Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Security Mechanism for Twitter Data Using Cassandra in Cloud


Affiliations
1 Associate Professor, CSE, Chaitanya Bharathi Institute of Technology, Hyderabad, India
2 M.Tech 2nd Year, CSE, Vardhaman College of Engineering, Hyderabad, India
     

   Subscribe/Renew Journal


Most popular social networking and the broadly utilized site is Twitter, where clients share their opinions on posts through tweets. Every tweet has a limit of 140 characters. Tweets are in the form of structured and unstructured data which consist of characters, alphanumeric, special symbols, etc. Every single tweet may also contain some unwanted characters. In this work, twitter data are chosen to perform an analysis. Pre-handling methods are utilized to expel undesirable characters from tweets. Also, to enhance security, the encryption module is created, and the information is then put away in Cassandra. Just the individuals who hold the key can unscramble the information. The whole information is then put away in the cloud for upgrading the security.

Keywords

Cassandra, Encryption, Share Market, Text Pre-Processing, Twitter.
Subscription Login to verify subscription
User
Notifications
Font Size


Abstract Views: 131

PDF Views: 0




  • Security Mechanism for Twitter Data Using Cassandra in Cloud

Abstract Views: 131  |  PDF Views: 0

Authors

Sangeeta Gupta
Associate Professor, CSE, Chaitanya Bharathi Institute of Technology, Hyderabad, India
Nikitha Kumari
M.Tech 2nd Year, CSE, Vardhaman College of Engineering, Hyderabad, India

Abstract


Most popular social networking and the broadly utilized site is Twitter, where clients share their opinions on posts through tweets. Every tweet has a limit of 140 characters. Tweets are in the form of structured and unstructured data which consist of characters, alphanumeric, special symbols, etc. Every single tweet may also contain some unwanted characters. In this work, twitter data are chosen to perform an analysis. Pre-handling methods are utilized to expel undesirable characters from tweets. Also, to enhance security, the encryption module is created, and the information is then put away in Cassandra. Just the individuals who hold the key can unscramble the information. The whole information is then put away in the cloud for upgrading the security.

Keywords


Cassandra, Encryption, Share Market, Text Pre-Processing, Twitter.