Alsadig Abdallah, A. Talib, M. Ibrahim, E. AbdElgader
{"title":"Systematic Review from Different Encryption Techniques Perspectives","authors":"Alsadig Abdallah, A. Talib, M. Ibrahim, E. AbdElgader","doi":"10.47679/ijasca.v3i1.46","DOIUrl":null,"url":null,"abstract":"The volume of Big Data produced from various sources is always growing. Such vast amounts of data cannot be stored using conventional techniques. As a result, the majority of businesses have switched to using cloud storage as a substitute for storing Big Data. Cloud storage has made great progress, but there are still several problems, such security worries. This article examines Big Data, its difficulties, and many security concerns from the perspectives of various encryption approaches. Additionally, it presents various views to address these issues and suggests a new classification of Big Data security difficulties","PeriodicalId":507177,"journal":{"name":"International Journal of Advanced Science and Computer Applications","volume":"2 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Advanced Science and Computer Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47679/ijasca.v3i1.46","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The volume of Big Data produced from various sources is always growing. Such vast amounts of data cannot be stored using conventional techniques. As a result, the majority of businesses have switched to using cloud storage as a substitute for storing Big Data. Cloud storage has made great progress, but there are still several problems, such security worries. This article examines Big Data, its difficulties, and many security concerns from the perspectives of various encryption approaches. Additionally, it presents various views to address these issues and suggests a new classification of Big Data security difficulties