CFP last date
22 July 2024
Call for Paper
August Edition
IJCA solicits high quality original research papers for the upcoming August edition of the journal. The last date of research paper submission is 22 July 2024

Submit your paper
Know more
Reseach Article

A Survey on Security Issues and the Existing Solutions in Big Data

by Pooja Chaudhary, Virendra Kumar Yadav
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 162 - Number 1
Year of Publication: 2017
Authors: Pooja Chaudhary, Virendra Kumar Yadav
10.5120/ijca2017913405

Pooja Chaudhary, Virendra Kumar Yadav . A Survey on Security Issues and the Existing Solutions in Big Data. International Journal of Computer Applications. 162, 1 ( Mar 2017), 33-37. DOI=10.5120/ijca2017913405

@article{ 10.5120/ijca2017913405,
author = { Pooja Chaudhary, Virendra Kumar Yadav },
title = { A Survey on Security Issues and the Existing Solutions in Big Data },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2017 },
volume = { 162 },
number = { 1 },
month = { Mar },
year = { 2017 },
issn = { 0975-8887 },
pages = { 33-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume162/number1/27210-2017913405/ },
doi = { 10.5120/ijca2017913405 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:07:48.297279+05:30
%A Pooja Chaudhary
%A Virendra Kumar Yadav
%T A Survey on Security Issues and the Existing Solutions in Big Data
%J International Journal of Computer Applications
%@ 0975-8887
%V 162
%N 1
%P 33-37
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Big data refers different-different type of data, i.e., structured data means Relational Data, Semi-structured data means XML and unstructured data example :-Word, PDF, Text, Audio, Video etc. Here I have describe only one aspect of big data; other attributes are volume, velocity, value, and veracity. Security is technology issues, which seems to be resolvable in the near-term, but represent long term challenges that require research and new paradigms. This technology needs to be more improvement in terms of development because it suffers from different security problems. This paper will discuss about different security problems and define existing solution.

References
  1. Amine Rahmani1.2015.De-Identification of Textual Data using Immune System for Privacy Preserving in Big Data.
  2. Alvaro A. Cárdenas . 2013. Big Data Analytics for Security., University of Texas at Dallas, Pratyusa K. Manadhata | HP Labs, Sreeranga P. Rajan | Fujitsu Laboratories of America.
  3. Nandan Makarand Deval. 2011. Secure Steganography Algorithm Based on Cellular Automata using Fibonacci Representation and Reverse Circle Cipher Application for Steganography, International Journal of Computer Science and Information Technologies, Vol. 2 (4).
  4. David Naylor?, Kyle Schompy, Matteo Varvelloz, Ilias Leontiadisz, Jeremy Blackburnz,Diego Lopezz, Konstantina Papagiannakiz, Pablo Rodriguez Rodriguezz., Peter Steenkiste.2015. “Multi-Context TLS (mcTLS):Enabling Secure In-Network Functionality in TLS” Carnegie Mellon University Case Western Reserve University Telefónica Research(ACM).
  5. Stephen Kaisler i_SW Corporation. 2013. Big Data: Issues and Challenges Moving Forward. 46th Hawaii International Conference on System Sciences.
  6. John Gantz., David Reinsel.2012. THE DIGITAL UNIVERSE IN 2020: Big Data, Bigger Digital Shadow s, and Biggest Grow th in the Far East.
  7. B. Saraladevia., N. Pazhanirajaa., P. Victer Paula., M.S. Saleem Bashab., P. Dhavachelvanc.2015. Big Data and Hadoop-A Study in Security Perspective, 2nd International Symposium on Big Data and Cloud Computing (ISBCC’15)(Science Direct).
  8. Roger Schell. 2013. Security – A Big Question for Big Data, University of Southern California, USA, IEEE International Conference on Big Data.
  9. Elisa Bertino., Bharath K. Samanthula.2014. "Security with Privacy - A Research Agenda ", 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (Collaborate Com 2014).
  10. BOUHRIZ Mouniaa., CHAOUI Habibab.2015. Big Data Privacy in Healthcare, The 2nd International Workshop on Privacy and Security in HealthCare (PSCare15).
  11. Koushik Mondal. 2015. Big Data Parallelism: Issues in different X-Information Paradigms, 2nd International Symposium on Big Data and Cloud Computing (ISBCC’15).
  12. Utkarsh Srivastava., Santosh Gopalkrishnan. 2015. Impact of Big Data Analytics on Banking Sector: LearningforIndianBanks. 2nd International Symposium on Big Data and Cloud Computing (ISBCC’15).
Index Terms

Computer Science
Information Sciences

Keywords

Issue in Big data Security Issue in Hadoop Security TLS and Mc-TLS Performance Evaluation