2017
DOI: 10.1080/17445760.2017.1334777
|View full text |Cite
|
Sign up to set email alerts
|

Fast-Sec: an approach to secure Big Data processing in the cloud

Abstract: Fast-Sec: an approach to secure Big Data processing in the cloud http://researchonline.ljmu.ac.uk/7269/ Article LJMU has developed LJMU Research Online for users to access the research output of the University more effectively. Copyright © and Moral Rights for the papers on this site are retained by the individual authors and/or other copyright owners. Users may download and/or print one copy of any article(s) in LJMU Research Online to facilitate their private study or for non-commercial research. You may not… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 25 publications
(41 reference statements)
0
1
0
Order By: Relevance
“…As for the decryption process, it should be matched hash first that sent by the sender with the aim to find out if the encrypted data has changed at the time of sender or is the original data of the sender [9]. Because if the data received does not have the same hash value it means that the data received (which has been encrypted) is not the original data or has changed [2], [20]. Therefore it could not be decrypted and to be read by unauthorized receiver [21].…”
Section: Literature Reviewmentioning
confidence: 99%
“…As for the decryption process, it should be matched hash first that sent by the sender with the aim to find out if the encrypted data has changed at the time of sender or is the original data of the sender [9]. Because if the data received does not have the same hash value it means that the data received (which has been encrypted) is not the original data or has changed [2], [20]. Therefore it could not be decrypted and to be read by unauthorized receiver [21].…”
Section: Literature Reviewmentioning
confidence: 99%