Prevention of Attacks on Big Data Records by Multiple Security Strategies

Journal Title: International Journal of Engineering and Science Invention - Year 2018, Vol 7, Issue 4

Abstract

This Project Formulates The Several Types Of Big Data Relational Database Securities As A Constrained Efficient Techniques To Solve The Security Problems. While Transferring Data From One Server To Another There Are Many Possibilities Of Attacking The Data By Intruders. This Proposed System Will Provide Efficient Data To The Receiver Without Any Intruders Stealing The Data. This System Address The Novel Problems Of Securely Sending Provenance For Data Security Using Range Partitioning, J-Bit Encoding, Des Algorithm And Secure Data Hiding Algorithm (Sdha).In Range Partitioning, It Divides The Table Records And Assigns Partition Number To It. In J-Bit Encoding Each Bit Was Encoded. That Made An Original Dataset To Encoded Data. It Works By Manipulate Bits Of Data To Reduce The Size And Optimize Input For Other Algorithm. Then Des Encryption Was Implemented. It Is A Symmetric-Key Algorithm For The Encryption Of Electronic Data. Finally The Sdha Was Implemented To Secure The Original Data. The Text Can Be Known As Cover Text Which Embedded With Original Data To Prevent Alterations To Original Data. These Security Features Can Provide An Efficient Way Of Providing Security For Of Big Data Dataset.

Authors and Affiliations

Aiswarya S, Hindu Priyadharshini M

Keywords

Related Articles

Reuse Potential of Municipal Solid Waste by Refuse Derived Fuel (RDF)

Earth's natural resources are being depleted. To compensate this negative aspect, we need to develop a recycling-based society. The main objective of this study is to bring to light the potential energy of solid wastes....

Image Encryption using chaotic logistic maps with larger key

Chaos-Based encryption technology has been studied for decades and it has become an important branch of cryptography because of its interesting features such as high security, speed, and dynamic in nature. The encryption...

Dynamic Model of Windings Parameters for Electrical Machines with a Non-Symmetric Magnetic System

Electrical Machines that are having clearly expressed poles in rotor or in stator possess nonsymmetric magnetic systems. In this paper we study main winding inductances at the example of magnetic system with salient roto...

Investigation of Energy Efficient Thermal Insulating Composites from Hemp Shives and Starch

This work presents the investigation results of physical-mechanical properties of fibrous hemp composite specimens produced from hemp shives and starch used as a binding material. For this purpose specimens with differen...

Artificial Intelligence: An Ulterior Dominating Features In Sports Field

People are passionate about obtaining something new which would make their work easy and help them to solve their problems or making their work accurate. So it’s better to avoid old techniques and to introduce new things...

Download PDF file
  • EP ID EP396711
  • DOI -
  • Views 91
  • Downloads 0

How To Cite

Aiswarya S, Hindu Priyadharshini M (2018). Prevention of Attacks on Big Data Records by Multiple Security Strategies. International Journal of Engineering and Science Invention, 7(4), 12-16. https://europub.co.uk./articles/-A-396711