International Journal of Soft Computing

Year: 2018
Volume: 13
Issue: 4
Page No. 123 - 128

A Big Data Security Method Using Modulus Operator

Authors : R.A. Archana, Ravindra S. Hegadi and T.N. Manjunath

References

Batini, C. and S. Monica, 2016. Data Quality: Concepts, Methodologies and Techniques. Springer, Berlin, Germany, ISBN:13-978-3-540-33172-8, Pages: 249.

Bonifati, A., F. Cattaneo, S. Ceri, A. Fuggetta and S. Paraboschi, 2001. Designing data marts for data warehouses. ACM. Trans. Software Eng. Method., 10: 452-483.
CrossRef  |  Direct Link  |  

Domingo-Ferrer, J. and J.M. Mateo-Sanz, 2002. Practical data-oriented microaggregation for statistical disclosure control. IEEE. Trans. Knowl. Data Eng., 14: 189-201.
CrossRef  |  Direct Link  |  

Dreibelbis, A., H. Eberhard, M. Ivan, O. Martin and V.R. Paul et al., 2008. Enterprise Master Data Management: An SOA Approach to Managing Core Information. Dorling Kindersley (India) Pvt. Ltd., Noida, India,.

Kimball, R. and J. Caserta, 2004. The Data Warehouse ETL Toolkit: Practical Techniques for Extracting, Cleaning, Conforming and Delivering Data. John Wiley and Sons, New York, USA., ISBN-13: 9780764579233, Pages: 528.

Manjunath, T.N. and R.S. Hegadi, 2013. Data quality assessment model for data migration business enterprise. Intl. J. Eng. Technol., 5: 101-109.
Direct Link  |  

Manjunath, T.N. and R.S. Hegadi, 2013. Statistical data quality model for data migration business enterprise. Intl. J. Soft Comput., 8: 340-351.
CrossRef  |  Direct Link  |  

Manjunath, T.N., R.S. Hegadi and G.K. RaviKumar, 2011. Design and analysis of DWH and BI in education domain. Intl. J. Comput. Sci., 8: 545-551.

Manjunath, T.N., R.S. Hegadi and G.K. Ravikumar, 2011. Analysis of data quality aspects in datawarehouse systems. Int. J. Comput. Sci. Inf. Technol., 2: 477-485.
Direct Link  |  

Manjunath, T.N., R.S. Hegadi and H.S. Mohan, 2011. Automated data validation for data migration security. Intl. J. Comput. Appl., 30: 41-46.

Muralidhar, K. and R. Sarathy, 1999. Security of random data perturbation methods. ACM. Trans. Database Syst., 24: 487-493.
CrossRef  |  Direct Link  |  

Muralidhar, K. and R. Sarathy, 2008. A theoretical comparison of data masking techniques for numerical microdata. Proceedings of the 3rd IAB Workshop on Confidentiality and Disclosure-SDC for Microdata, November 20-21, 2008, Institute for Employment Research, Nuremberg, Germany, pp: 20-21.

Muralidhar, K., D. Batra and P.J. Kirs, 1995. Accessibility, security and accuracy in statistical databases: The case for the multiplicative fixed data perturbation approach. Manage. Sci., 41: 1549-1564.
Direct Link  |  

Muralidhar, K., R. Parsa and R. Sarathy, 1999. A general additive data perturbation method for database security. Manage. Sci., 45: 1399-1415.
Direct Link  |  

Muralidhar, K., R. Sarathy and R. Parsa, 2001. An improved security requirement for data perturbation with implications for E‐commerce. Decis. Sci., 32: 683-698.
CrossRef  |  Direct Link  |  

Murdoch, S., 2015. Global Media Report 2015: Global Industry Overview. Mckinsey Company, New York, USA.,.

Ravikumar, G.K., J. Rabi, T.N. Manjunath, R.S. Hegadi and R.A. Archana, 2011. Design of data masking architecture and analysis of data masking techniques for testing. Int. J. Eng. Sci., 3: 5150-5159.
Direct Link  |  

Ravikumar, G.K., T.N. Manjunath, S.H. Ravindra and I.M. Umesh, 2011. A survey on recent trends, process and development in data masking for testing. Intl. J. Comput. Sci., 8: 535-544.
Direct Link  |  

Ryu, K.S., J.S. Park and J.H. Park, 2006. A data quality management maturity model. ETRI J., 28: 191-204.
Direct Link  |  

Vishnu, B., T.N. Manjunath and C. Hamsa, 2014. An effective data warehouse security framework. Intl. J. Comput. Appl., 2014: 33-37.

Xiao-Bai, L. and M. Luvai, 2009. Protecting Patient Privacy with Data Masking. Firefly & Wisp Publishing, Homer City, Pennsylvania,.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved