A multithreaded programming approach for multimedia big data: encryption system

2017 ◽  
Vol 77 (9) ◽  
pp. 10997-11016 ◽  
Author(s):  
Shadi Aljawarneh ◽  
Muneer Bani Yassein ◽  
We’am Adel Talafha
Big Data ◽  
2020 ◽  
Vol 8 (2) ◽  
pp. 87-88
Author(s):  
Priyan Malarvizhi Kumar ◽  
Hari Mohan Pandey ◽  
Gautam Srivastava

Author(s):  
Vani Rajasekar ◽  
Premalatha Jayapaul ◽  
Sathya Krishnamoorthi ◽  
Muzafer Saracevic ◽  
Mohamed Elhoseny ◽  
...  

2017 ◽  
Vol 77 (8) ◽  
pp. 10077-10089 ◽  
Author(s):  
Zhihan Lv ◽  
Xiaoming Li ◽  
Kim-Kwang Raymond Choo

Now-a-days data plays a key role in Information Technology and while coming to privacy of that data it has become a considerable issue to maintain data security at high level. Large amounts of data generated through devices are considered as a major obstacle and also tough to handle in real time scenarios. To meetwith consistent performance applications at present abandon encryptions techniquesbecausethe time for the execution and the completion of encryption techniques plays a key role during processing and transmissions of data. In this paper our moto is to secure data and proposed a new technique called Dynamic Data Encryption Strategy (DDES)which selectively encrypts data and uses some algorithms which provides a perfect encryption strategy for the data packages under some timing constraints. By this method we can achieve data privacy and security for big-data in mobile cloud-computing by using an encryption strategy respective to their requirements during execution time.


Author(s):  
Gayatri Kapil ◽  
Zaiba Ishrat ◽  
Rajeev Kumar ◽  
Alka Agrawal ◽  
Raees Ahmad Khan

Big Data ◽  
2016 ◽  
pp. 441-453
Author(s):  
Min Chen

In this chapter, the author proposes a hierarchical security model (HSM) to enhance security assurance for multimedia big data. It provides role hierarchy management and security roles/rules administration by seamlessly integrating the role-based access control (RBAC) with the object-oriented concept, spatio-temporal constraints, and multimedia standard MPEG-7. As a result, it can deal with challenging and unique security requirements in the multimedia big data environment. First, it supports multilayer access control so different access permission can be conveniently set for various multimedia elements such as visual/audio objects or segments in a multimedia data stream when needed. Second, the spatio-temporal constraints are modeled for access control purpose. Finally, its security processing is efficient to handle high data volume and rapid data arrival rate.


Sign in / Sign up

Export Citation Format

Share Document