2013 International Conference on Information Science and Applications (ICISA) 2013
DOI: 10.1109/icisa.2013.6579427
|View full text |Cite
|
Sign up to set email alerts
|

Big Data Security Hardening Methodology Using Attributes Relationship

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…The big data study [9] divided big data security into access control, and information security. The proposed security hardening methodology used attribute relation graph, and focused on the data value rather than the data itself.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The big data study [9] divided big data security into access control, and information security. The proposed security hardening methodology used attribute relation graph, and focused on the data value rather than the data itself.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, big data analysis provides significant opportunities for solving different information security problems by using Hadoop technologies and HDFS tools [8]. The data value that is generated from big data through the analysis phase is of extreme important [9]. However, the intensive use of big data raises new data security challenges [10]- [13], particularly when processing confidential data, such as, organization's trading secrets, personal and health information.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Attribute based encryption can also be used for big data privacy [11,12]. This method of securing big data is based on relationships among attributes present in big data.…”
Section: Traditional Data Privacy Preservation Methodsmentioning
confidence: 99%
“… Use attribute relationships for ensuring big data security [24,25].This is another method of securing big data based on relationships among attributes present in big data. The attributes that need to be protected are identified based on type of big data and company policies.…”
mentioning
confidence: 99%