Open Access Open Access  Restricted Access Subscription Access

Security, Protection, Tools and Applications for Big Data.

Anisha Godse, Akanksha Kulkarni

Abstract


In the past several decades, smart and advanced innovations have grown quickly. Such revolutionary advances apply to extensive number connected gadgets, including smartphones, computers, even internet-connected monitors. Due to the broad adoption of these breakthroughs have transpired in the manufacturing of enormous amounts of unorganized info in multiple layouts ranging in amount from terabytes (tb) to petabytes (pb). Big data refers to this enormous range of information. There's a lot of potential to impact the social as well as commercial sectors of the economy. Big data is used by several organizations for locating insightful information, which might be for advertising selections, tracking particular activity, as well as spotting possible liabilities. Big data analytics, which are class intensive techniques, are used to enable these kinds of information manipulation. Through managing an enormous quantity regarding scattered, well-organized, and somewhat planned knowledge decisively, something that's unachievable using standard database-based systems, it helps you to obtain key benefits. A large amount of data poses risks to customers despite the fact that presenting many advantages over corporations and individuals making decisions. The implementation of insights innovations, whose necessitate leadership, maintenance, including comprehensive evaluation for an immense amount of information collected through multiple locations, leads in this probability. People ultimately run a chance of having personal details stolen as a consequence of both the gathering as well as disclosure of behavioral knowledge. Essentially, a disproportionate amount of gathering data could result into a number of issues relating to privacy and security. However, the global availability of huge amounts of information could in fact bring up issues with confidentiality and safety. These challenges need to be aggressively addressed by academics representing numerous fields. The primary objective of this investigation will focus on immense information software, severe safety challenges, especially issues related to privacy. We're going discuss various solutions towards boosting security as well as privacy in challenging big data settings, and we're going to additionally examine today's safety procedures.


Full Text:

PDF

References


Abawajy, J. (2015). Comprehensive analysis of big data Variety landscape. International journal of parallel, emergent and distributed systems, 30(1), 5-14.

Abou-Tair, D. E. D. I., Berlik, S., & Kelter, U. (2007). Enforcing privacy by means of an ontology driven xacml framework. Paper presented at the proceedings of the third international symposium on information assurance and security.

Acker, O., Gröne, F., Blockus, A., & Bange, C. (2011). In-memory analytics–strategies for real-time crm. Journal of database marketing & customer strategy management, 18, 129-136.

Akutota, T., & Choudhury, S. (2017). Big Data Security. Challenges: an overview and application of user behavior analytics. Int. Res. J. Eng. Technol, 4, 1544-1548.

Al Nuaimi, E., Al Neyadi, H., Mohamed, N., & Al-Jaroodi, J. (2015). Applications of big data to smart cities. Journal of internet services and applications, 6(1), 1-15.

Alguliyev, R., & Imamverdiyev, Y. (2014). Big data: big Promises for information security. Paper presented at the 2014 ieee 8th international conference on application of information and communication technologies (aict).

Altman, M., Wood, A., O’brien, D. R., & Gasser, U. (2018). Practical approaches to big data privacy over time. International data privacy law, 8(1), 29-51.

Ashraf, R., Habib, M. A., Akram, M., Latif, M. A., Malik, M. S. A., Awais, M., Abbas, Z. (2020). Deep convolution neural network for big data medical image classification. Ieee access, 8, 105659-105670.

Ayed, A. B., Halima, M. B., & Alimi, A. M. (2015). Big Data analytics for logistics and transportation. Paper presented at the 2015 4th international conference on advanced logistics and transport (icalt).


Refbacks

  • There are currently no refbacks.