مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

179
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

58
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

An Architecture for Security and Protection of Big Data

Pages

  1479-1486

Abstract

 The issue of online Privacy and security is a challenging subject, as it concerns the Privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the Privacy issue of distributed Big Data in the context of Cloud Computing. One of the cases where data Privacy is of great importance is the authentication and protection of ownership data. In this paper, this Privacy issue is analyzed by Petri Net modeling. What today’ s organizations need for their clouds are integrated comprehensive solutions that can deliver security intelligence. Advanced security intelligence solutions can close security gaps by using labor-saving automation to analyze millions of events occurring within the cloud, and discover system vulnerabilities through the normalization and correlation of these events. Using the proposed method, a model of security, including control of user access to databases of Big Data with RMS, the multiplicity and the virtual machine to prevent internal threats, deleting data, insecure or incomplete data protection and control of a third-party can be provided to improve the operation according to the rules of Petri Net modeling and simulation.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    Asadi Saeed Abad, F., & HAMIDI, H.. (2017). An Architecture for Security and Protection of Big Data. INTERNATIONAL JOURNAL OF ENGINEERING, 30(10 (TRANSACTIONS A: Basics)), 1479-1486. SID. https://sid.ir/paper/723985/en

    Vancouver: Copy

    Asadi Saeed Abad F., HAMIDI H.. An Architecture for Security and Protection of Big Data. INTERNATIONAL JOURNAL OF ENGINEERING[Internet]. 2017;30(10 (TRANSACTIONS A: Basics)):1479-1486. Available from: https://sid.ir/paper/723985/en

    IEEE: Copy

    F. Asadi Saeed Abad, and H. HAMIDI, “An Architecture for Security and Protection of Big Data,” INTERNATIONAL JOURNAL OF ENGINEERING, vol. 30, no. 10 (TRANSACTIONS A: Basics), pp. 1479–1486, 2017, [Online]. Available: https://sid.ir/paper/723985/en

    Related Journal Papers

  • No record.
  • Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button