Security Challenges in Big Data
Dinesh Singh1 , Dayanand 2 , Arushi Arya3
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-7 , Page no. 981-985, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.981985
Online published on Jul 31, 2018
Copyright © Dinesh Singh, Dayanand, Arushi Arya . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Dinesh Singh, Dayanand, Arushi Arya, “Security Challenges in Big Data,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.981-985, 2018.
MLA Style Citation: Dinesh Singh, Dayanand, Arushi Arya "Security Challenges in Big Data." International Journal of Computer Sciences and Engineering 6.7 (2018): 981-985.
APA Style Citation: Dinesh Singh, Dayanand, Arushi Arya, (2018). Security Challenges in Big Data. International Journal of Computer Sciences and Engineering, 6(7), 981-985.
BibTex Style Citation:
@article{Singh_2018,
author = {Dinesh Singh, Dayanand, Arushi Arya},
title = {Security Challenges in Big Data},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {981-985},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2546},
doi = {https://doi.org/10.26438/ijcse/v6i7.981985}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.981985}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2546
TI - Security Challenges in Big Data
T2 - International Journal of Computer Sciences and Engineering
AU - Dinesh Singh, Dayanand, Arushi Arya
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 981-985
IS - 7
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
456 | 311 downloads | 133 downloads |
Abstract
We have entered in the era of Big Data. Through better analysis of the large volumes of data that are becoming available, there is the potential for making faster advances in many scientific disciplines and improving the profitability and success of many enterprises. However, attacks against data are also increasing. We need to protect the data we collect and store, securely transfer data over the network and keep output derived from these data confidential. In this paper, we discuss about various challenges big data technology face today and tools to overcome those challenges.
Key-Words / Index Term
Big Data, Security, Hadoop Technology
References
[1] Sameer Walker Affiliated with, Madhu Siddalingaiah “Motivation for Big Data-Pro Apache Hadoop” http://link.springer.com/chapter/10.1007/978-1-4302-48644_1#page-2
[2] Jonathan Stuart Ward and Adam Barker-“Undefined By Data: A Survey of Big Data Definitions” School of Computer Science-University of St Andrews, UK{jonthan.stuart.ward, adam.barker}@standrews.ac.ukhttp://arxiv.org/pdf/1309.5821v1.pdf
[3] BIGDATA ANALYTICS - 5th QUARTER BY PHILIP RUSSOM -TDWI research.
http://www.tableau.com/sites/default/files/whitepapers/tdwi _bpreport_q411_big_data_analytics_tableau.pdf.
[4] Alvaro A. Cárdenas, Pratyusa K. Manadhata, Sreeranga “Big Data Analytics for Security”Posted by P. Rajanhttp://www.infoq.com/articles/bigdata-analytics-for-security.
[5] data electronically available at http://www.umuc.edu/cybersecurity/about/cybersecurityasics.cfmumuc[71]http://whatis.techtarget.com/definition/cybersecurity
[6] data electronically available at http://whatis.techtarget.com/glossary/Security-Threats-anduntermeasures
[7] data electronically available at teradata-http://www.teradata.com/Cyber-Security- http://bigdata.teradata.com/US/Success-Stories/Innovationsand-Insights/
[8] Securing Big Data - Part 1-Posted by Steve Jones at Tuesday, January 06, 2015
[9]data electronically available at http://service-architecture.blogspot.com/2015/01/securingbig-data-part-2-understanding.html.
[10] unstructured data in big data environment- data electronically available at http://www.dummies.com/how-to/content/unstructureddata-in-a-big-data-environment.html
[11] data electronically available at http://ictactjournals.in/paper/IJSC_Paper_6_pp_1035_1049. pdf