Your browser doesn't support javascript.
Security Techniques Implementation on Big Data Using Steganography and Cryptography
7th International Conference on ICT for Sustainable Development, ICT4SD 2022 ; 517:279-302, 2023.
Article in English | Scopus | ID: covidwho-2148689
ABSTRACT
The COVID-19 pandemic has increased everyone’s exposure to the Internet thus there has been an addition of new people who now access the Internet and its applications. Hence, the quantity of big data has grown tremendously in the era of smart city life. Thus concern for security of big data has risen. The attacks currently faced by big databases such as misuse, misrepresentation, modification, and unauthorized users and such attacks have increased in number. To ensure the security of big data stores to prevent misuse, misrepresentation, modification, and unauthorized users issues related to insecurity in storage units and not rendering it vulnerable to attackers, it is needed to enhance the secrecy, privacy, and increase the capacity for hiding secret cover. While cryptography guarantees authentication, integrity, non-repudiation, etc. In this paper, the author has studied popular data hiding techniques, especially steganography and cryptography used for provides security to big databases. © 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
Keywords

Full text: Available Collection: Databases of international organizations Database: Scopus Language: English Journal: 7th International Conference on ICT for Sustainable Development, ICT4SD 2022 Year: 2023 Document Type: Article

Similar

MEDLINE

...
LILACS

LIS


Full text: Available Collection: Databases of international organizations Database: Scopus Language: English Journal: 7th International Conference on ICT for Sustainable Development, ICT4SD 2022 Year: 2023 Document Type: Article