To see the other types of publications on this topic, follow the link: Data processing security.

Journal articles on the topic 'Data processing security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Data processing security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Littlejohns, C. S. "Word processing and data security." BMJ 298, no. 6677 (April 1, 1989): 893. http://dx.doi.org/10.1136/bmj.298.6677.893-b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Editorial. "Information Security and Multisensor Data Processing." Information & Security: An International Journal 2 (1999): 5–11. http://dx.doi.org/10.11610/isij.0200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jacobson, Robert V. "Electronic Data Processing Security—An Overview." International Journal of Network Management 6, no. 2 (March 1996): 77–93. http://dx.doi.org/10.1002/(sici)1099-1190(199603/04)6:2<77::aid-nem184>3.0.co;2-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lahno, Valery. "ENSURING OF INFORMATION PROCESSES’ RELIABILITY AND SECURITY IN CRITICAL APPLICATION DATA PROCESSING SYSTEMS." MEST Journal 2, no. 1 (January 15, 2014): 71–79. http://dx.doi.org/10.12709/mest.02.02.01.07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Inieke, Otobong. "Data Security." International Journal of Digital Literacy and Digital Competence 10, no. 4 (October 2019): 25–39. http://dx.doi.org/10.4018/ijdldc.2019100102.

Full text
Abstract:
Data security in the information age is a critical facet in the integrity and reliability of the various information systems making up value structures of businesses, organizations etc. Aside from professionals directly involved with securing data within these systems, the importance of data security is not readily apparent to the everyday user of devices in the information systems. The purpose of this literature review is to highlight challenges related to data security and business information systems in conjunction with digital literacy. An extensive literature review was conducted with the aim of identifying and describing scenarios of technology misuse as well as vulnerabilities in vital business information systems. A gap in awareness continues to plague those who leverage information systems for its myriad uses because everyday users will in most cases dismiss data security advice as alarmist or jargon-laden. This falls in line with a 2018 cyber security survey from Statista which showed that 22% of data security tasks was preventing malware while 17% of tasks were dedicated to preventing social engineering and phishing attacks. This literature review will describe possible data insecurity solutions as well as potential areas of further research. The paper will point out the importance of digital literacy as well as recommendations for its improvement in society and also ongoing research in that regard. The essence of this literature review is to identify certain everyday information systems such as decision support systems and transaction processing systems; while pointing out vulnerabilities and threat nature i.e. technical or non-technical and also demonstrating the importance of digital literacy and lack thereof.
APA, Harvard, Vancouver, ISO, and other styles
6

Brown, Michael G., and Paolina Centonze. "Exploiting Flaws in Big Data Systems." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 8 (May 17, 2016): 6967–75. http://dx.doi.org/10.24297/ijct.v15i8.1498.

Full text
Abstract:
In this journal we discuss the relevant security threats, vulnerabilities and prominent techniques to securing data lake. Over the last few years, Big Data solutions to data processing have made remarkable strides in the how we interpret data. Because of its ubiquitous nature and ability to handle various data types, it has become a valuable tool and asset to many other fields including bioinformatics solutions, marketing solutions, and social media. Ethical infractions also play a role in data processing and because of this, it is critical that comprehensive security solutions are determined and enforced under the appropriate conditions. Although modern security techniques are well developed, they still leave room for scrutiny as vulnerabilities continue to unfold. In this paper, we will examine and compare modern ethical exploit techniques as well ass techniques to promote greater authentication and overall perimeter security. The scrutinization of the current methods met through exploitation, be it physical or conceptive, is imperative in defining the understanding and verification of definite secure solutions. Â
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Jun, and Yanzhao Liu. "An Efficient Data Analysis Framework for Online Security Processing." Journal of Computer Networks and Communications 2021 (April 1, 2021): 1–12. http://dx.doi.org/10.1155/2021/9290853.

Full text
Abstract:
Industrial cloud security and internet of things security represent the most important research directions of cyberspace security. Most existing studies on traditional cloud data security analysis were focused on inspecting techniques for block storage data in the cloud. None of them consider the problem that multidimension online temp data analysis in the cloud may appear as continuous and rapid streams, and the scalable analysis rules are continuous online rules generated by deep learning models. To address this problem, in this paper we propose a new LCN-Index data security analysis framework for large scalable rules in the industrial cloud. LCN-Index uses the MapReduce computing paradigm to deploy large scale online data analysis rules: in the mapping stage, it divides each attribute into a batch of analysis predicate sets which are then deployed onto a mapping node using interval predicate index. In the reducing stage, it merges results from the mapping nodes using multiattribute hash index. By doing so, a stream tuple can be efficiently evaluated by going over the LCN-Index framework. Experiments demonstrate the utility of the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
8

Kumar, Narander, Vishal Verma, and Vipin Saxena. "A Security Algorithm for Online Analytical Processing Data Cube." International Journal of Computer Applications 79, no. 14 (October 18, 2013): 7–10. http://dx.doi.org/10.5120/13807-1768.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kozin, I. S. "Blockchain-based technology for security processing of personal data." Scientific and Technical Journal of Information Technologies, Mechanics and Optics 19, no. 5 (October 1, 2019): 892–900. http://dx.doi.org/10.17586/2226-1494-2019-19-5-892-900.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rohrlach, H. J. "Protection of privacy and security measures in data-processing." International Social Security Review 39, no. 1 (January 1986): 14–23. http://dx.doi.org/10.1111/j.1468-246x.1986.tb00603.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Semenov, N. A., and A. A. Poltavtsev. "Cloud-Based Data Architecture Security." Automatic Control and Computer Sciences 53, no. 8 (December 2019): 1056–64. http://dx.doi.org/10.3103/s0146411619080285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

SankaramAlladi, Bhima, and Dr Srinivas Prasad. "Big data life cycle: security issues, challenges, threat and security model." International Journal of Engineering & Technology 7, no. 1.3 (December 31, 2017): 100. http://dx.doi.org/10.14419/ijet.v7i1.3.9666.

Full text
Abstract:
Today the technologies of big data are completely bringing a vast change in the entire conventional technology discipline and it’s successfully applying the required latest security design methods to state the upcoming security provocations. Big Data Architecture is a “Data” centric architecture in which security can be included in all the levels. Data is collected from different sources and Data generation is done, the next step it undergoes is Data Processing, the next step is Data storage and the last step is Data analysis. At all the levels Data plays a vital role. It aims to give basic investigation regarding most of the security risks and Big Data provocation and bought out new provocations, complication to the conventional protective domains and also for conventional trends. This deals with the definition of big data and the characteristics that effect most of the data preservation, such as 3V’s, dynamicity. It analyses the original changes and new challenges to Data security. It also provides pitch for real time practice of security infrastructure peripherals which allows extend trusted non-local virtualized processing environment. This research focus on all levels of Big Data where and when the security services and techniques can be included to acquire accurate results.
APA, Harvard, Vancouver, ISO, and other styles
13

Albeshri, Aiiad, and Vijey Thayananthan. "Analytical Techniques for Decision Making on Information Security for Big Data Breaches." International Journal of Information Technology & Decision Making 17, no. 02 (March 2018): 527–45. http://dx.doi.org/10.1142/s0219622017500432.

Full text
Abstract:
In the big data processes, management and analytics are primary areas where we can introduce the decision making on information security to mitigate the big data breaches. According to the growing number of online systems and big data handling, mitigating the big data breaches is the serious problem during the processing period which needs to be monitored using appropriate technique. The goal of this research is to prevent the big data breaches using correct decision making based on information security concepts such as access control with authentication which depend on the management policies. The analytical approach of information security solution can also be useful for securing the big data infrastructure and key management that improve the big data breaches. As an analytical method, information security which focuses on detecting and securing the big data breaches is considered with access control. Here, we have introduced the multi-priority model influenced with the network calculus and access control which monitors the breaches during the big data processing. In the results and analysis, we can provide a graph which shows the monitoring improvement for decision making during the mitigation of big data breaches.
APA, Harvard, Vancouver, ISO, and other styles
14

Li, Zhihua, Zianfei Tang, and Yihua Yang. "Research on architecture of security video surveillance network cascade system with big data." World Journal of Engineering 13, no. 1 (February 8, 2016): 77–81. http://dx.doi.org/10.1108/wje-02-2016-010.

Full text
Abstract:
Purpose The high-efficient processing of mass data is a primary issue in building and maintaining security video surveillance system. This paper aims to focus on the architecture of security video surveillance system, which was based on Hadoop parallel processing technology in big data environment. Design/methodology/approach A hardware framework of security video surveillance network cascaded system (SVSNCS) was constructed on the basis of Internet of Things, network cascade technology and Hadoop platform. Then, the architecture model of SVSNCS was proposed using the Hadoop and big data processing platform. Findings Finally, we suggested the procedure of video processing according to the cascade network characteristics. Originality/value Our paper, which focused on the architecture of security video surveillance system in big data environment on the basis of Hadoop parallel processing technology, provided high-quality video surveillance services for security area.
APA, Harvard, Vancouver, ISO, and other styles
15

Shkirdov, D. A., E. S. Sagatov, and P. S. Dmitrenko. "Trap method in ensuring data security." Information Technology and Nanotechnology, no. 2416 (2019): 189–98. http://dx.doi.org/10.18287/1613-0073-2019-2416-189-198.

Full text
Abstract:
This paper presents the results of data analysis from a geographically distributed honeypot network. Such honeypot servers were deployed in Samara, Rostov on Don, Crimea and the USA two years ago. Methods for processing statistics are discussed in detail for secure remote access SSH. Lists of attacking addresses are highlighted, and their geographical affiliation is determined. Rank distributions were used as the basis for statistical analysis. The intensity of requests to each of the 10 installed services was then calculated.
APA, Harvard, Vancouver, ISO, and other styles
16

Sun, Lei, Ji Ling Tang, and Qin Sheng Du. "Data Collection and Processing of Cloud Security Botnet Protection System." Applied Mechanics and Materials 727-728 (January 2015): 923–25. http://dx.doi.org/10.4028/www.scientific.net/amm.727-728.923.

Full text
Abstract:
Cloud security botnetprotection system has implemented recognition and response of dynamic andencrypted Botnet efficient. The external resources employed in the system arefrom cloud reputation system, private cloud Honeynet system and the threatdistribution data. Through the integration and analysis of data, the cloud securitybotnet protection system independently accomplishes the integration andanalysis of Botnet data, forming a zombie network database, and to realize thefunction of responding and the tuning of botnet.
APA, Harvard, Vancouver, ISO, and other styles
17

Li, Na. "Body Sensor Network Processing Mechanism for Micro-Data Security Publishing." Advanced Materials Research 1049-1050 (October 2014): 1536–39. http://dx.doi.org/10.4028/www.scientific.net/amr.1049-1050.1536.

Full text
Abstract:
Individuals’ privacy protection when publishing data for research has recently put great attention on data mining and information resources sharing fields. Privacy preservation is an important and challenging problem in micro-data publishing. This paper aimed to find an available directly way protect patient privacy. Processing numeric values which got from body sensor network (BSN). Firstly, we analyze the characteristics of medical data which collected from BSN, and then the records will be grouped according to the Quasi-identifier. The last step is to inspect the diversity of sensitive attributes.
APA, Harvard, Vancouver, ISO, and other styles
18

Lakshmanan, S., M. Ahamad, and H. Venkateswaran. "Responsive security for stored data." IEEE Transactions on Parallel and Distributed Systems 14, no. 9 (September 2003): 818–28. http://dx.doi.org/10.1109/tpds.2003.1233705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Suparni, Suparni, Lilyani Asri Utami, and Elsa Dwi Selviana. "Property Sales Data Processing Information System (SiPendar)." SinkrOn 3, no. 2 (March 16, 2019): 180. http://dx.doi.org/10.33395/sinkron.v3i2.10084.

Full text
Abstract:
PT. Pratama Mega Konstruksindo is one of the companies engaged in Property, especially Housing. One of the fields that requires technological progress is one of them is the property sector, the rapid development in the property sector is currently urging property service companies to meet the demands of the wider community. Implementation of work related to housing sales. In managing the data, this company still uses a manual system, starting from the recording and calculation aspects so that its performance has not been effective. At PT Pratama Mega Konstruksindo this still manages data using Ms Excel. As well as down payment, cash payments and consumer data are recorded using Ms Excel. This can cause errors in recording transactions, data security that is not guaranteed confidentiality, ineffective employees at work because it requires more time to input and make sales reports and even loss of data. Therefore, PT. Pratama Mega Konstruksindo requires a system that can solve the problem. This data processing system is designed web-based using the PHP and MySql programming languages as data storage databases. With the existence of this website, it can help processing sales data more effectively and efficiently, reports can be printed in realtime and data security can be maintained
APA, Harvard, Vancouver, ISO, and other styles
20

Al-Museelem, Waleed, and Chun Lin Li. "Data Security and Data Privacy in Cloud Computing." Advanced Materials Research 905 (April 2014): 687–92. http://dx.doi.org/10.4028/www.scientific.net/amr.905.687.

Full text
Abstract:
Cloud computing has led to the development of IT to more sophisticated levels by improving the capacity and flexibility of data storage and by providing a scalable computation and processing power which matches the dynamic data requirements. Cloud computing has many benefits which has led to the transfer of many enterprise applications and data to public and hybrid clouds. However, many organizations refer to the protection of privacy and the security of data as the major issues which prevent them from adopting cloud computing. The only way successful implementation of clouds can be achieved is through effective enhancement and management of data security and privacy in clouds. This research paper analyzes the privacy and protection of data in cloud computing through all data lifecycle stages providing an overall perspective of cloud computing while highlighting key security issues and concerns which should be addressed. It also discusses several current solutions and further proposes more solutions which can enhance the privacy and security of data in clouds. Finally, the research paper describes future research work on the protection of data privacy and security in clouds.
APA, Harvard, Vancouver, ISO, and other styles
21

Sirisha, N., and K. V.D. Kiran. "Authorization of Data In Hadoop Using Apache Sentry." International Journal of Engineering & Technology 7, no. 3.6 (July 4, 2018): 234. http://dx.doi.org/10.14419/ijet.v7i3.6.14978.

Full text
Abstract:
Big Data has become more popular, as it can provide on-demand, reliable and flexible services to users such as storage and its processing. The data security has become a major issue in the Big data. The open source HDFS software is used to store huge amount of data with high throughput and fault tolerance and Map Reduce is used for its computations and processing. However, it is a significant target in the Hadoop system, security model was not designed and became the major drawback of Hadoop software. In terms of storage, meta data security, sensitive data and also the data security will be an serious issue in HDFS. With the importance of Hadoop in today's enterprises, there is also an increasing trend in providing a high security features in enterprises. Over recent years, only some level of security in Hadoop such as Kerberos and Transparent Data Encryption(TDE),Encryption techniques, hash techniques are shown for Hadoop. This paper, shows the efforts that are made to present Hadoop Authorization security issues using Apache Sentry in HDFS.
APA, Harvard, Vancouver, ISO, and other styles
22

Grusho, A. A., N. A. Grusho, M. I. Zabezhailo, and E. E. Timonina. "Intelligent data analysis in information security." Automatic Control and Computer Sciences 50, no. 8 (December 2016): 722–25. http://dx.doi.org/10.3103/s0146411616080307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Gao, Lei. "Exploring the Data Processing Practices of Cloud ERP—A Case Study." Journal of Emerging Technologies in Accounting 17, no. 1 (November 1, 2019): 63–70. http://dx.doi.org/10.2308/jeta-52680.

Full text
Abstract:
ABSTRACT Although cloud enterprise resource planning (ERP) systems are becoming popular, there are still firms that have yet to migrate to the cloud because of data confidentiality and data security concerns. Firms that plan to adopt cloud ERP systems are expected to first understand cloud ERP's data processing practices. This study proposes a case study method with a systematic content analysis of cloud ERP providers' data processing agreements. The study will explore the data disclosure, data security, data sub-processing, and data retention and deletion practices of cloud ERP providers. In addition, this study investigates the linguistic characteristics of cloud ERP providers' data processing agreements including readability, litigious language, and uncertainty language. The findings of this study can help organizations to have a better understanding of the data process practices of cloud ERP providers, as well as the shared responsibilities between cloud ERP providers and users in maintaining data security.
APA, Harvard, Vancouver, ISO, and other styles
24

Li, Qian Mu, Rui Wang, Jie Yin, and Jun Hou. "The Design of Data Security Synchronization in the Network of Satellite and Ground Security Management Instrument." Key Engineering Materials 439-440 (June 2010): 208–14. http://dx.doi.org/10.4028/www.scientific.net/kem.439-440.208.

Full text
Abstract:
Network security, data management, data synchronization Abstract. The aim of Network of Satellite and Ground Security Management Instrument (NSGMI) is to increase network availability, improve network performance and control operation costs. After analyzing the shortcomings of traditional data synchronization mechanism, this paper reconstructs data processing method to improve communication ability of NSGMI, and provides a solution to guarantee real time and reliable on the application layer. The new mechanism provides buffer areas and operation flows to satisfy the high efficiency of data processing demand and the strong real time request. It solves how to open the buffer size when a direct access changes records.
APA, Harvard, Vancouver, ISO, and other styles
25

Dronov, Vadim, Galina Dronova, Victor Belov, Lev Grishchenko, and Sergei Zyryanov. "Automation of data processing in the process of information security audit." Transaction of Scientific Papers of the Novosibirsk State Technical University, no. 1 (February 25, 2021): 64–79. http://dx.doi.org/10.17212/2307-6879-2021-1-64-79.

Full text
Abstract:
According to the Russian standards in the field of information security management (IS), which are authentic international standards, such as [1, 2], the organization must regularly conduct an internal audit of the information security management system. An audit is an independent review and evaluation of an organization's activities by analyzing and evaluating processes, projects, reports, and products. Audit, as an activity, is not static, unchanging, it evolves. From the point of view of leading international audit companies, in particular [3, 4], the current stage of audit evolution is the transition from reactivity (identifying shortcomings after the fact) to proactivity (predicting the results of actions or events before their completion). The validity of the statement for the Russian Internal Audit is confirmed by the results of the IX National Scientific and Practical Conference [5]. The movement towards proactivity in the audit determines the relevance of the following tasks: 1) processing up to 100 % of the information generated by the activity that is the focus of the audit; 2) processing information in a close-to-online mode; 3) the availability of powerful tools for data analysis and modeling on their basis the further development of the investigated events, as well as the appropriate skills of working with it from the auditors. When conducting audits, the auditors have a dilemma – on the one hand, they are obliged to provide the owners/shareholders/management of the organization with data as close as possible to the reliable state of the information security management processes, information about the identified shortcomings and recommendations for their elimination, on the other hand: the audit time is strictly limited; unloading the initial data from the organization's information systems takes considerable time; the data obtained from various information systems and other sources have different, not always standard formats; the tools used have disadvantages, since the most frequently used spreadsheets (MSExcel, LOCalc), due to internal limitations, are no longer able to provide the required functionality. The above-mentioned factors, as well as other factors, such as unwillingness to cooperate, hidden opposition of the personnel of the audited organization, evaluation of the work of auditors only by quantitative indicators (the number of observations or the time spent on one observation), lead to the fact that the checks are carried out superficially. At the same time, shortcomings in the information security management processes can be detected, but it becomes difficult to explain their nature and give effective recommendations to the business auditor. As a result, the goal of independent audits defined in GOST ISO/IEC 27002-2012 – “ensuring confidence in the continued efficiency, adequacy and effectiveness of the organization's approach to information security management” [2] – cannot be achieved. One of the options for eliminating some of the above-mentioned shortcomings is the use of programs developed by the auditors themselves and designed for operational data processing, the so-called “small automation”, during audits. This approach, although it is a low-level link in the chain of automation of audit procedures and, nevertheless, is within the framework of the audit development paradigm in the direction of robotization of procedures and the use of artificial intelligence, which is discussed, for example, in the works [3, 6, 7], and also confirmed by the results of conferences of the Institute of Internal Auditors [8].
APA, Harvard, Vancouver, ISO, and other styles
26

Tofan, Dragoş Ovidiu. "Business Intelligence Security." Review of Economic and Business Studies 9, no. 1 (June 1, 2016): 157–69. http://dx.doi.org/10.1515/rebs-2016-0030.

Full text
Abstract:
AbstractExcess information characteristic to the current environment leads to the need for a change of the organizations’ perspective and strategy not only through the raw data processing, but also in terms of existing applications generating new information. The overwhelming evolution of digital technologies and web changes led to the adoption of new and adapted internal policies and the emergence of regulations at level of governments or different social organisms. Information security risks arising from the current dynamics demand fast solutions linked to hardware, software and also to education of human resources. Business Intelligence (BI) solutions have their specific evolution in order to bring their contribution to ensure the protection of data through specific components (Big Data, cloud, analytics). The current trend of development of BI applications on mobile devices brings with it a number of shortcomings related to information security and require additional protective measure regarding flows, specific processing and data storage.
APA, Harvard, Vancouver, ISO, and other styles
27

István, Zsolt, Soujanya Ponnapalli, and Vijay Chidambaram. "Software-defined data protection." Proceedings of the VLDB Endowment 14, no. 7 (March 2021): 1167–74. http://dx.doi.org/10.14778/3450980.3450986.

Full text
Abstract:
Most modern data processing pipelines run on top of a distributed storage layer, and securing the whole system, and the storage layer in particular, against accidental or malicious misuse is crucial to ensuring compliance to rules and regulations. Enforcing data protection and privacy rules, however, stands at odds with the requirement to achieve higher and higher access bandwidths and processing rates in large data processing pipelines. In this work we describe our proposal for the path forward that reconciles the two goals. We call our approach "Software-Defined Data Protection" (SDP). Its premise is simple, yet powerful: decoupling often changing policies from request-level enforcement allows distributed smart storage nodes to implement the latter at line-rate. Existing and future data protection frameworks can be translated to the same hardware interface which allows storage nodes to offload enforcement efficiently both for company-specific rules and regulations, such as GDPR or CCPA. While SDP is a promising approach, there are several remaining challenges to making this vision reality. As we explain in the paper, overcoming these will require collaboration across several domains, including security, databases and specialized hardware design.
APA, Harvard, Vancouver, ISO, and other styles
28

Poltavtseva, M. A., D. P. Zegzhda, and M. O. Kalinin. "Big Data Management System Security Threat Model." Automatic Control and Computer Sciences 53, no. 8 (December 2019): 903–13. http://dx.doi.org/10.3103/s0146411619080261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Patial, Abhishek, and Sunny Behal. "RSA Algorithm achievement with Federal information processing Signature for Data protection in Cloud Computing." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (August 1, 2012): 34–38. http://dx.doi.org/10.24297/ijct.v3i1a.2724.

Full text
Abstract:
Cloud computing presents IT organizations with a funda­mentally different model of operation, one that takes advantage of the maturity of web applications and networks and the rising interoperability of computing systems to provide IT services. Data security is becoming a core problem in cloud computing, there are some kind of solution that are provide some security with model, some technology. In this paper is attempt to secure data from unauthorized access, the Method of data security is RSA algorithm for providing data security by encrypting the given data based on the KEY combinations. And this data then can only be decrypted by authorized person by using his private key. For the same purpose Google application cloud has been implemented on IJCT Foundation, all data has of IJCT Foundation sifted to Google cloud and RSA security algorithm is implemented by us for secure data.
APA, Harvard, Vancouver, ISO, and other styles
30

ALI-PACHA, Hana, Naima HADJ-SAID, and Adda ALI-PACHA. "Data security based on homographic function." Pattern Recognition Letters 129 (January 2020): 240–46. http://dx.doi.org/10.1016/j.patrec.2019.10.032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Voloshynovskiy, S., T. Pun, J. Fridrich, F. Pérez-González, and N. Memon. "Security of data hiding technologies." Signal Processing 83, no. 10 (October 2003): 2065–67. http://dx.doi.org/10.1016/s0165-1684(03)00167-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Kasim, Rachmat, Retno Kusumaningrum, and Hamka Witri Kamase. "Implementation of Web Service in Processing of Data Base Financing Costumer Using Fragmentation Method." E3S Web of Conferences 73 (2018): 13025. http://dx.doi.org/10.1051/e3sconf/20187313025.

Full text
Abstract:
This research is to design the Implementation system of Web service of consumer financing data processing based on fragmentation in motor vehicle loan financing in accordance with the pattern of data processing and information needs at that location, then implement the design to know and measure the level of efficiency (ease), effectiveness (speed), accurate (data accuracy), and security (data security) and the process of disseminating data and information from the design offered. Implementation of consumer financing data processing is a database fragmentation system, wherein one network scale using more than one DBMS, DBMS used is MySQL and PostgreSQL. PostgreSQL is used for web-based applications developed with PHP programming language using AJAX Technology, and MySQL developed using Notepad ++ Application. Data connection process using Web Service. Based on the result of the research, it can be concluded that Webservice Implementation for fragmentation based consumer financing data processing facilitates the updating of consumer financing data in terms of ease, speed, accuracy, and data security.
APA, Harvard, Vancouver, ISO, and other styles
33

Viana da Silva, Marcos Vinicius, Erick Da Luz Scherf, and Jose Everton Da Silva. "THE RIGHT TO DATA PROTECTION VERSUS “SECURITY”." Revista Direitos Culturais 15, no. 36 (April 27, 2020): 209–32. http://dx.doi.org/10.20912/rdc.v15i36.18.

Full text
Abstract:
The protection of personal data in the cyberspace has been an issue of concern for quite some time. However, with the revolutions in information technology, big data and the internet of things, data privacy protection has become paramount in an era of free information flows. Considering this context, this research intends to shine a light on the experience of Brazil regarding data privacy protection, through the analysis of a brand new bill passed by Congress: the Brazilian General Personal Data Protection Act. Our assessment of the legislation was made from the perspective of a human rights-based approach to data, aiming to analyze both advancements, limitations and contradictions of the rights-discourse in the LGPD. Our main conclusions were that the (public and national) security rhetoric, also present in the bill, can create a state of exception regarding the processing of personal data of those considered “enemies of the state”, which may result in violations of fundamental rights and procedural guarantees.
APA, Harvard, Vancouver, ISO, and other styles
34

Golubev, Alexandr, Peter Bogatencov, and Grigore Secrieru. "DICOM data processing optimization in medical information systems." Scalable Computing: Practice and Experience 19, no. 2 (May 10, 2018): 189–201. http://dx.doi.org/10.12694/scpe.v19i2.1399.

Full text
Abstract:
The problem of storage and visualization of medical images collected by various medical equipment is actual for latest 10 years for every medical institution. On the other hand, access to the medical investigation datasets and solving the problem of personal patient data security is important for scientific community and institutions that require this data. "DICOM Network" project was developed for solving these problems for different actors in the system based on the various customized roles. This article describes the problems and possible solutions for optimization of medical images storing, providing stable and secure access, based on the distributed warehouse for huge volumes of data with different levels of access. .
APA, Harvard, Vancouver, ISO, and other styles
35

Bhuvanya, R., K. Vijayalakshmi, S. Uma, and A. A.Suresh. "Secret data sharing using steganography and image processing." International Journal of Engineering & Technology 7, no. 1.7 (February 5, 2018): 100. http://dx.doi.org/10.14419/ijet.v7i1.7.9584.

Full text
Abstract:
Steganography is a technique that helps to hide the secret data inside the digitally covered image. The message to be hidden can be a text,image, speech, video. The proposed method aims to combine the technique of steganography and Image Processing. Cover image helps to carry the secret data in an embedded form which is referred as stego image. This work proposes a new implementation process called clustering modification directions (CMDs). To implement this methodology, several sub images will be created by decomposing the cover image using additive distortion functions. To enhance the security, password protection is also applied for the hidden information to be retrieved.
APA, Harvard, Vancouver, ISO, and other styles
36

Chandrakumar, T., and S. Parthasarathy. "Enhancing Data Security in ERP Projects Using XML." International Journal of Enterprise Information Systems 8, no. 1 (January 2012): 51–65. http://dx.doi.org/10.4018/jeis.2012010104.

Full text
Abstract:
Enterprise resource planning (ERP) is integrated packaged software, which addresses most fundamental business processing functionality across different functional areas and business units, in a single software system, with single database and accessible through a unified interface and channel of communication. Meeting security requirements for privacy, confidentiality and integrity is essential in order to move business online ERP System requires an accurate, precise and Data security in business concepts of the enterprise. The authors introduce basic features and security of ERP System using Extensible Mark-up Language (XML) technology. Traditionally, XML security has developed along two distinct though related lines of research, corresponding to two facts of the XML security notion. The first fact defines XML security as a set of security techniques (encryption, digital signature) tightly coupled with XML to maintain the main features of the XML semi-structured data model while adding to it all necessary security capabilities. In this paper we will explore XML Signature specification from W3C and its implementation in .NET.
APA, Harvard, Vancouver, ISO, and other styles
37

Engouang, Tristan Daladier, Yun Liu, and Zhen Jiang Zhang. "Trusted Data Aggregation with Low Energy in Wireless Sensor Networks." Applied Mechanics and Materials 596 (July 2014): 519–27. http://dx.doi.org/10.4028/www.scientific.net/amm.596.519.

Full text
Abstract:
— Scientific researches advancements achieving miniaturization of Micro-electromechanical Systems, has enable smarts autonomous embedded devices know as sensor nodes, that are developed on numerous platforms using the proprietary of hardware and software with capability to communicate wirelessly. Today more than ever these sensors are continuously spreading to civilian usage side of things and in many others applications , including military, security, medical, environments, and animal among others, to sense specific occurrence of desired event and may carried very important data on physical device such as the mica-mote. Hence a plethora of security protocols arises in order to mitigate the risks of malicious attacks such as eavesdrop communications, or data alteration, using cryptographic techniques such as Elliptic curve for data privacy, accuracy, integrity, efficiency, and reducing the energy consumption by mote and processors. We focus on securing data by all means. Hence the in-network processing technique is used to reduce considerably the energy consumption, considering that sensors deployments in inaccessible and resource-constrained environments. After the drawback, we investigate the secured data aggregation and give security requirements that are mandatory to a Trusted Data Aggregation with Low Energy model to satisfy. The security and energy performances are analysed comparing with others methods. Index Terms—TDALE, Aggregation, Elliptic curve, RSA, Security, Energy
APA, Harvard, Vancouver, ISO, and other styles
38

Buldakova, T. I., and A. Sh Dzhalolov. "Analysis of data processes and choices of data-processing and security technologies in situation centers." Scientific and Technical Information Processing 39, no. 2 (April 2012): 127–32. http://dx.doi.org/10.3103/s0147688212020116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Chen, Min. "A Hierarchical Security Model for Multimedia Big Data." International Journal of Multimedia Data Engineering and Management 5, no. 1 (January 2014): 1–13. http://dx.doi.org/10.4018/ijmdem.2014010101.

Full text
Abstract:
In this paper, the author proposes a hierarchical security model (HSM) to enhance security assurance for multimedia big data. It provides role hierarchy management and security roles/rules administration by seamlessly integrating the role-based access control (RBAC) with the object-oriented concept, spatio-temporal constraints, and multimedia standard MPEG-7. As a result, it can deal with challenging and unique security requirements in the multimedia big data environment. First, it supports multilayer access control so different access permission can be conveniently set for various multimedia elements such as visual/audio objects or segments in a multimedia data stream when needed. Second, the spatio-temporal constraints are modeled for access control purpose. Finally, its security processing is efficient to handle high data volume and rapid data arrival rate.
APA, Harvard, Vancouver, ISO, and other styles
40

Jiang, Wei, and Feng Yang. "Applied-Information Technology in Research of Security Processing Based on IOT Data." Advanced Materials Research 908 (March 2014): 509–12. http://dx.doi.org/10.4028/www.scientific.net/amr.908.509.

Full text
Abstract:
Internet of things (IOT) has become an important trend in the development of information technology. How to deal with huge amounts of internet data is becoming more and more important. In this paper, we have a further research in the technology of applied-information about mass content of network data security processing model. This model is mainly composed of massive internet of data acquisition, data storage, based on the rules of mass data processing and data security management, etc. The model can be applied to all kinds of massive internet data monitoring system based on rules, such as: the lake water quality monitoring system based on Internet of things, PM2.5 monitoring system, and so on.
APA, Harvard, Vancouver, ISO, and other styles
41

Duan, Chun Mei. "Design of Big Data Processing System Architecture Based on Hadoop under the Cloud Computing." Applied Mechanics and Materials 556-562 (May 2014): 6302–6. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6302.

Full text
Abstract:
In allusion to limitations of traditional data processing technology in big data processing, big data processing system architecture based on hadoop is designed, using the characteristics of quantification, unstructured and dynamic of cloud computing.It uses HDFS be responsible for big data storage, and uses MapReduce be responsible for big data calculation and uses Hbase as unstructured data storage database, at the same time a system of storage and cloud computing security model are designed, in order to implement efficient storage, management, and retrieval of data,thus it can save construction cost, and guarantee system stability, reliability and security.
APA, Harvard, Vancouver, ISO, and other styles
42

Dai, Wei, Xuefang Zhang, and Peng Hu. "A Study on Security Technique of Cloud Data Processing in Electronic Commerce." International Journal of Security and Its Applications 8, no. 2 (March 31, 2014): 283–90. http://dx.doi.org/10.14257/ijsia.2014.8.2.29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Raihan, Md, Kh Mohaimenul, and Md Mehedi. "Data Security Throws Image processing by Blowfish Algorithm, Genetic Algorithm and LSB." International Journal of Computer Applications 148, no. 1 (August 16, 2016): 1–3. http://dx.doi.org/10.5120/ijca2016909946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Lv, Haicui. "Application of Information Security in Image Encryption Processing Based on Big Data." Journal of Physics: Conference Series 1881, no. 4 (April 1, 2021): 042010. http://dx.doi.org/10.1088/1742-6596/1881/4/042010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Khvostov, Victor A., Alexey V. Skrypnikov, Evgeniy A. Rogozin, Ludmila A. Obuhova, and Dmitriy G. Silka. "Analysis of information security threats when processing confidential data in mobile systems." Bezopasnost informacionnyh tehnology 28, no. 1 (January 2021): 95–105. http://dx.doi.org/10.26583/bit.2021.1.08.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Muneeswari, G., M. Mahalakshmi, S. Lokeshwari, and R. Yashini. "Dynamic Data Compression and Security Based Algorithm for Big Sensing Data." International Journal of Engineering & Technology 7, no. 2.24 (April 25, 2018): 182. http://dx.doi.org/10.14419/ijet.v7i2.24.12026.

Full text
Abstract:
In this paper, we propose a data compression algorithm named data will be divided into chunks and similarity based compression for the efficient processing of sensing data on the cloud. In current technology, the big challenge lies in the efficient access to storage and evaluating sensing data as it is vital to consider the accuracy of the data. In the traditional compression algorithm, data is considered as a single unit but in our novel approach compression is applied over a partitioned data chunks. Once the sensing data is compressed, in order to regain the original data, we perform some kind of prediction method and restoration algorithm. MapReduce algorithm is incorporated in our approach for providing scalability over the network and similarity checking to verify the correctness of file. The results obtained shows that the technique predominantly increases the efficiency of the data compression with a very less percentage of data loss.
APA, Harvard, Vancouver, ISO, and other styles
47

Poltavtseva, M. A., and M. O. Kalinin. "Modeling Big Data Management Systems in Information Security." Automatic Control and Computer Sciences 53, no. 8 (December 2019): 895–902. http://dx.doi.org/10.3103/s014641161908025x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Tripathy, Asis Kumar, Tapan Kumar Das, and Navaneethan C. "Data cryptography based on musical notes on a fingerboard along with a dice." Indonesian Journal of Electrical Engineering and Computer Science 14, no. 3 (June 1, 2019): 1286. http://dx.doi.org/10.11591/ijeecs.v14.i3.pp1286-1290.

Full text
Abstract:
<p>The security of an online system is the foremost necessity nowadays. With huge growth of the IT power and with the invention of new technologies, the number of threats a user faces is growing exponentially. Cryptography is a combination of security engineering and mathematics. It is the best technology for securing distributed systems. Cryptography consists in processing plain information by applying a cipher and producing encoded output, unknown to a third-party who does has no idea about the key. In cryptography both encryption and decryption phase are processed by one or more keys. Encryption is extremely important for a safe and secure environment for the computers and the Internet.</p>
APA, Harvard, Vancouver, ISO, and other styles
49

Priyadarshini, Rojalina, Rabindra Kumar Barik, Harish Chandra Dubey, and Brojo Kishore Mishra. "A Survey of Fog Computing-Based Healthcare Big Data Analytics and Its Security." International Journal of Ambient Computing and Intelligence 12, no. 2 (April 2021): 53–72. http://dx.doi.org/10.4018/ijaci.2021040104.

Full text
Abstract:
Growing use of wearables within internet of things (IoT) creates ever-increasing multi-modal data from various smart health applications. The enormous volume of data generation creates new challenges in transmission, storage, and processing. There were challenges such as communication latency and data security associated with processing medical big data in cloud backend. Fog computing (FC) is an emerging distributed computing paradigm that solved these problems by leveraging local data processing, storage, filtering, and machine intelligence within an intermediate fog layer that resides between cloud and wearables devices. This paper focuses on doing survey on two major aspects of deploying fog computing for smart and connected health. Firstly, the role of machine learning-based edge intelligence in fog layer for data processing is investigated. A comprehensive analysis is provided during the survey, highlighting the strength and improvements in the existing literature. The paper ends with some open challenges and future research areas in the domain of fog-based healthcare.
APA, Harvard, Vancouver, ISO, and other styles
50

Kaur, Jaspreet, and Navdeep Kaler. "DESIGN AND IMPLEMENTATION OF AN OTP BASED DATA SECURITY MODEL INCOPERATING AES AND SHA2 IN CLOUD ENVIRONMENT." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 17, no. 1 (January 16, 2018): 7081–91. http://dx.doi.org/10.24297/ijct.v17i1.6930.

Full text
Abstract:
Cloud computing has revolutionized the way computing and software services are delivered to the clients on demand. It offers users the ability to connect to computing resources and access IT managed services with a previously unknown level of ease. Thus, security concerns among users of the cloud have become a major barrier to the widespread growth of cloud computing. In this research work, we have used the 3 step security mechanism for the keeping the data secure at the cloud. We have implemented the strong authentication mechanism using AES encrypted OTP and enhanced the security of data using Cloud Broker and AES. When you log on to your machine and then try to access a resource, say a file server or database, something needs to assure that your username and password are valid. With sensitive data stored in the cloud of the different users, we need a strong authentication mechanism along with OTP. Data breaches because of no/weak authentication. Afterwards we have verified the integrity of data stored at cloud provider using SHA2. Multiple parameters like processing time, processing cost, AES encryption time, OTP generation and encryption time have been calculated and analyzed. We have been able to enhance the security by optimizing the processing time as well as processing cost. After implementing the proposed methodology, it has been summarized that the cloud security can be enhanced by applying the proposed mechanism. The proposed system has reduced the complexity, processing cost which increases the overall efficiency of the system.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography