Open Access   Article Go Back

Security Challenges in Big Data

Dinesh Singh1 , Dayanand 2 , Arushi Arya3

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 981-985, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.981985

Online published on Jul 31, 2018

Copyright © Dinesh Singh, Dayanand, Arushi Arya . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Dinesh Singh, Dayanand, Arushi Arya, “Security Challenges in Big Data,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.981-985, 2018.

MLA Style Citation: Dinesh Singh, Dayanand, Arushi Arya "Security Challenges in Big Data." International Journal of Computer Sciences and Engineering 6.7 (2018): 981-985.

APA Style Citation: Dinesh Singh, Dayanand, Arushi Arya, (2018). Security Challenges in Big Data. International Journal of Computer Sciences and Engineering, 6(7), 981-985.

BibTex Style Citation:
@article{Singh_2018,
author = {Dinesh Singh, Dayanand, Arushi Arya},
title = {Security Challenges in Big Data},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {981-985},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2546},
doi = {https://doi.org/10.26438/ijcse/v6i7.981985}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.981985}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2546
TI - Security Challenges in Big Data
T2 - International Journal of Computer Sciences and Engineering
AU - Dinesh Singh, Dayanand, Arushi Arya
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 981-985
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
423 285 downloads 114 downloads
  
  
           

Abstract

We have entered in the era of Big Data. Through better analysis of the large volumes of data that are becoming available, there is the potential for making faster advances in many scientific disciplines and improving the profitability and success of many enterprises. However, attacks against data are also increasing. We need to protect the data we collect and store, securely transfer data over the network and keep output derived from these data confidential. In this paper, we discuss about various challenges big data technology face today and tools to overcome those challenges.

Key-Words / Index Term

Big Data, Security, Hadoop Technology

References

[1] Sameer Walker Affiliated with, Madhu Siddalingaiah “Motivation for Big Data-Pro Apache Hadoop” http://link.springer.com/chapter/10.1007/978-1-4302-48644_1#page-2
[2] Jonathan Stuart Ward and Adam Barker-“Undefined By Data: A Survey of Big Data Definitions” School of Computer Science-University of St Andrews, UK{jonthan.stuart.ward, adam.barker}@standrews.ac.ukhttp://arxiv.org/pdf/1309.5821v1.pdf
[3] BIGDATA ANALYTICS - 5th QUARTER BY PHILIP RUSSOM -TDWI research.
http://www.tableau.com/sites/default/files/whitepapers/tdwi _bpreport_q411_big_data_analytics_tableau.pdf.
[4] Alvaro A. Cárdenas, Pratyusa K. Manadhata, Sreeranga “Big Data Analytics for Security”Posted by P. Rajanhttp://www.infoq.com/articles/bigdata-analytics-for-security.
[5] data electronically available at http://www.umuc.edu/cybersecurity/about/cybersecurityasics.cfmumuc[71]http://whatis.techtarget.com/definition/cybersecurity
[6] data electronically available at http://whatis.techtarget.com/glossary/Security-Threats-anduntermeasures
[7] data electronically available at teradata-http://www.teradata.com/Cyber-Security- http://bigdata.teradata.com/US/Success-Stories/Innovationsand-Insights/
[8] Securing Big Data - Part 1-Posted by Steve Jones at Tuesday, January 06, 2015
[9]data electronically available at http://service-architecture.blogspot.com/2015/01/securingbig-data-part-2-understanding.html.
[10] unstructured data in big data environment- data electronically available at http://www.dummies.com/how-to/content/unstructureddata-in-a-big-data-environment.html
[11] data electronically available at http://ictactjournals.in/paper/IJSC_Paper_6_pp_1035_1049. pdf