Asian Journal of Computer Science and Technology (AJCST)
A Survey on Security Models for Data Privacy in Big Data AnalyticsAuthor : Avula Satya Sai Kumar, S. Mohan and R. Arunkumar
Volume 7 No.1 Special Issue:November 2018 pp 87-89
As emerging data world like Google and Wikipedia, volume of the data growing gradually for centralization and provide high availability. The storing and retrieval in large volume of data is specialized with the big data techniques. In addition to the data management, big data techniques should need more concentration on the security aspects and data privacy when the data deals with authorized and confidential. It is to provide secure encryption and access control in centralized data through Attribute Based Encryption (ABE) Algorithm. A set of most descriptive attributes is used as categorize to produce secret private key and performs access control. Several works proposed in existing based on the different access structures of ABE algorithms. Thus the algorithms and the proposed applications are literally surveyed and detailed explained and also discuss the functionalities and performance aspects comparison for desired ABE systems.
Attribute Based Encryption, Data Privacy, Access Control
 A. Shamir, “How to share a secret”, Communications of the ACM, Vol. 22, No. 11, pp. 612–613, 1979.
 V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data”, In Proceedings of the 13th ACM Conference on Computer and Communications Security. ACM, pp. 89–98, 2006.
 J. Bethencourt, A. Sahai, and B. Waters, “Cipher text-policy attribute-based encryption”, In Security and Privacy, 2007. SP 07. IEEE Symposium on. IEEE, pp. 321–334, 2007.
 Zhi Qiao, S. Liang, S. Davis and H. Jiang, “Survey of attribute based encryption”, 15th IEEE International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel Distributed Computing, June, 2014.
 G. K. Sandhia and Dr. S. V. Kasmir Raja, “Survey on Attribute Based Encryption schemes for securing the data in cloud environment”, International Journal or Pure and Applied Mathematics, Vol. 115, No. 6, pp. 565-569, 2017.