Bigdata

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

SURVEY OF BIG DATA SECURITY

Snehalata Funde1, Suraj Karale2, Laxman Bharate3


1,2,3
Computer Engineering, BSCOER, Narhe, India

Abstract a great degree rapid or it goes past existing


With later improvement in innovation, preparing ability.
organizing furthermore, cost lessening in Enormous data is probably going to encourage
capacity gadgets, today we are overflowed business in enhancing their activities and help in
with immense sum of data. The data is making speedier and more canny choices.
gathered from heterogeneous sources Despite the fact that the term enormous data look
furthermore, wide extend of application as though speaking to colossal volume of data,
territories. Investigation was performed on however that isn't generally a fact. As retailer
these data by implies of deliberately created data is huge in amount need to be stored on cloud
models. Enormous data is a traditional term causes security issues. Big data is with 3 Vs
utilized to portray the exponential increment including high volume, high variety, and high
what's more, openness of organized what's velocity [6]. Fig. 1 shows 3 Vs of big data.
more, unstructured data. In future enormous
data will be fundamental to business as well
as society like web office. So with enormous
data security issues are raised. This paper
reviews different techniques used for security
and privacy preservation of the big data.
These instructions give you guidelines for
preparing papers for the International
conference ICCSE). Use this document as a
template if you are using Microsoft Office
Word 6.0 or later. Otherwise, use this
document as an instruction set. The electronic
file of your paper will be formatted further at
International Journal of Computer Theory
and Engineering. Define all symbols used in
the abstract. Do not cite references in the
abstract. Do not delete the blank line
immediately above the abstract; it sets the
footnote at the bottom of this column.
Index Terms: Big data, security, privacy

I. INTRODUCTION
The trendy expression huge data is a maxim
used to show an incredible volume of organized
Fig. 1 3 Vs of big data
and additionally unstructured data. As the data
estimate is exceptionally tremendous, it is hard
II. SECURITY ISSUES OF BIG DATA
to utilize customary database and programming
strategies to process it. In numerous associations With quick development in innovation,
either the data is too substantial or it moves at to systems administration and cost reduction away

ISSN (PRINT): 2393-8374, (ONLINE): 2394-0697, VOLUME-5, ISSUE-2, 2018


27
INTERNATIONAL JOURNAL OF CURRENT ENGINEERING AND SCIENTIFIC RESEARCH (IJCESR)
gadgets, data upset has occurred naming it as big A few systems have particular necessities on the
data. Enormous data is alluded as one in which type of information. Along these lines, it is
gigantic amount of data can be gathered, put regularly required to advance back to the
away and investigated at sensibly low cost. Such information planning stage.
accumulation of enormous data give advantages
to human services, taxpayer driven 5. Data evaluation
organizations, misrepresentation security, At this phase in the venture, you have fabricated
retailing, producing and different segments a model (or models) that seem to have high
[7][8]. caliber, from an information investigation point
of view. Before continuing to definite
III. STAGES OF BIG DATA organization of the model, it is essential to assess
1. Understanding of business: the model altogether and survey the means
This underlying stage centers on executed to build the model, to be sure it
understanding the undertaking goals and legitimately accomplishes the business targets.
prerequisites from a business point of view, and
afterward changing over this learning into an 6. Deployment
information mining issue definition. A Making of the model is for the most part not the
preparatory arrangement is intended to finish of the venture. Regardless of whether the
accomplish the targets. A choice model, motivation behind the model is to build
particularly one constructed utilizing the information of the information, the learning
Decision Model and Notation standard can be picked up should be sorted out and displayed in a
utilized. way that is valuable to the client.

2. Understanding of data Contingent upon the prerequisites, the sending


The information understanding stage begins stage can be as straightforward as producing a
with an underlying information accumulation report or as mind boggling as executing a
and continues with exercises keeping in mind the repeatable information scoring or information
end goal to get comfortable with the information, mining process.
to distinguish information quality issues, to find
first bits of knowledge into the information, or to IV. RELATED WORK
recognize intriguing subsets to frame Antorweep Chakravorty et. al.,[1] introduced
speculations for shrouded data. the system to provide security to sensor data in
smart home applications with introduction of
3. Preparation of data concept re-identification of data. In this they
The information readiness stage covers all have differentiated data by considering data
exercises to develop the last dataset (information sensitivity and importance in two categories
that will be encouraged into the demonstrating 1.Identifier data 2. De-identifier data. Before
tool(s)) from the underlying crude information. re-introducing data they have used
Information readiness’s errands are probably generalization and suppression on data for
going to be played out different circumstances, preserving privacy with K-anonymization
and in no endorsed arrange. Errands incorporate Algorithms. To control re-identification based
table, record, and characteristic choice and in on end user access identifier retrieval system is
addition change and cleaning of information for provided.
displaying devices. Keke Gai et. al.,[2] stated enhancement in
privacy with decision based tree algorithm for
4. Modeling predicting the possibilities.
In this stage, different displaying methods are Baijan Yang et. al.,[3] used meta modeling
chosen and connected and their parameters are method for providing security in this work to
aligned to ideal esteems. Commonly, there are a enhance security.
few systems for similar information mining issue Chi Lin et. al.,[4] states differential privacy
write. method for improving security at great extent but
with some flaws.

ISSN (PRINT): 2393-8374, (ONLINE): 2394-0697, VOLUME-5, ISSUE-2, 2018


28
INTERNATIONAL JOURNAL OF CURRENT ENGINEERING AND SCIENTIFIC RESEARCH (IJCESR)
Sergio Pissanetzky et. al.,[5] states causal set [4] Chi Lin, Pengyu Wang, Houbing Song,
theory to deal with security issues in big data. Yanhong Zhou, Qing Liu, Guowei Wu, “A
differential privacy protection scheme for
V. CONCLUSION sensitive big data in body sensor network”,
This papers states concept of big data in real Springer, pp.465-475,2016
world and different security issues rose due to
huge amount of data which is increasing daily in [5] Sergio Pissanetzky,”On Future of
different applications exponentially. It also Information: Reunification, Compatibility,
focuses on different methods used to prevent the Adaption, Cyber Security and Semantics” IEEE,
data from security breaches at various levels of Volume 4, pp. 1117-1140, 2016
big data.
[6] P. Kamaksh, Survey on Big Data and Related
REFERENCES Privacy Issues, IJRET, Voulme 03,Issue 12,
[1] Antorweep Chakravorty, Tomasz pp.68-70,Dec 2014
Wlodarczyk,Chunming Rong,”Privacy
Preserving Data Analytics for Smart [7] S. Justin Samuel, Koundinya RVP, Kotha
Homes”,IEEE Security and Privacy Sashidhar, C.R. Bharathi,”A Survey on Big Data
Workshops,pp.23-27,2013 and Its Research Challenges”,ARPN Journal of
Engineering and Applied Sciences, Volume 10,
[2] Keke Gai, Meikang Qiu, Sam Adam No.8, May 2015
Elnagdy,”Security aware information
classification using supervised learning for [8] Zhang Hongjun, Hao Wenning, He
cloud-based cyber risk management in financial Dengchao, MaoYuxing, Survey of Research on
big data”, IEEE, pp. 197-202, 2016 Information Security in Big Data”,CSBC,pp.
264-272, 2014
[3] Baijan Yang, Tonglin Zhang,,”Scalable
meta-model for big data security Analyses”, [9] Suraj B. Karale, G. A. Patil "Extracting brief
IEEE, pp. 55-60, 2016 note from Internet Newspaper" IEEE
Transaction on Computing for Sustainable
Global Development, vol. 45 no. 1 March 2016.

ISSN (PRINT): 2393-8374, (ONLINE): 2394-0697, VOLUME-5, ISSUE-2, 2018


29

You might also like