The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud data privacy-preserving and integrity verification have become major research areas. Many existing schemes use group signatures to make sure that the data stored in cloud is unbroken for the purpose of privacy and anonymity. However, group signatures do not consider user equality and the framing caused by manager. Therefore, we propose data sharing scheme for non-manager groups, which reconstructs...
In the big data era, security and privacy concerns are growing. One of the big challenges is secure Frequent Pattern Mining (FPM) over Fully Homomorphic Encryption (FHE). There exist some research efforts aimed at speeding-up, however, we have a big room so as to decrease time and space complexity. Apriori over FHE, in particular, generates a large number of ciphertexts during the support calculation,...
Currently, privacy leakage has become a great concern when a web-based application is applied. The threats deriving from communications are generally caused by implementing lower-level security protocols. However, using a higher-level privacy protection approach is often restricted by the efficiency requirements, since an enhanced security level needs a longer execution time than the approach offering...
Recent advances in sensing and storing technologies have led to big data age where a huge amount of data are distributed across sites to be stored and analysed. Indeed, cluster analysis is one of the data mining tasks that aims to discover patterns and knowledge through different algorithmic techniques such as k-means. Nevertheless, running k-means over distributed big data stores has given rise to...
In cloud data services, data owners (DO) publish data through cloud servers (CS) so that clients can access and query the data more efficiently. However, cloud service providers (CSP) are often untrustworthy, query answer authentication becomes essential for cloud service systems. Existing solutions mostly provide DO's signature for published data. But the signature always reveals DO's identity. In...
In recent years Cloud Computing is widely adopted for MapReduce computation. Data security is on top of the major concerns of data processing. The researches focused on the verification of data integrity are increasingly important, especially on MapReduce processing in Cloud Computing. This paper presents new architecture for secure MapReduce computation in cloud. The main goal of Secure Tag-MapReduce...
Big data systems are gathering more and more information in order to discover new values through data analytics and depth insights. However, mining sensitive personal information breaches privacy and degrades services' reputation. Accordingly, many research works have been proposed to address the privacy issues of data analytics, but almost seem to be not suitable in big data context either in data...
Big data, because it can mine new knowledge for economic growth and technical innovation, has recently received considerable attention, and many research efforts have been directed to big data processing due to its high volume, velocity, and variety (referred to as “3V”) challenges. However, in addition to the 3V challenges, the flourishing of big data also hinges on fully understanding and managing...
This paper addresses the challenge of big data security by exploiting signal processing theories. We propose a new big data privacy protocol that scrambles data via artificial noise and secret transform matrices. The utility of the scrambled data is maintained, as demonstrated by a cyber-physical system application. We further outline the proof of the proposed protocol's privacy by considering the...
Advancements in big data analysis offer cost-effective opportunities to improve decision-making in numerous areas such as health care, economic productivity, crime, and resource management. Nowadays, data holders are tending to sharing their data for better outcomes from their aggregated data. However, the current tools and technologies developed to manage big data are often not designed to incorporate...
Nowadays, thanks to the massive usage of the Cloud, different providers offer storage as a service solutions. Each of these solutions is characterized by different storage capacity and features. They are also offered according to various business models, typically, users can choose between free plans (with a limited amount of space) and paid plans. Free plans users, when the storage capacity lowers,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.