Big Data Concepts, Theories, and Applications 2016
DOI: 10.1007/978-3-319-27763-9_6
|View full text |Cite
|
Sign up to set email alerts
|

Big Data Storage Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 34 publications
0
2
0
Order By: Relevance
“…Since data compression techniques eliminate redundancy and data duplication [24], encrypted or random data cannot be compressed further. Compression techniques involve three processing stages: 1) data preprocessing, 2) removal of data duplication, and 3) bits’ reduction.…”
Section: Related Workmentioning
confidence: 99%
“…Since data compression techniques eliminate redundancy and data duplication [24], encrypted or random data cannot be compressed further. Compression techniques involve three processing stages: 1) data preprocessing, 2) removal of data duplication, and 3) bits’ reduction.…”
Section: Related Workmentioning
confidence: 99%
“…The current mainstream method of central database to deal with these problems is to improve the difficulty of obtaining data management authority, to improve the security of access control, but it still depends on whether the decision is correct and trustworthy, and whether the decision center is safe [6]. Blockchain is a distributed database system based on peer-topeer network, it is the result of integrating many technologies, these technologies include P2P protocol, zero-knowledge proof, consensus mechanism, smart contract, this creates a new way of storing and processing data differently than before [7,8].…”
Section: Introductionmentioning
confidence: 99%