Secure sensitive data sharing on a big data platform

Nexgen Technology
Nexgen Technology Managing Dircetor &CEO em Nexgen Technology
 SECURE SENSITIVE DATA SHARING ON A BIG
DATA PLATFORM
Users store vast amounts of sensitive data on a big data platform.
Sharing sensitive data will help enterprises reduce the cost of providing users with
personalized services and provide value-added data services.
However, secure data sharing is problematic.
 This paper proposes a framework for secure sensitive data sharing on a big data platform,
including secure data delivery, storage, usage, and destruction on a semi-trusted big data
sharing platform.
We present a proxy re-encryption algorithm based on heterogeneous cipher text
transformation and a user process protection method based on a virtual machine monitor,
which provides support for the realization of system functions.
The framework protects the security of users’ sensitive data effectively and shares these
data safely.
At the same time, data owners retain complete control of their own data in a sound
environment for modern Internet Information security
 Users store vast amounts of sensitive data on a big data
platform.
 Sharing sensitive data will help enterprises reduce the cost of
providing users with personalized services and provide value-
added data services.
 However, secure data sharing is problematic.
 This paper proposes a framework for secure sensitive data sharing on a big data
platform, including secure data delivery, storage, usage, and destruction on a
semi-trusted big data sharing platform.
 We present a proxy re-encryption algorithm based on heterogeneous cipher text
transformation and a user process protection method based on a virtual machine
monitor, which provides support for the realization of system functions.
 The framework protects the security of users’ sensitive data effectively and shares
these data safely.
 Data encryption and access control of cloud storage
 Regarding encryption technology, the Attribute-Based Encryption (ABE) algorithm
includes Key-Policy ABE (KP-ABE) and Cipher text-Policy ABE (CPABE).
 ABE decryption rules are contained in the encryption algorithm, avoiding the costs of
frequent key distribution in cipher text access control.
 However, when the access control strategy changes dynamically, a data owner is
required to re-encrypt the data.
 A method based on PRE is proposed.
 A semi-trusted agent with a proxy key can re-encrypt cipher text; however, the agent
cannot obtain the corresponding plaintext or compute the decryption key of either party
in the authorization process.
 Trusted computing and process protection
 Trusted Computing Group (TCG) introduced the Trusted Platform
Module (TPM) in its existing architecture, to ensure that a general
trusted computing platform using TPM security features is credible.
 In academia, the main research idea includes first building a trusted
terminal platform based on a security chip, and then establishing trust
between Platforms through remote attestation.
 Then, trust is extended to the network. Integrity measurement is the
primary technical means of building a trusted terminal platform.
 Data destruction
 Proposed a security destruction scheme for electronic data. A new scheme, Self
Vanish, is proposed.
 This scheme prevents hopping attacks by extending the lengths of key shares and
significantly increasing the cost of mounting an attack.
 To solve the problem of how to prevent sensitive information from leaking, when
an emergency occurs, proposed a real-time sensitive safe data destruction
system.
 The open source cloud computing storage system, Hadoop Distributed File System
(HDFS), cannot destroy data completely, which may lead to data leak.
In summary, we proposed a systematic framework of secure sharing of sensitive data on big data
platform, which ensures secure submission and storage of sensitive data based on the
heterogeneous proxy re-encryption algorithm, and guarantees secure use of clear text in the cloud
platform by the private space of user process based on the VMM.
The proposed framework well protects the security of users’ sensitive data.
At the same time the data owners have the complete control of their own data, which is a feasible
solution to balance the benefits of involved parties under the semi-trusted conditions.
In the future, we will optimize the heterogeneous proxy re-encryption algorithm, and further
improve the efficiency of encryption. In addition, reducing the overhead of the interaction among
involved parties is also an important future work.
[1] S. Yu, C. Wang, K. Ren, and W. Lou, Attribute based data sharing with attribute revocation, in Proc. 5th ACM
Symposium on Information, Computer and Communications Security, Beijing, China, 2010, pp. 261– 270.
[2] J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy attribute-based encryption, in Proc. IEEE Symposium on
Security and Privacy, Oakland, USA, 2007, pp. 321–334.
[3] J. Li, G. Zhao, X. Chen, D. Xie, C. Rong, W. Li, L. Tang, and Y. Tang, Fine-grained data access control systems with
user accountability in cloud computing, in Proc. 2nd Int. Conf. on Cloud Computing, Indianapolis, USA, 2010, pp. 89–
96.
[4] L. Wang, L. Wang, M. Mambo, and E. Okamoto, New identity-based proxy re-encryption schemes to prevent
collusion attacks, in Proc. 4th Int. Conf. Pairing-Based Cryptograghy-Pairing, Ishikawa, Japan, 2010, pp. 327– 346.
[5] C. Gentry, A fully homorphic encryption scheme, Ph.D dissertation, Stanford University, California, USA, 2009.
 TO GET THIS PROJECT THROUGH OFFLINE
OR ONLINE PLEASE CONTACT BELOW
NUMBER :9791938249
1 de 10

Recomendados

Secure sensitive data sharing on a big data platform por
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformredpel dot com
1.2K visualizações9 slides
Final_attribute based encryption in cloud with significant reduction of compu... por
Final_attribute based encryption in cloud with significant reduction of compu...Final_attribute based encryption in cloud with significant reduction of compu...
Final_attribute based encryption in cloud with significant reduction of compu...Naveena N
1.6K visualizações18 slides
Dynamic and public auditing with fair arbitration for cloud data por
Dynamic and public auditing with fair arbitration for cloud dataDynamic and public auditing with fair arbitration for cloud data
Dynamic and public auditing with fair arbitration for cloud dataShakas Technologies
105 visualizações2 slides
Iaetsd enhancement of performance and security in bigdata processing por
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd Iaetsd
59 visualizações6 slides
Cloud Data Security and Secure Data Sharing Methods por
Cloud Data Security and Secure Data Sharing MethodsCloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing MethodsIJCSIS Research Publications
52 visualizações9 slides
Enabling efficient multi keyword ranked search over encrypted mobile cloud da... por
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Pvrtechnologies Nellore
244 visualizações12 slides

Mais conteúdo relacionado

Mais procurados

Attribute based encryption with privacy preserving in clouds por
Attribute based encryption with privacy preserving in cloudsAttribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in cloudsSwathi Rampur
638 visualizações6 slides
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms por
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET Journal
15 visualizações9 slides
Enabling efficient multi keyword ranked search over encrypted mobile cloud da... por
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...redpel dot com
416 visualizações12 slides
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou... por
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
526 visualizações9 slides
Cloud Data Security and Secure Data Sharing Methods por
 Cloud Data Security and Secure Data Sharing Methods Cloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing MethodsIJCSIS Research Publications
18 visualizações9 slides
Final 1st por
Final 1stFinal 1st
Final 1stgokulprema
1K visualizações15 slides

Mais procurados(18)

Attribute based encryption with privacy preserving in clouds por Swathi Rampur
Attribute based encryption with privacy preserving in cloudsAttribute based encryption with privacy preserving in clouds
Attribute based encryption with privacy preserving in clouds
Swathi Rampur638 visualizações
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms por IRJET Journal
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET Journal15 visualizações
Enabling efficient multi keyword ranked search over encrypted mobile cloud da... por redpel dot com
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
redpel dot com416 visualizações
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou... por Editor IJMTER
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER526 visualizações
Final 1st por gokulprema
Final 1stFinal 1st
Final 1st
gokulprema1K visualizações
Enabling secure and efficient ranked keyword por IMPULSE_TECHNOLOGY
Enabling secure and efficient ranked keywordEnabling secure and efficient ranked keyword
Enabling secure and efficient ranked keyword
IMPULSE_TECHNOLOGY2.1K visualizações
Enabling efficient multi keyword ranked search over encrypted mobile cloud da... por LeMeniz Infotech
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
LeMeniz Infotech587 visualizações
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co... por Migrant Systems
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Migrant Systems 1.7K visualizações
Acquisition of Secured Data from Cloud por IJMTST Journal
Acquisition of Secured Data from CloudAcquisition of Secured Data from Cloud
Acquisition of Secured Data from Cloud
IJMTST Journal15 visualizações
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt por Girish Chandra
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Girish Chandra19.4K visualizações
A privacy leakage upper bound constraint based approach for cost-effective pr... por JPINFOTECH JAYAPRAKASH
A privacy leakage upper bound constraint based approach for cost-effective pr...A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...
JPINFOTECH JAYAPRAKASH337 visualizações
Homomorphic encryption algorithms and schemes for secure computations in the ... por MajedahAlkharji
Homomorphic encryption algorithms and schemes for secure computations in the ...Homomorphic encryption algorithms and schemes for secure computations in the ...
Homomorphic encryption algorithms and schemes for secure computations in the ...
MajedahAlkharji184 visualizações
J018145862 por IOSR Journals
J018145862J018145862
J018145862
IOSR Journals145 visualizações
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage por IRJET Journal
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal30 visualizações
Accessing secured data in cloud computing environment por IJNSA Journal
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
IJNSA Journal348 visualizações
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri... por IRJET Journal
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal35 visualizações
Privacy preserving multi-keyword ranked search over encrypted cloud data 2 por Swathi Rampur
Privacy preserving multi-keyword ranked search over encrypted cloud data 2Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Swathi Rampur527 visualizações

Similar a Secure sensitive data sharing on a big data platform

Attribute-Based Data Sharing por
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data SharingIJERA Editor
353 visualizações4 slides
Cloud Computing Environment using Secured Access Control Technique por
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueIRJET Journal
62 visualizações8 slides
A novel cloud storage system with support of sensitive data application por
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationijmnct
333 visualizações9 slides
Preserving Privacy Policy- Preserving public auditing for data in the cloud por
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
266 visualizações4 slides
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic... por
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
524 visualizações10 slides
Secure Data Sharing In an Untrusted Cloud por
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
294 visualizações6 slides

Similar a Secure sensitive data sharing on a big data platform(20)

Attribute-Based Data Sharing por IJERA Editor
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data Sharing
IJERA Editor353 visualizações
Cloud Computing Environment using Secured Access Control Technique por IRJET Journal
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
IRJET Journal62 visualizações
A novel cloud storage system with support of sensitive data application por ijmnct
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data application
ijmnct333 visualizações
Preserving Privacy Policy- Preserving public auditing for data in the cloud por inventionjournals
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
inventionjournals266 visualizações
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic... por Editor IJCATR
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR524 visualizações
Secure Data Sharing In an Untrusted Cloud por IJERA Editor
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor294 visualizações
Paper id 27201448 por IJRAT
Paper id 27201448Paper id 27201448
Paper id 27201448
IJRAT251 visualizações
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment por IRJET Journal
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentMulti-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
IRJET Journal34 visualizações
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. por IJCERT JOURNAL
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL423 visualizações
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo... por Editor IJCATR
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Editor IJCATR124 visualizações
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co... por IRJET Journal
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal28 visualizações
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage por IJERA Editor
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
IJERA Editor22 visualizações
Providing user security guarantees in public infrastructure clouds por Kamal Spring
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
Kamal Spring54 visualizações
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur... por ijsrd.com
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com162 visualizações
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud por IRJET Journal
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal18 visualizações
Exchange Protocols on Network File Systems Using Parallel Sessions Authentica... por IJMTST Journal
Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...
Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...
IJMTST Journal43 visualizações
Centralized Data Verification Scheme for Encrypted Cloud Data Services por Editor IJMTER
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Editor IJMTER255 visualizações
Survey On: Auditing Public Clouds por IRJET Journal
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
IRJET Journal56 visualizações
International Journal of Computational Engineering Research(IJCER) por ijceronline
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline275 visualizações
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud por IRJET Journal
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET Journal64 visualizações

Mais de Nexgen Technology

MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
130 visualizações18 slides
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
34 visualizações11 slides
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
120 visualizações20 slides
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
40 visualizações7 slides
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
98 visualizações7 slides
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
81 visualizações11 slides

Mais de Nexgen Technology (20)

MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por Nexgen Technology
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology 130 visualizações
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por Nexgen Technology
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology 34 visualizações
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por Nexgen Technology
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology 120 visualizações
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por Nexgen Technology
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology 40 visualizações
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por Nexgen Technology
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology 98 visualizações
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por Nexgen Technology
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology 81 visualizações
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH... por Nexgen Technology
     MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CH...     MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CH...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
Nexgen Technology 150 visualizações
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN... por Nexgen Technology
  MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENN...  MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENN...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
Nexgen Technology 78 visualizações
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por Nexgen Technology
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology 106 visualizações
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE... por Nexgen Technology
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
Nexgen Technology 103 visualizações
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA... por Nexgen Technology
 MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENNA... MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENNA...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
Nexgen Technology 77 visualizações
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai por Nexgen Technology
Ieee 2020 21 vlsi projects in pondicherry,ieee  vlsi projects  in chennaiIeee 2020 21 vlsi projects in pondicherry,ieee  vlsi projects  in chennai
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
Nexgen Technology 84 visualizações
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics por Nexgen Technology
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Nexgen Technology 82 visualizações
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen... por Nexgen Technology
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Nexgen Technology 8 visualizações
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year... por Nexgen Technology
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Nexgen Technology 79 visualizações
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr... por Nexgen Technology
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Nexgen Technology 81 visualizações
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce... por Nexgen Technology
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Nexgen Technology 116 visualizações
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes... por Nexgen Technology
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Nexgen Technology 103 visualizações
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje... por Nexgen Technology
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Nexgen Technology 80 visualizações
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best... por Nexgen Technology
Ieee 2020 21  embedded in pondicherry,final year projects in pondicherry,best...Ieee 2020 21  embedded in pondicherry,final year projects in pondicherry,best...
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...
Nexgen Technology 84 visualizações

Último

Berry country.pdf por
Berry country.pdfBerry country.pdf
Berry country.pdfMariaKenney3
61 visualizações12 slides
JQUERY.pdf por
JQUERY.pdfJQUERY.pdf
JQUERY.pdfArthyR3
103 visualizações22 slides
UNIDAD 3 6º C.MEDIO.pptx por
UNIDAD 3 6º C.MEDIO.pptxUNIDAD 3 6º C.MEDIO.pptx
UNIDAD 3 6º C.MEDIO.pptxMarcosRodriguezUcedo
145 visualizações32 slides
SURGICAL MANAGEMENT OF CERVICAL CANCER DR. NN CHAVAN 28102023.pptx por
SURGICAL MANAGEMENT OF CERVICAL CANCER DR. NN CHAVAN 28102023.pptxSURGICAL MANAGEMENT OF CERVICAL CANCER DR. NN CHAVAN 28102023.pptx
SURGICAL MANAGEMENT OF CERVICAL CANCER DR. NN CHAVAN 28102023.pptxNiranjan Chavan
43 visualizações54 slides
CUNY IT Picciano.pptx por
CUNY IT Picciano.pptxCUNY IT Picciano.pptx
CUNY IT Picciano.pptxapicciano
60 visualizações17 slides
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE... por
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...Nguyen Thanh Tu Collection
71 visualizações91 slides

Último(20)

Berry country.pdf por MariaKenney3
Berry country.pdfBerry country.pdf
Berry country.pdf
MariaKenney361 visualizações
JQUERY.pdf por ArthyR3
JQUERY.pdfJQUERY.pdf
JQUERY.pdf
ArthyR3103 visualizações
UNIDAD 3 6º C.MEDIO.pptx por MarcosRodriguezUcedo
UNIDAD 3 6º C.MEDIO.pptxUNIDAD 3 6º C.MEDIO.pptx
UNIDAD 3 6º C.MEDIO.pptx
MarcosRodriguezUcedo145 visualizações
SURGICAL MANAGEMENT OF CERVICAL CANCER DR. NN CHAVAN 28102023.pptx por Niranjan Chavan
SURGICAL MANAGEMENT OF CERVICAL CANCER DR. NN CHAVAN 28102023.pptxSURGICAL MANAGEMENT OF CERVICAL CANCER DR. NN CHAVAN 28102023.pptx
SURGICAL MANAGEMENT OF CERVICAL CANCER DR. NN CHAVAN 28102023.pptx
Niranjan Chavan43 visualizações
CUNY IT Picciano.pptx por apicciano
CUNY IT Picciano.pptxCUNY IT Picciano.pptx
CUNY IT Picciano.pptx
apicciano60 visualizações
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE... por Nguyen Thanh Tu Collection
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...
Nguyen Thanh Tu Collection71 visualizações
The Accursed House by Émile Gaboriau por DivyaSheta
The Accursed House  by Émile GaboriauThe Accursed House  by Émile Gaboriau
The Accursed House by Émile Gaboriau
DivyaSheta246 visualizações
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37 por MysoreMuleSoftMeetup
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
MysoreMuleSoftMeetup44 visualizações
Papal.pdf por MariaKenney3
Papal.pdfPapal.pdf
Papal.pdf
MariaKenney357 visualizações
MercerJesse2.1Doc.pdf por jessemercerail
MercerJesse2.1Doc.pdfMercerJesse2.1Doc.pdf
MercerJesse2.1Doc.pdf
jessemercerail301 visualizações
Six Sigma Concept by Sahil Srivastava.pptx por Sahil Srivastava
Six Sigma Concept by Sahil Srivastava.pptxSix Sigma Concept by Sahil Srivastava.pptx
Six Sigma Concept by Sahil Srivastava.pptx
Sahil Srivastava40 visualizações
11.28.23 Social Capital and Social Exclusion.pptx por mary850239
11.28.23 Social Capital and Social Exclusion.pptx11.28.23 Social Capital and Social Exclusion.pptx
11.28.23 Social Capital and Social Exclusion.pptx
mary850239409 visualizações
Creative Restart 2023: Leonard Savage - The Permanent Brief: Unearthing unobv... por Taste
Creative Restart 2023: Leonard Savage - The Permanent Brief: Unearthing unobv...Creative Restart 2023: Leonard Savage - The Permanent Brief: Unearthing unobv...
Creative Restart 2023: Leonard Savage - The Permanent Brief: Unearthing unobv...
Taste53 visualizações
Narration lesson plan por TARIQ KHAN
Narration lesson planNarration lesson plan
Narration lesson plan
TARIQ KHAN69 visualizações
ANGULARJS.pdf por ArthyR3
ANGULARJS.pdfANGULARJS.pdf
ANGULARJS.pdf
ArthyR349 visualizações
Retail Store Scavenger Hunt.pptx por jmurphy154
Retail Store Scavenger Hunt.pptxRetail Store Scavenger Hunt.pptx
Retail Store Scavenger Hunt.pptx
jmurphy15452 visualizações
Monthly Information Session for MV Asterix (November) por Esquimalt MFRC
Monthly Information Session for MV Asterix (November)Monthly Information Session for MV Asterix (November)
Monthly Information Session for MV Asterix (November)
Esquimalt MFRC98 visualizações

Secure sensitive data sharing on a big data platform

  • 1.  SECURE SENSITIVE DATA SHARING ON A BIG DATA PLATFORM
  • 2. Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services. However, secure data sharing is problematic.  This paper proposes a framework for secure sensitive data sharing on a big data platform, including secure data delivery, storage, usage, and destruction on a semi-trusted big data sharing platform. We present a proxy re-encryption algorithm based on heterogeneous cipher text transformation and a user process protection method based on a virtual machine monitor, which provides support for the realization of system functions. The framework protects the security of users’ sensitive data effectively and shares these data safely. At the same time, data owners retain complete control of their own data in a sound environment for modern Internet Information security
  • 3.  Users store vast amounts of sensitive data on a big data platform.  Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value- added data services.  However, secure data sharing is problematic.
  • 4.  This paper proposes a framework for secure sensitive data sharing on a big data platform, including secure data delivery, storage, usage, and destruction on a semi-trusted big data sharing platform.  We present a proxy re-encryption algorithm based on heterogeneous cipher text transformation and a user process protection method based on a virtual machine monitor, which provides support for the realization of system functions.  The framework protects the security of users’ sensitive data effectively and shares these data safely.
  • 5.  Data encryption and access control of cloud storage  Regarding encryption technology, the Attribute-Based Encryption (ABE) algorithm includes Key-Policy ABE (KP-ABE) and Cipher text-Policy ABE (CPABE).  ABE decryption rules are contained in the encryption algorithm, avoiding the costs of frequent key distribution in cipher text access control.  However, when the access control strategy changes dynamically, a data owner is required to re-encrypt the data.  A method based on PRE is proposed.  A semi-trusted agent with a proxy key can re-encrypt cipher text; however, the agent cannot obtain the corresponding plaintext or compute the decryption key of either party in the authorization process.
  • 6.  Trusted computing and process protection  Trusted Computing Group (TCG) introduced the Trusted Platform Module (TPM) in its existing architecture, to ensure that a general trusted computing platform using TPM security features is credible.  In academia, the main research idea includes first building a trusted terminal platform based on a security chip, and then establishing trust between Platforms through remote attestation.  Then, trust is extended to the network. Integrity measurement is the primary technical means of building a trusted terminal platform.
  • 7.  Data destruction  Proposed a security destruction scheme for electronic data. A new scheme, Self Vanish, is proposed.  This scheme prevents hopping attacks by extending the lengths of key shares and significantly increasing the cost of mounting an attack.  To solve the problem of how to prevent sensitive information from leaking, when an emergency occurs, proposed a real-time sensitive safe data destruction system.  The open source cloud computing storage system, Hadoop Distributed File System (HDFS), cannot destroy data completely, which may lead to data leak.
  • 8. In summary, we proposed a systematic framework of secure sharing of sensitive data on big data platform, which ensures secure submission and storage of sensitive data based on the heterogeneous proxy re-encryption algorithm, and guarantees secure use of clear text in the cloud platform by the private space of user process based on the VMM. The proposed framework well protects the security of users’ sensitive data. At the same time the data owners have the complete control of their own data, which is a feasible solution to balance the benefits of involved parties under the semi-trusted conditions. In the future, we will optimize the heterogeneous proxy re-encryption algorithm, and further improve the efficiency of encryption. In addition, reducing the overhead of the interaction among involved parties is also an important future work.
  • 9. [1] S. Yu, C. Wang, K. Ren, and W. Lou, Attribute based data sharing with attribute revocation, in Proc. 5th ACM Symposium on Information, Computer and Communications Security, Beijing, China, 2010, pp. 261– 270. [2] J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy attribute-based encryption, in Proc. IEEE Symposium on Security and Privacy, Oakland, USA, 2007, pp. 321–334. [3] J. Li, G. Zhao, X. Chen, D. Xie, C. Rong, W. Li, L. Tang, and Y. Tang, Fine-grained data access control systems with user accountability in cloud computing, in Proc. 2nd Int. Conf. on Cloud Computing, Indianapolis, USA, 2010, pp. 89– 96. [4] L. Wang, L. Wang, M. Mambo, and E. Okamoto, New identity-based proxy re-encryption schemes to prevent collusion attacks, in Proc. 4th Int. Conf. Pairing-Based Cryptograghy-Pairing, Ishikawa, Japan, 2010, pp. 327– 346. [5] C. Gentry, A fully homorphic encryption scheme, Ph.D dissertation, Stanford University, California, USA, 2009.
  • 10.  TO GET THIS PROJECT THROUGH OFFLINE OR ONLINE PLEASE CONTACT BELOW NUMBER :9791938249