A BIG DATA AND IT’S SECURITY CHALLENGE IN DIGITAL MEDIA
Main Article Content
Abstract
In this research work discuss about the big data and related problem. In the current generation big data
play’s an important role in various data mining application. This research work discuss the various field in which
apply big data application. There are many critical issues and challenges face in the big data. Big Data
Duplication is one of the challenging problem between researchers. In the last decade the growth of big data
exponentiation, Terabytes, Petabyte, Exabyte, Zettabyte bytes data generated in every day in a single stock
market research application. In this process huge amount of decapitate data also generated in Terabytes as well
as Petabytes. Similar that social media application generated large amount of duplicate information. In this
research work focus on different problems and hurdles of big data and its related issues.However, encrypted
information introduce new challenges for cloud information de-duplication that becomes crucial for giant
information storage and process in cloud. De-duplication schemes cannot work on encrypted information.
Existing solutions of encrypted information de-duplication suffer from security weakness. They cannot flexibly
support information access management [13] and revocation. Therefore, few of them is pronto deployed in
observe. During this paper, we propose a theme to de-duplicate encrypted information hold on in cloud
supported possession challenge and proxy re-encryption. It integrates cloud information de-duplication with
access management.
Downloads
Metrics
Article Details
Licensing
TURCOMAT publishes articles under the Creative Commons Attribution 4.0 International License (CC BY 4.0). This licensing allows for any use of the work, provided the original author(s) and source are credited, thereby facilitating the free exchange and use of research for the advancement of knowledge.
Detailed Licensing Terms
Attribution (BY): Users must give appropriate credit, provide a link to the license, and indicate if changes were made. Users may do so in any reasonable manner, but not in any way that suggests the licensor endorses them or their use.
No Additional Restrictions: Users may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.