IJEM Vol. 7, No. 4, 8 Jul. 2017
Cover page and Table of Contents: PDF (size: 337KB)
Full Text (PDF, 337KB), PP.51-59
Views: 0 Downloads: 0
QKD-Quantum key Distribution, Big Data, Cryptography, Security Challenges, Big Data Mining, Data Analysis
Data now days is of the utmost importance in our network system maybe be in Raw form or be it processed Information. This research paper represents the Security Analysis of modern Big Data technology with the various upcoming challenges and threats which has a vast effect on any organization working in this field and thus the various solutions using Quantum and other cryptographic methods with encryption and numerous other pitfalls and the applications of such methods in real life.
Sayantan Gupta,"Security Analysis and Proposal of Kill Model using Modern Quantum Key Distribution in Big Data Mining", International Journal of Engineering and Manufacturing(IJEM), Vol.7, No.4, pp.51-59, 2017. DOI: 10.5815/ijem.2017.04.05
[1]ISSUES, CHALLENGES, AND SOLUTIONS: BIG DATA MINING Jaseena K.U.1 and Julie M. David
[2]MapReduce: Simplied Data Processing on Large Clusters Jeffrey Dean and Sanjay Ghemawat jeff@google.com, sanjay@google.com Google, Inc.
[3]Big Data: Uses and Limitations Nathaniel Schenker Associate Director for Research and Methodology National Center for Health Statistics Centers for Disease Control and Prevention Presentation for discussion at the meeting of the NCHS Board of Scientific Counselors.
[4]SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING Venkata Narasimha Inukollu1, Sailaja Arsi1 and Srinivasa Rao Ravuri3 Department of Computer Engineering, Texas Tech University, USA Department of Banking and Financial Services,Cognizant Technology Solutions, India.
[5]Big Data for Supporting Low-Carbon Road Transport Policies in Europe: Applications, Challenges and Opportunities Michele De Gennaro | Elena Paffumi.
[6]IOT Technique in Data minig in Analysis Dreaming Dr. Rajat Sen, Dr. M. Mano Department of CSE , UMI, India.
[7]Quantum Data Mining in Organiations Behavior in Time Model T.N Dutta, S.W. John Cisco Inc.
[8]Performance Analysis, Controller Selection And Verification Of Electric Motor For Mechatronics Motion Control Applications, Using New MATLAB Built-In Function And Simulink Model Ahmad A. Mahfouz, Farhan A. Salem.
[9]Design Of A Optimized Parallel Array Multiplier Using Parallel Prefix Adder K.KalaiKaviya, D.P.Balasubramanian, S.Tamilselvan.
[10]Design Artificial Intelligent Parallel Feedback Linearization of PID Control with Application to Continuum Robot Farzin Piltan, Sara Emamzadeh, Sara Heidari, Samaneh Zahmatkesh, Kamran Heidari.
[11]Analysis of Resistance Parasitic of Single Wall CNT bundle with Copper for VLSI Interconnect Tarun Parihar, Abhilasha Sharma.
[12]Research of Product Classifying and Coding Based on the Things Characteristics and Realization of the Relevant Management System Chen Xi, Hao Lijian, Yang Guichun, Zhang Jialia, Xia Guijiana, Ma Yanlia.
[13]Performance Study on the System of Real-Time VBR Service with Shared Cache Hong-fei Zhang, Sheng-ye Huang.
[14]Image Denoising by Nonlinear Diffusing on Mixed Curvature Gao Jian, Zhang Feiyan, Qin Qianqing.
[15]Research of Association Rule Mining Algorithm Based on Improved FP-Tree Chen zhuo,Lu nannan,Li shiqi,Han tao.