A BIG DATA AND IT’S SECURITY CHALLENGE IN DIGITAL MEDIA
Main Article Content
Abstract
In this research work discuss about the big data and related problem. In the current
generation big data play’s an important role in various data mining application. This research
work discuss the various field in which apply big data application. There are many critical
issues and challenges face in the big data. Big Data Duplication is one of the challenging
problem between researchers. In the last decade the growth of big data exponentiation,
Terabytes, Petabyte, Exabyte, Zettabyte bytes data generated in every day in a single stock
market research application. In this process huge amount of decapitate data also generated in
Terabytes as well as Petabytes. Similar that social media application generated large amount
of duplicate information. In this research work focus on different problems and hurdles of big
data and its related issues.However, encrypted information introduce new challenges for cloud
information de-duplication that becomes crucial for giant information storage and process in
cloud. De-duplication schemes cannot work on encrypted information. Existing solutions of
encrypted information de-duplication suffer from security weakness. They cannot flexibly
support information access management [13] and revocation. Therefore, few of them is pronto
deployed in observe. During this paper, we propose a theme to de-duplicate encrypted
information hold on in cloud supported possession challenge and proxy re-encryption. It
integrates cloud information de-duplication with access management.
Downloads
Metrics
Article Details
Licensing
TURCOMAT publishes articles under the Creative Commons Attribution 4.0 International License (CC BY 4.0). This licensing allows for any use of the work, provided the original author(s) and source are credited, thereby facilitating the free exchange and use of research for the advancement of knowledge.
Detailed Licensing Terms
Attribution (BY): Users must give appropriate credit, provide a link to the license, and indicate if changes were made. Users may do so in any reasonable manner, but not in any way that suggests the licensor endorses them or their use.
No Additional Restrictions: Users may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.