Security and Privacy Mechanisms of Big Data

  • Authors

    • P. Amarendra Reddy
    • Sheikh Gouse
    • P. Bhaskara Reddy
    2018-12-13
    https://doi.org/10.14419/ijet.v7i4.39.26264
  • Big Data, Security, Hadoop, Map Reduce
  • Abstract

    Big Data advances in three key areas like storage, processing and analysis. Hadoop architecture is produced to store extensive measure of data through adaptable parallel handling with speed to get the outcomes. Organizations must guarantee that every single big data bases are resistant to security dangers and vulnerabilities. Amid data gathering, all the important security assurances, for example, continuous administration should to be satisfied. Remembering the big size of big data, Organizations should to recollect the way that overseeing such data could be troublesome and requires uncommon endeavors. Be that as it may, making every one of these strides would help keep up buyer protection. The Security and Privacy challenges for Big Data might be sorted out on big data community. Securing the framework of big data frameworks includes Securing appropriated calculations and data stores. Securing the data it is of vital significance, so we need to guarantee that data scattering is security saving and that touchy data is ensured using cryptography and granular access control. Overseeing tremendous volumes of data requires adaptable and conveyed answers for Securing data stores as well as empowering effective reviews and examinations of data provenance. At long last, the streaming data that is rolling in from various endpoints must be checked for respectability and can be utilized to perform continuous examination for security episodes to guarantee the strength of the framework. The explanation behind such ruptures may likewise be that security applications that are intended to store certain measures of data can't the huge volumes of data that the previously mentioned datasets have. Likewise, these security advances are wasteful to oversee dynamic data and can control static data as it were. In this way, only a customary security check can't distinguish security patches for nonstop streaming data. For this reason, we require full-time protection while data streaming and Big Data Analysis.

     

     
  • References

    1. [1] Tankard, Colin. "Big data security". Network Security, 2012, no.7: 5-8.

      [2] Domenico Talia. "Clouds for Scalable Big Data Analytics". IEEE Computer, 2013, vol.46, no.5: 98-101.

      [3] Karadsheh, Louay. "Applying security policies and service level agreement to IaaS service model to enhance security and transition". Computers & Security, 2012, vol.31, no.3: 315-326.

      [4] ChunmingRong , Son T. Nguyen , Martin GiljeJaatun. "Beyond lightning: A survey on security challenges in cloud computing". Computers and Electrical Engineering, 2013, vol.39, no.1:47-54.

      [5] Mark Dermot Ryan. "Cloud computing security: the scientific challenge, and a survey of solutions". Journal of Systems and Software, 2013, vol.86, no.9: 2263-2268.

      [6] Min Chen, Shiwen Mao, Yunhao Liu. "Big data: a survey". Mobile Networks and Applications, 2014, vol.19, no.2: 171-209.

      [7] Yuri Demchenko, Paola Grosso, Cees de Laat, Peter Membrey, “Addressing Big Data Issues in Scientific Data Infrastructureâ€,IEEE 2014.

      [8] Rongxing Lu, Hui Zhu, Ximeng Liu, Joseph K. Liu, and Jun Shao “Toward Efficient and Privacy-Preserving Computing in Big Data Era†IEEE Network , July/August 2014.

      [9] Alvaro A. Cárdenas , Pratyusa K. Manadhata , Sreeranga P. Rajan “Data Analytics for Securityâ€, Co published by the IEEE Computer and Reliability Societies, Nov/Dec 2013.

      [10] Ren, Yulong, and Wen Tang. "A Service Integrity Assurance Framework for Cloud Computing Based on Mapreduce."Proceedings of IEEE CCIS2012. Hangzhou: 2012, pp 240 – 244, Oct. 30 2012-Nov. 1 2012.

      [11] N, Gonzalez, Miers C, Redigolo F, Carvalho T, Simplicio M, de Sousa G.T, and Pourzandi M. "A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing.". Athens: 2011., pp 231 – 238, Nov. 29 2011- Dec. 1 2011

      [12] Hao, Chen, and Ying Qiao. "Research of Cloud Computing based on the Hadoop platform.". Chengdu, China: 2011, pp. 181 – 184, 21-23 Oct 2011.

      [13] Y, Amanatullah, Ipung H.P., Juliandri A, and Lim C. "Toward cloud computing reference architecture: Cloud service management perspective.". Jakarta: 2013, pp. 1-4, 1314 Jun. 2013.

      [14] A, Katal, Wazid M, and Goudar R.H. "Big data: Issues, challenges, tools and Good practices.". Noida: 2013, pp. 404 – 409, 8-10 Aug. 2013.

      [15] Foster I, Zhao Y, Raicu I, Lu S (2008) Cloud Computing and Grid Computing 360-Degree Compared. In: Grid Computing Environments Workshop (GCE’08). oi:10.1109/GCE.2008.4738445

      [16] Fellowes, W. (2008). Partly Cloudy, Blue-Sky Thinking about Cloud Computing. White paper. 451 Groups.

      [17] M. Casassa-Mont, S. Pearson and P. Bramhall, “Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Servicesâ€, Proc. DEXA 2003, IEEE Computer Society, 2003, pp. 377-382

      [18] J. Salmon, “Clouded in uncertainty – the legal pitfalls of cloud computingâ€, Computing, 24 Sept 2008, http://www.computing.co.uk/computing/features/2226701/clo uded-uncertainty-4229153

      [19] Khajeh-Hosseini, A., Greenwood, D., Sommerville, I., (2010). Cloud Migration: A Case Study of Migrating an Enterprise IT System to IaaS. Submitted to IEEE CLOUD 2010

      [20] S. Overby, How to Negotiate a Better Cloud Computing Contract, CIO, April 21, 2010, http://www.cio.com/article/591629/How_to_Negotiate_a_Bett er_Cloud_Computing_Contract

      [21] Krautheim FJ (2009) Private virtual infrastructure for cloud computing. In: Proc of HotCloud

      [22] Santos N, Gummadi K, Rodrigues R (2009) Towards trusted cloud computing. In: Proc of Ho

      [23] Hortonworks, Inc. 2014. "Setting Up Kerberos for Hadoop 2.x." Hortonworks Data Platform: Installing Hadoop Using Apache Ambari. Palo Alto, CA: Hortonworks, Inc.Advantech. (2013).

      [24] Enhancing Big Data Security. Retrieved from http://www.advantech.com.tw/nc/newsletter/whitepaper/big_data/big_data.pdf

      [25] Agrawal, D., Das, S., & El Abbadi, A. (2011). Big data and cloud computing. In Proceedings of the 14th International Conference on Extending Database Technology - EDBT/ICDT ’11 (p. 530). New York, New York, USA: ACM Press. doi:10.1145/1951365.1951432

  • Downloads

  • How to Cite

    Amarendra Reddy, P., Gouse, S., & Bhaskara Reddy, P. (2018). Security and Privacy Mechanisms of Big Data. International Journal of Engineering & Technology, 7(4.39), 730-733. https://doi.org/10.14419/ijet.v7i4.39.26264

    Received date: 2019-01-20

    Accepted date: 2019-01-20

    Published date: 2018-12-13