Access Control and Encryption Techniques during Big Data Accessing Stage.
Shoaib AhmedAditya DubeyAkhtar RasoolMansi GyanchandaniPublished in: ICCCNT (2023)
Keyphrases
- access control
- big data
- digital rights management
- data protection
- cloud computing
- dynamic access control
- data security
- data management
- data processing
- data analysis
- big data analytics
- access control models
- social media
- business intelligence
- security model
- security policies
- security mechanisms
- role based access control
- knowledge discovery
- security requirements
- information processing
- access control mechanism
- secret key
- encryption scheme
- access control policies
- information retrieval
- data warehousing
- decision support
- protection schemes
- data model
- metadata