Open Access   Article Go Back

An Enhanced Schmidt Samoa Cryptosystem for Securing Health Care information in Big Data Scenario

Narayana Galla1 , Padmavathamma Mokkala2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-06 , Page no. 37-40, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si6.3740

Online published on Mar 20, 2019

Copyright © Narayana Galla, Padmavathamma Mokkala . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Narayana Galla, Padmavathamma Mokkala, “An Enhanced Schmidt Samoa Cryptosystem for Securing Health Care information in Big Data Scenario,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.37-40, 2019.

MLA Style Citation: Narayana Galla, Padmavathamma Mokkala "An Enhanced Schmidt Samoa Cryptosystem for Securing Health Care information in Big Data Scenario." International Journal of Computer Sciences and Engineering 07.06 (2019): 37-40.

APA Style Citation: Narayana Galla, Padmavathamma Mokkala, (2019). An Enhanced Schmidt Samoa Cryptosystem for Securing Health Care information in Big Data Scenario. International Journal of Computer Sciences and Engineering, 07(06), 37-40.

BibTex Style Citation:
@article{Galla_2019,
author = {Narayana Galla, Padmavathamma Mokkala},
title = {An Enhanced Schmidt Samoa Cryptosystem for Securing Health Care information in Big Data Scenario},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {07},
Issue = {06},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {37-40},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=864},
doi = {https://doi.org/10.26438/ijcse/v7i6.3740}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.3740}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=864
TI - An Enhanced Schmidt Samoa Cryptosystem for Securing Health Care information in Big Data Scenario
T2 - International Journal of Computer Sciences and Engineering
AU - Narayana Galla, Padmavathamma Mokkala
PY - 2019
DA - 2019/03/20
PB - IJCSE, Indore, INDIA
SP - 37-40
IS - 06
VL - 07
SN - 2347-2693
ER -

           

Abstract

In Data sources for information feed into a Big Data achievement as you might expect contain sensitive or confined information or key logical property along with non-sensitive data. In the Big data world securing the sensitive data be renewed into more intricate and time overwhelming process. In the big data distribution of sensitive, it exacerbates the threat of sensitive data falling into the un-authorized. To battle this sensitive data threat, enterprises turn to cryptosystem. In the cryptosystem encryption is the process of encoding sensitive data so that only authorized or privileged parties can decrypt and read the sensitive data applying this methodology in application level we provide complete security on the sensitive data.

Key-Words / Index Term

Cryptography – Policy – Data Encryption - Privileged User – Enhanced Schmidt Samoa

References

[1]. http://www.sas.com/en_us/insights/big-data/what-is-big-data.html
[2]. https://globalecco.org/big-data-insider-threats-and-international-intelligence-sharing
[3]. "Sensitive Information" (definition) Aug. 23, 1996. Retrieved Feb. 9 2013.
[4]. "DEPARTMENT OF INDUSTRY: PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT" Canada Gazette, Apr. 03 2002. Retrieved Feb. 9 2013.
[5]. http://motherboard.vice.com/read/even-tor-cant-save-small-time-hackers
[6]. https://www.qubole.com/blog/big-data/hadoop-security-issues/
[7]. https://securosis.com/assets/library/reports/Securing_Hadoop_Final_V2.pdf
[8]. https://securosis.com/blog/securing-hadoop-architectural-security-issues
[9]. http://www.bmc.com/blogs/big-data-security-issues-challenges-for-2016/
[10]. https://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act
[11]. http://searchdatamanagement.techtarget.com/definition/HIPAA
[12]. http://blog.vormetric.com/2015/06/23/locking-down-data-full-disk-encryption-vs-file-level-encryption/
[13]. Performance analysis of Jordan Totient RSA (JkRSA) and NTRU, International Journal of Scientific & Engineering Research, Volume 5, Issue 3, March-2014 1099 ISSN 2229-5518
[14]. https://www.vormetric.com/data-security-solutions/use-cases/privileged-user