Big Data Breachesmentioning
confidence: 99%