{"title":"隐写术在大数据中的作用","authors":"Pooja, Surendra Yadav, Brahmdutt Bohra, Lakhita","doi":"10.1109/ICGCIOT.2015.7380709","DOIUrl":null,"url":null,"abstract":"In this emerging technological era, Big Data is a very famous name. This paper is presenting a discussion about the security of Log Files, which is considered amongst the major parts in Big Data Technology. The paper is representing different types of log files, and how the security could be implemented on these files using Steganography. Here, we briefly describe about the log files, Steganography, and the role it is playing in the security aspects of Big Data.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Role of Steganography in Big Data\",\"authors\":\"Pooja, Surendra Yadav, Brahmdutt Bohra, Lakhita\",\"doi\":\"10.1109/ICGCIOT.2015.7380709\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this emerging technological era, Big Data is a very famous name. This paper is presenting a discussion about the security of Log Files, which is considered amongst the major parts in Big Data Technology. The paper is representing different types of log files, and how the security could be implemented on these files using Steganography. Here, we briefly describe about the log files, Steganography, and the role it is playing in the security aspects of Big Data.\",\"PeriodicalId\":400178,\"journal\":{\"name\":\"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-10-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICGCIOT.2015.7380709\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICGCIOT.2015.7380709","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this emerging technological era, Big Data is a very famous name. This paper is presenting a discussion about the security of Log Files, which is considered amongst the major parts in Big Data Technology. The paper is representing different types of log files, and how the security could be implemented on these files using Steganography. Here, we briefly describe about the log files, Steganography, and the role it is playing in the security aspects of Big Data.