Prevention of Attacks on Big Data Records by Multiple Security Strategies
Journal Title: International Journal of Engineering and Science Invention - Year 2018, Vol 7, Issue 4
Abstract
This Project Formulates The Several Types Of Big Data Relational Database Securities As A Constrained Efficient Techniques To Solve The Security Problems. While Transferring Data From One Server To Another There Are Many Possibilities Of Attacking The Data By Intruders. This Proposed System Will Provide Efficient Data To The Receiver Without Any Intruders Stealing The Data. This System Address The Novel Problems Of Securely Sending Provenance For Data Security Using Range Partitioning, J-Bit Encoding, Des Algorithm And Secure Data Hiding Algorithm (Sdha).In Range Partitioning, It Divides The Table Records And Assigns Partition Number To It. In J-Bit Encoding Each Bit Was Encoded. That Made An Original Dataset To Encoded Data. It Works By Manipulate Bits Of Data To Reduce The Size And Optimize Input For Other Algorithm. Then Des Encryption Was Implemented. It Is A Symmetric-Key Algorithm For The Encryption Of Electronic Data. Finally The Sdha Was Implemented To Secure The Original Data. The Text Can Be Known As Cover Text Which Embedded With Original Data To Prevent Alterations To Original Data. These Security Features Can Provide An Efficient Way Of Providing Security For Of Big Data Dataset.
Authors and Affiliations
Aiswarya S, Hindu Priyadharshini M
Reuse Potential of Municipal Solid Waste by Refuse Derived Fuel (RDF)
Earth's natural resources are being depleted. To compensate this negative aspect, we need to develop a recycling-based society. The main objective of this study is to bring to light the potential energy of solid wastes....
Image Encryption using chaotic logistic maps with larger key
Chaos-Based encryption technology has been studied for decades and it has become an important branch of cryptography because of its interesting features such as high security, speed, and dynamic in nature. The encryption...
Dynamic Model of Windings Parameters for Electrical Machines with a Non-Symmetric Magnetic System
Electrical Machines that are having clearly expressed poles in rotor or in stator possess nonsymmetric magnetic systems. In this paper we study main winding inductances at the example of magnetic system with salient roto...
Investigation of Energy Efficient Thermal Insulating Composites from Hemp Shives and Starch
This work presents the investigation results of physical-mechanical properties of fibrous hemp composite specimens produced from hemp shives and starch used as a binding material. For this purpose specimens with differen...
Artificial Intelligence: An Ulterior Dominating Features In Sports Field
People are passionate about obtaining something new which would make their work easy and help them to solve their problems or making their work accurate. So it’s better to avoid old techniques and to introduce new things...