A survey on cryptographic techniques for protecting big data security: present and forthcoming.
Siqi LuJianhua ZhengZhenfu CaoYongjuan WangChunxiang GuPublished in: Sci. China Inf. Sci. (2022)
Keyphrases
- big data
- access control
- security protocols
- key management
- security properties
- cloud computing
- data analysis
- social media
- data management
- big data analytics
- fuzzy vault
- business intelligence
- smart card
- security issues
- encryption scheme
- high volume
- cryptographic protocols
- vast amounts of data
- data processing
- knowledge discovery
- security mechanisms
- security requirements
- data science
- unstructured data
- public key cryptography
- massive data
- data driven decision making
- data warehousing
- information security
- predictive modeling
- public key
- elliptic curve
- massive datasets
- query language
- information technology