Secure Sensitive Data Sharing on Big Data Platform

Main Article Content

Shivani Kumari
Vidya Harika
Shashi V
Shruti .
Sujata K

Abstract

Utilizers store immense measures of delicate information on a major information stage. Through sharing sensitive information, we can bring down the cost of giving utilizers customized information benefits in a less demanding way. Albeit, secure information sharing is troublesome. This paper proposes a substructure for secure information sharing on a major information stage, including secure information conveyance, stockpiling, use, and decimation on a semi-trusted enormous information sharing stage which incorporates idea of intermediary reencryption calculation in light of heterogeneous figure content change. The substructure shields the security of clients' sensitive information successfully and shares this information securely. In the meantime, information proprietors hold finish control of their own information in contemporary technologies.


Downloads

Download data is not yet available.

Article Details

Section
Articles

References

J. Bethencourt, A. Sahai, and B. Waters, “Ciphertextpolicy attribute-based encryption,†in IEEE Symposium on Security and Privacy, 2007, pp. 321– 334. [2] S. Ananthi, M.S. Sendil, and S. Karthik, Privacy preserving keyword search over encrypted cloud data, in Proc. 1st Advances in Computing and Communications, Kochi,India,2011. [3] A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky, HyperSentry: Enabling stealthy incontext measurement of hypervisor integrity, in Proc.

Shivani Kumari et al, International Journal of Advanced Research in Computer Science, 9 (Special Issue III), May 2018, 89-92

Conference Paper: Third National Conference on “Advances in Computing and Information Technology†Organized by: School of Computing and Information Technology, REVA University, Bengaluru, India 92

th ACM Conference on Computer and Communications Security, Chicago, USA, 2010, pp. 38–49. [4] Trusted Computing Group, TNC architecture for interoperability, http://www.trustedcomputinggroup.org/ resources/tnc architecture for interoperability specification, 2014. [5] H. Zhang, L. Chen, and L. Zhang, Research on trusted network connection, (in Chinese), Chinese Journal of Computers, vol. 33, no. 4, pp. 706–717, 2010. [6] D. Feng, Y. Qin, D. Wang, and X. Chu, Research on trusted computing technology, (in Chinese), Journal of

Computer Research and Development, vol. 48, no. 8, pp. [7] R.E. Moore, Interval analysis (Englewood Cliffs, NJ: Prentice-Hall, 1966). [8] D.S. Chan, Theory and implementation of multidimensional discrete systems for signal processing, doctoral diss., Massachusetts Institute of Technology, Cambridge, MA, 1978. [9] W.J. Book, Modeling design and control of flexible manipulator arms: A tutorial review, Proc. 29th IEEE Conf. on Decision and Control, San Francisco, CA, 1990, 500-506.