<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<ArticleSet>
  <Article>
    <Journal>
      <PublisherName>IJIRCSTJournal</PublisherName>
      <JournalTitle>International Journal of Innovative Research in Computer Science and Technology</JournalTitle>
      <PISSN>I</PISSN>
      <EISSN>S</EISSN>
      <Volume-Issue>Volume 3 Issue 3</Volume-Issue>
      <PartNumber/>
      <IssueTopic>Technology and Managemen</IssueTopic>
      <IssueLanguage>English</IssueLanguage>
      <Season>May - June 2015</Season>
      <SpecialIssue>N</SpecialIssue>
      <SupplementaryIssue>N</SupplementaryIssue>
      <IssueOA>Y</IssueOA>
      <PubDate>
        <Year>2019</Year>
        <Month>11</Month>
        <Day>29</Day>
      </PubDate>
      <ArticleType>Computer Sciences</ArticleType>
      <ArticleTitle>Security Issue on “Secure Data Storage and Transaction Logs” In Big Data</ArticleTitle>
      <SubTitle/>
      <ArticleLanguage>English</ArticleLanguage>
      <ArticleOA>Y</ArticleOA>
      <FirstPage>15</FirstPage>
      <LastPage>19</LastPage>
      <AuthorList>
        <Author>
          <FirstName>Mr. Yannam Apparao</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>Y</CorrespondingAuthor>
          <ORCID/>
                      <FirstName>Mrs. K.Laxminarayanamma</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>N</CorrespondingAuthor>
          <ORCID/>
           
        </Author>
      </AuthorList>
      <DOI></DOI>
      <Abstract>paper proposed the security issue on secure data storage and transaction logs in associated with data storage, management, and processing, though security not available in various things in big data unauthorized access may corrupt the data, this paper provides the security on transaction logs are transfer the information from once source to another source while transferring the data unauthorized access may tamper and forwards therefore users may not get exact data. Hence the paper proves security issue on secure data storage and transaction logs.</Abstract>
      <AbstractLanguage>English</AbstractLanguage>
      <Keywords>big data, transaction logs, data storage</Keywords>
      <URLs>
        <Abstract>https://ijircst.org/abstract.php?article_id=166</Abstract>
      </URLs>      
    </Journal>
  </Article>
</ArticleSet>