Combining Fragmentation and Encryption to Ensure Big Data at Rest Security.
Houyem HeniMarwa Ben AbdallahFaïez GargouriPublished in: HIS (2017)
Keyphrases
- big data
- security properties
- encryption algorithms
- encryption scheme
- key management
- encryption decryption
- data encryption
- social media
- cloud computing
- high security
- encryption algorithm
- data processing
- data analysis
- big data analytics
- unstructured data
- security analysis
- data management
- high volume
- massive data
- virtual private network
- security issues
- security requirements
- vast amounts of data
- key exchange
- information security
- business intelligence
- information processing
- public key cryptography
- machine learning
- data science
- data analytics
- private key
- secret key
- data intensive computing
- data driven decision making
- social computing
- elliptic curve
- predictive modeling
- security protocols
- public key
- case study
- web services