Security Enhancement Using NTRU Algorithm Based Cryptosystem for Communication of Classified Information Via Cloud IJTSRD
Distributed storage depends on exceptionally artificial foundation and encourages available boundary point, flexibility and versatility it can oversee profoundly dimensions and tedious information. Henceforth, subcontracting encoded text to a cloud is ended up being a standout amongst the best methodologies for big data stockpiling and admittance. In spite of the fact that gives bounteous security […]
Use of Big Data in Government Sector IJTSRD
Businesses, governments, and the research community can all derive value from the massive amounts of digital data they collect. Analyzing big-data application projects by governments offers guidance for follower countries for their own future big-data initiatives. Decision making in government usually takes much longer and is conducted through consultation and mutual consent of a large […]
CarStream: An Industrial System of Big Data Processing for Internet of Vehicles IJTSRD
As the Internet-of-Vehicles (IoV) technology becomes an increasingly important trend for future transportation, de-signing large-scale IoV systems has become a critical task that aims to process big data uploaded by fleet vehicles and to provide data-driven services. The IoV data, especially high-frequency vehicle statuses (e.g., location, engine parameters), are characterized as large volume with a […]
Analysis on NoSQL: MongoDB Tool IJTSRD
The Relational Database System is basic database used from many decades. Since Mysql, Oracle are used for relational kind of databases but Nowadays structure of data has been changed. The problem of Data storage has been raised. Different form of data is available i.e. multimedia databases which is difficult to store. MongoDb can be future […]
Database Security Model using Access Control Mechanism in Student Data Management IJTSRD
Database security means the protection of data against unauthorized disclosure, alteration, destruction. This paper present a procedure to implement a Data Access Policy to ensure the protection of privacy rights of students records within student data management system. According to the system, the administration of different security levels, resources, users, tasks etc. is indispensable. This […]