Review on Upcoming Innovative Technology in Big Data

  • Authors

    • M Therasa
    • S M. Poonkuzhali
    • M Santhana Joyce
    • S Annie Shery
    2018-03-01
    https://doi.org/10.14419/ijet.v7i1.9.12695
  • big data, dimensions, inconsistency, granularity.
  • This paper is a survey of the big data idea, its measurements, its design correlation between the prior idea and the most recent, the capacity conceivable i.e. the databases and starting point of enormous information. The social database, having unbending pattern, has been winning since quite a while yet it is hard to store the unstructured information in social database. The unstructured information has principally message nature or is as logs. Here comes the idea of No SQL databases. Enormous Data is little information with huge information estimate.

     

     

  • References

    1. [1] Jagdev Bhogal, Imran Choksi, “Handling Big Data using NoSQLâ€, Advanced Information Networking and Applications Workshops, IEEE, 2015, pp. 393-398.

      [2] Arul Murugan R, Anguraj S, Boopathi R, “Big data:privacy and inconsistency issuesâ€, IJRET, Volume 3, Issue 7, 2014, pp. 812-815.

      [3] A.Jacobs, “The pathologies of big dataâ€, communications of the ACM, Volume 52, Issue 8, 2009, pp. 36-44.

      [4] Du Zhang, “Inconsistencies in Big Dataâ€, CognitiveInformatics & Cognitive Computing, IEEE, 2013, pp. 61- 67

      [5] Yuri Demchenko, Cees de Laat, Peter Membrey. “Defining Architecture Components of the Big Data Ecosystemâ€, Collaboration Technologies and Systems (CTS), IEEE, 2014, pp. 104-112

      [6] Madden, Sam,â€From databases to big data, Internet Computingâ€, IEEE, Volume 16, Issue 3, 2012, pp. 4-6.

      [7] Bash, Kepi, "Considerations for big data: Architecture and approach", Aerospace Conference, IEEE, 2012, pp. 1-7.

      [8] Bo Li, “Survey of Recent Research Progress and Issues in Big Dataâ€. Available at: www.cse.wustl.edu/~jain/cse570-13/ftp/bigdata2/index.html

      [9] K.Vijayakumar·C,Arun,Continuous security assessment of cloud based applications using distributed hashing algorithm in SDLC,Cluster Computing DOI 10.1007/s10586-017-1176-x,Sept 2017

      [10] K.Vijayakumar·C,Arun, Analysis and selection of risk assessment frameworks for cloud based enterprise applicationsâ€, Biomedical Research, ISSN: 0976-1683 (Electronic), January 2017

      [11] K. Vijayakumar,C.Arun,Automated risk identification using NLP in cloud based development environments,J Ambient Intell Human Computing,DOI 10.1007/s12652-017-0503-7,Springer-Verlag Berlin Heidelberg May 2017

      [12] K.Sathesh Kumar, K.Shankar, M. Ilayaraja and M. Rajesh,“Sensitive Data Security In Cloud Computing Aid Of Different Encryption Techniques†Journal of Advanced Research in Dynamical and Control Systems, vol.18, no.23, 2017.

  • Downloads

  • How to Cite

    Therasa, M., M. Poonkuzhali, S., Santhana Joyce, M., & Annie Shery, S. (2018). Review on Upcoming Innovative Technology in Big Data. International Journal of Engineering & Technology, 7(1.9), 306-309. https://doi.org/10.14419/ijet.v7i1.9.12695