Protecting Big Data Sets from Unauthorized Users on Cloud.
T. N. ManjunathM. R. ShrihariR. A. ArchanaRavindra S. HegadiPublished in: RTIP2R (1) (2020)
Keyphrases
- data sets
- unauthorized access
- user interaction
- collaborative filtering
- end users
- novice users
- access control
- database
- real world
- information sources
- social media
- user interface
- website
- recommender systems
- web search
- cloud computing
- digital libraries
- user profiles
- synthetic data
- user generated content
- user groups
- privacy preservation
- information systems
- data mining