North Country Cybersecurity Conference
Collections in this community
Recent Submissions
-
A Data Minimization Algorithm for Fast and Secure Transfer of Big Datasets Using Fourier AnalysisToday’s increased demand for fast and secure transfer of big data applications and files has motivated researchers to develop novel algorithms within the framework of existing protocol limitations. Transferring big data datasets (e.g. Big Genomic Datasets) over the network has always been an interesting and challenging research area. This is because all data transfer protocols, such as HTTP and FTP, use the standard content-encoding schemes, namely ASCII, which offer little or no compression or data minimization. The purpose of this work is to design and implement a novel Fourier-based data minimization algorithm to decrease the required time to transfer multi-dimensional big datasets over conventional networks. In addition, we increased security in the event of a data breach. Moreover, it will introduce a generic concept that can be used by cloud-based applications to secure data that is being exchanged remotely. One and two-dimensional results show how the method could effectively be used in different data minimization scenarios.
-
A Data Minimization Algorithm for Fast and Secure Transfer of Big Datasets Using Fourier AnalysisTransferring big data datasets over the network has always been an interesting topic. This is because all data transfer protocols, such as Hyper Text Transfer Protocol (HTTP) and File Transfer Protocol (FTP), use the standard content-encoding schemes, such as the American Standard Code for Information Interchange (ASCII). On the other hand, today’s increased demand for fast and secure transfer of big data applications and files, has motivated researchers to develop novel algorithms within the framework of existing protocol limitations. The purpose of this presentation is to design and implement a novel Fourier-based data minimization algorithm to decrease the required time to transfer multi-dimensional big datasets over conventional networks. In addition, we increased security in the event of a data breach. Moreover, it will introduce a generic concept that can be used by cloud-based applications to secure data that exchange remotely.