Secure Sensitive Data Sharing on Big Data Platform
Main Article Content
Abstract
Utilizers store immense measures of delicate information on a major information stage. Through sharing sensitive information, we can bring down the cost of giving utilizers customized information benefits in a less demanding way. Albeit, secure information sharing is troublesome. This paper proposes a substructure for secure information sharing on a major information stage, including secure information conveyance, stockpiling, use, and decimation on a semi-trusted enormous information sharing stage which incorporates idea of intermediary reencryption calculation in light of heterogeneous figure content change. The substructure shields the security of clients' sensitive information successfully and shares this information securely. In the meantime, information proprietors hold finish control of their own information in contemporary technologies.
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
J. Bethencourt, A. Sahai, and B. Waters, “Ciphertextpolicy attribute-based encryption,†in IEEE Symposium on Security and Privacy, 2007, pp. 321– 334. [2] S. Ananthi, M.S. Sendil, and S. Karthik, Privacy preserving keyword search over encrypted cloud data, in Proc. 1st Advances in Computing and Communications, Kochi,India,2011. [3] A. M. Azab, P. Ning, Z. Wang, X. Jiang, X. Zhang, and N. C. Skalsky, HyperSentry: Enabling stealthy incontext measurement of hypervisor integrity, in Proc.
Shivani Kumari et al, International Journal of Advanced Research in Computer Science, 9 (Special Issue III), May 2018, 89-92
Conference Paper: Third National Conference on “Advances in Computing and Information Technology†Organized by: School of Computing and Information Technology, REVA University, Bengaluru, India 92
th ACM Conference on Computer and Communications Security, Chicago, USA, 2010, pp. 38–49. [4] Trusted Computing Group, TNC architecture for interoperability, http://www.trustedcomputinggroup.org/ resources/tnc architecture for interoperability specification, 2014. [5] H. Zhang, L. Chen, and L. Zhang, Research on trusted network connection, (in Chinese), Chinese Journal of Computers, vol. 33, no. 4, pp. 706–717, 2010. [6] D. Feng, Y. Qin, D. Wang, and X. Chu, Research on trusted computing technology, (in Chinese), Journal of
Computer Research and Development, vol. 48, no. 8, pp. [7] R.E. Moore, Interval analysis (Englewood Cliffs, NJ: Prentice-Hall, 1966). [8] D.S. Chan, Theory and implementation of multidimensional discrete systems for signal processing, doctoral diss., Massachusetts Institute of Technology, Cambridge, MA, 1978. [9] W.J. Book, Modeling design and control of flexible manipulator arms: A tutorial review, Proc. 29th IEEE Conf. on Decision and Control, San Francisco, CA, 1990, 500-506.