Secure Data Access in Hadoop Using Elliptic Curve Cryptography.
Antonio F. DíazIlia BlokhinJulio OrtegaRaúl H. PalaciosCristina Rodríguez-QuintanaJuan Díaz-GarcíaPublished in: ICA3PP Workshops (2016)
Keyphrases
- data access
- elliptic curve cryptography
- authentication scheme
- cryptographic algorithms
- security analysis
- data management
- public key cryptography
- public key
- high security
- elliptic curve
- data sharing
- cloud computing
- smart card
- user authentication
- security requirements
- diffie hellman
- encryption scheme
- digital signature
- authentication protocol
- digital watermark
- security model
- database applications
- error correction
- key management
- image encryption
- data processing
- data objects
- data storage
- provably secure
- key distribution
- database systems
- security protocols
- database management systems
- secret key
- security mechanisms
- web services
- resource constrained
- security services
- sql server
- sensitive data
- database