Abstract: The enhancement of big data security in cloud computing has become inevitable dues to factors such as the volume, velocity, veracity, Value, and velocity of the big data. These enhancements ...
Abstract: Cryptography is divided into two types, namely symmetric cryptography and asymmetric cryptography. In symmetric cryptography, the key used in the encryption and decryption process is the ...