SlideShare a Scribd company logo
1 of 22
A Review On Security Approach
In Big Data
Outline
 What is Big Data?
 Characteristics
 Big Data Issues
 Tools in Big Data
 Security Issue
What is Big Data?
Big data refers to
the databases
whose size is
beyond the
normal size of
traditional
databases.
It handles and
measures in
terabytes and
zeta bytes.
Big data has hardly
ever generated by
human being,
whereas machine
and sensors
provides data.
12+ TBs
of tweet data
every day
25+ TBs of
log data
every day
?TBsof
dataeveryday
2+
billion
people on
the Web
by end
2011
30 billion RFID
tags today
(1.3B in 2005)
4.6
billion
camera
phones
world wide
100s of
millions
of GPS
enabled
devices
sold
annually
76 million smart
meters in 2009…
200M by 2014
Big Data : 4’V
Volume
• Large scale of Data.
Variety
• Different form of data
Velocity
• Analysis of streaming of data
Veracity
• Uncertainty of data
Big Data Issues
Management
Issues
Storage
Issues
Processing
Issue
Security
Issues
Tools in Big Data
MAP REDUCE
HADOOP
Hadoop
 Hadoop is a framework written in java
which allows distributed processing of huge
scale of data sets using programming
model.
 It is distributed file system called Hadoop
distributed file system (HDFS).
 It basically help us to store large data sets
of file in distributed file system.
Map Reduce
 Map reduce is a programming model
and used to implement large data
sets.
Map Reduce Data flow
Main Task of Map Reduce
Security Issue in Big Data
 Some personal or confidential data
can be reuse by another sector.
 User authentication and access to
sensitive data is out of controlled.
 User are not comfortable with the idea
about service providers are able to
gather information like credit card, log
files, location based data etc.
Security Approaches
AES Algorithm
Kerberos Mechanism
 Kerberos is a network authentication
protocol developed at MIT as part of
the Project Athena. It uses private-key
cryptography for providing the
authentication across the open
network
Steps in Kerberos:-
1. Authentication:-A client must
authenticates itself to the Authentication
Server and receives the time stamped
Ticket- Granting Ticket (TGT).
2. Authorization:-The client with the TGT,
requests for a service ticket from the
Ticket Granting Server(TGT).
3. Service Request:- The client uses the
service ticket for authenticate itself to the
server which is providing the service
which client is using.
AES-MR
 AES-MR is only the mix of the AES
encryption algorithm and MapReduce
parallel programming Paradigm.
 The AES encryption algorithm is one of
the best, quickest conceivable
approaches to encode the data very still,
which is our goal in our work.
 MapReduce will be utilized as a part of
our work to encode the huge data
volumes and vital data utilizing the AES
encryption algorithm
Encryption Data Flow AES-
MR
Decryption Data Flow AES-
MR
Kerberos Levels of Security
Kerberos only provide Authentication and Authorization
AES-MR Levels of Security
References
 Devika Tondon,Monika Khurana “Security of Big Data in Hadoop
Using AES-MR with Auditing “ Volume 7, Issue 1, January 2017 pp
no. 100-105
 Devika Tandon,”A survey on security of big data in hadoop”
,International journal of research development and technology,
Volume-5,Issue-6 (June-16) ISSN (O) :- 2349-3585
 Mehak,Gagandeep,"Improving Data Storage Security in Cloud
using Hadoop",Mehak Int. Journal of Engineering Research and
Applications,ISSN : 2248-9622, Vol. 4, Issue 9( Version 3),
September 2014, pp.133-138
 Venkata Narasimha Inukollu ,Sailaja Arsi,Srinivasa Rao
Ravuri,"SECURITY ISSUES ASSOCIATED WITH BIG DATA IN
CLOUD COMPUTING"International Journal of Network Security &
Its Applications (IJNSA), Vol.6, No.3, May 2014
 Rajesh Laxman Gaikwad,Prof. Dhananjay M Dakhane,Prof.
Ravindra L Pardhi,"Network Security Enhancement in Hadoop
Clusters",International Journal of Application or Innovation in
Engineering & Management (IJAIEM),Volume 2, Issue 3, March
2013, ISSN 2319 - 4847
 Vikas Saxena, Shyam Kumar Doddavula,Akansha Jain,"Open
Access Implementation of a secure genome sequence search

More Related Content

What's hot

Xanadu Based Big Data Deep Learning for Medical Data Analysis
Xanadu Based Big Data Deep Learning for Medical Data AnalysisXanadu Based Big Data Deep Learning for Medical Data Analysis
Xanadu Based Big Data Deep Learning for Medical Data AnalysisAlex G. Lee, Ph.D. Esq. CLP
 
Big Data’s Big Impact on Businesses
Big Data’s Big Impact on BusinessesBig Data’s Big Impact on Businesses
Big Data’s Big Impact on BusinessesCRISIL Limited
 
Automating Splunk at Large Scale with Cloudify
Automating Splunk at Large Scale with CloudifyAutomating Splunk at Large Scale with Cloudify
Automating Splunk at Large Scale with CloudifyCloudify Community
 
Mining Big Data in Real Time
Mining Big Data in Real TimeMining Big Data in Real Time
Mining Big Data in Real TimeAlbert Bifet
 
Moneytree - Data Aggregation with SWF
Moneytree - Data Aggregation with SWFMoneytree - Data Aggregation with SWF
Moneytree - Data Aggregation with SWFRoss Sharrott
 
Big data-analytics-cpe8035
Big data-analytics-cpe8035Big data-analytics-cpe8035
Big data-analytics-cpe8035Neelam Rawat
 
Chapter 4 what is data and data types
Chapter 4  what is data and data typesChapter 4  what is data and data types
Chapter 4 what is data and data typesPro Guide
 
Big Data Lessons from the Cloud
Big Data Lessons from the CloudBig Data Lessons from the Cloud
Big Data Lessons from the CloudMapR Technologies
 
Sqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber HuntingSqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber HuntingSqrrl
 
Leveraging a big data model in the IT domain
Leveraging a big data model in the IT domainLeveraging a big data model in the IT domain
Leveraging a big data model in the IT domainVSS Monitoring
 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...LeMeniz Infotech
 
Big data introduction
Big data introductionBig data introduction
Big data introductionvikas samant
 
Big Data Applications | Big Data Analytics Use-Cases | Big Data Tutorial for ...
Big Data Applications | Big Data Analytics Use-Cases | Big Data Tutorial for ...Big Data Applications | Big Data Analytics Use-Cases | Big Data Tutorial for ...
Big Data Applications | Big Data Analytics Use-Cases | Big Data Tutorial for ...Edureka!
 
Research Topics in Data Mining
Research Topics in Data MiningResearch Topics in Data Mining
Research Topics in Data MiningPhdtopiccom
 
Big data (word file)
Big data  (word file)Big data  (word file)
Big data (word file)Shahbaz Anjam
 

What's hot (20)

Xanadu Based Big Data Deep Learning for Medical Data Analysis
Xanadu Based Big Data Deep Learning for Medical Data AnalysisXanadu Based Big Data Deep Learning for Medical Data Analysis
Xanadu Based Big Data Deep Learning for Medical Data Analysis
 
Big Data’s Big Impact on Businesses
Big Data’s Big Impact on BusinessesBig Data’s Big Impact on Businesses
Big Data’s Big Impact on Businesses
 
Automating Splunk at Large Scale with Cloudify
Automating Splunk at Large Scale with CloudifyAutomating Splunk at Large Scale with Cloudify
Automating Splunk at Large Scale with Cloudify
 
Mining Big Data in Real Time
Mining Big Data in Real TimeMining Big Data in Real Time
Mining Big Data in Real Time
 
Moneytree - Data Aggregation with SWF
Moneytree - Data Aggregation with SWFMoneytree - Data Aggregation with SWF
Moneytree - Data Aggregation with SWF
 
Big data-analytics-cpe8035
Big data-analytics-cpe8035Big data-analytics-cpe8035
Big data-analytics-cpe8035
 
Chapter 4 what is data and data types
Chapter 4  what is data and data typesChapter 4  what is data and data types
Chapter 4 what is data and data types
 
Big Data Lessons from the Cloud
Big Data Lessons from the CloudBig Data Lessons from the Cloud
Big Data Lessons from the Cloud
 
Sqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber HuntingSqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber Hunting
 
Big data-ppt
Big data-pptBig data-ppt
Big data-ppt
 
Leveraging a big data model in the IT domain
Leveraging a big data model in the IT domainLeveraging a big data model in the IT domain
Leveraging a big data model in the IT domain
 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
 
Big data introduction
Big data introductionBig data introduction
Big data introduction
 
Big Data Applications | Big Data Analytics Use-Cases | Big Data Tutorial for ...
Big Data Applications | Big Data Analytics Use-Cases | Big Data Tutorial for ...Big Data Applications | Big Data Analytics Use-Cases | Big Data Tutorial for ...
Big Data Applications | Big Data Analytics Use-Cases | Big Data Tutorial for ...
 
Study: #Big Data in #Austria
Study: #Big Data in #AustriaStudy: #Big Data in #Austria
Study: #Big Data in #Austria
 
Towards an AI Commons
Towards an AI CommonsTowards an AI Commons
Towards an AI Commons
 
Research Topics in Data Mining
Research Topics in Data MiningResearch Topics in Data Mining
Research Topics in Data Mining
 
Big data (word file)
Big data  (word file)Big data  (word file)
Big data (word file)
 
Big data ppt
Big data pptBig data ppt
Big data ppt
 
Big Data 101
Big Data 101Big Data 101
Big Data 101
 

Similar to Big data

Solve Big Data Security Issues
Solve Big Data Security IssuesSolve Big Data Security Issues
Solve Big Data Security IssuesEditor IJCATR
 
Big Data PPT by Rohit Dubey
Big Data PPT by Rohit DubeyBig Data PPT by Rohit Dubey
Big Data PPT by Rohit DubeyRohit Dubey
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET Journal
 
Big Data for Mobile Network Operator
Big Data for Mobile Network OperatorBig Data for Mobile Network Operator
Big Data for Mobile Network OperatorErkan Örün
 
Big data data lake and beyond
Big data data lake and beyond Big data data lake and beyond
Big data data lake and beyond Rajesh Kumar
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageIRJET Journal
 
Solving the Really Big Tech Problems with IoT
 Solving the Really Big Tech Problems with IoT Solving the Really Big Tech Problems with IoT
Solving the Really Big Tech Problems with IoTEric Kavanagh
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptographyijtsrd
 
Introduction Big Data
Introduction Big DataIntroduction Big Data
Introduction Big DataFrank Kienle
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datosSoftware Guru
 
Hadoop for beginners free course ppt
Hadoop for beginners   free course pptHadoop for beginners   free course ppt
Hadoop for beginners free course pptNjain85
 
AWS Initiate Berlin - Das Zeitalter von Big Data - So nutzen Sie Daten zum En...
AWS Initiate Berlin - Das Zeitalter von Big Data - So nutzen Sie Daten zum En...AWS Initiate Berlin - Das Zeitalter von Big Data - So nutzen Sie Daten zum En...
AWS Initiate Berlin - Das Zeitalter von Big Data - So nutzen Sie Daten zum En...Amazon Web Services
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithmijtsrd
 

Similar to Big data (20)

Solve Big Data Security Issues
Solve Big Data Security IssuesSolve Big Data Security Issues
Solve Big Data Security Issues
 
Big Data PPT by Rohit Dubey
Big Data PPT by Rohit DubeyBig Data PPT by Rohit Dubey
Big Data PPT by Rohit Dubey
 
Unit 2
Unit 2Unit 2
Unit 2
 
Big data for MNO
Big data for MNOBig data for MNO
Big data for MNO
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
 
Big Data for Mobile Network Operator
Big Data for Mobile Network OperatorBig Data for Mobile Network Operator
Big Data for Mobile Network Operator
 
Big data data lake and beyond
Big data data lake and beyond Big data data lake and beyond
Big data data lake and beyond
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
 
Solving the Really Big Tech Problems with IoT
 Solving the Really Big Tech Problems with IoT Solving the Really Big Tech Problems with IoT
Solving the Really Big Tech Problems with IoT
 
Introduction to Big Data
Introduction to Big DataIntroduction to Big Data
Introduction to Big Data
 
Bi4201403406
Bi4201403406Bi4201403406
Bi4201403406
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
IJARCCE 20
IJARCCE 20IJARCCE 20
IJARCCE 20
 
Introduction Big Data
Introduction Big DataIntroduction Big Data
Introduction Big Data
 
Big data.pptx
Big data.pptxBig data.pptx
Big data.pptx
 
BDA ( haoop ).pptx
BDA ( haoop ).pptxBDA ( haoop ).pptx
BDA ( haoop ).pptx
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datos
 
Hadoop for beginners free course ppt
Hadoop for beginners   free course pptHadoop for beginners   free course ppt
Hadoop for beginners free course ppt
 
AWS Initiate Berlin - Das Zeitalter von Big Data - So nutzen Sie Daten zum En...
AWS Initiate Berlin - Das Zeitalter von Big Data - So nutzen Sie Daten zum En...AWS Initiate Berlin - Das Zeitalter von Big Data - So nutzen Sie Daten zum En...
AWS Initiate Berlin - Das Zeitalter von Big Data - So nutzen Sie Daten zum En...
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
 

Recently uploaded

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 

Recently uploaded (20)

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 

Big data

  • 1. A Review On Security Approach In Big Data
  • 2. Outline  What is Big Data?  Characteristics  Big Data Issues  Tools in Big Data  Security Issue
  • 3. What is Big Data? Big data refers to the databases whose size is beyond the normal size of traditional databases. It handles and measures in terabytes and zeta bytes. Big data has hardly ever generated by human being, whereas machine and sensors provides data.
  • 4. 12+ TBs of tweet data every day 25+ TBs of log data every day ?TBsof dataeveryday 2+ billion people on the Web by end 2011 30 billion RFID tags today (1.3B in 2005) 4.6 billion camera phones world wide 100s of millions of GPS enabled devices sold annually 76 million smart meters in 2009… 200M by 2014
  • 5. Big Data : 4’V Volume • Large scale of Data. Variety • Different form of data Velocity • Analysis of streaming of data Veracity • Uncertainty of data
  • 7. Tools in Big Data MAP REDUCE HADOOP
  • 8. Hadoop  Hadoop is a framework written in java which allows distributed processing of huge scale of data sets using programming model.  It is distributed file system called Hadoop distributed file system (HDFS).  It basically help us to store large data sets of file in distributed file system.
  • 9. Map Reduce  Map reduce is a programming model and used to implement large data sets.
  • 11. Main Task of Map Reduce
  • 12. Security Issue in Big Data  Some personal or confidential data can be reuse by another sector.  User authentication and access to sensitive data is out of controlled.  User are not comfortable with the idea about service providers are able to gather information like credit card, log files, location based data etc.
  • 15. Kerberos Mechanism  Kerberos is a network authentication protocol developed at MIT as part of the Project Athena. It uses private-key cryptography for providing the authentication across the open network
  • 16. Steps in Kerberos:- 1. Authentication:-A client must authenticates itself to the Authentication Server and receives the time stamped Ticket- Granting Ticket (TGT). 2. Authorization:-The client with the TGT, requests for a service ticket from the Ticket Granting Server(TGT). 3. Service Request:- The client uses the service ticket for authenticate itself to the server which is providing the service which client is using.
  • 17. AES-MR  AES-MR is only the mix of the AES encryption algorithm and MapReduce parallel programming Paradigm.  The AES encryption algorithm is one of the best, quickest conceivable approaches to encode the data very still, which is our goal in our work.  MapReduce will be utilized as a part of our work to encode the huge data volumes and vital data utilizing the AES encryption algorithm
  • 20. Kerberos Levels of Security Kerberos only provide Authentication and Authorization
  • 21. AES-MR Levels of Security
  • 22. References  Devika Tondon,Monika Khurana “Security of Big Data in Hadoop Using AES-MR with Auditing “ Volume 7, Issue 1, January 2017 pp no. 100-105  Devika Tandon,”A survey on security of big data in hadoop” ,International journal of research development and technology, Volume-5,Issue-6 (June-16) ISSN (O) :- 2349-3585  Mehak,Gagandeep,"Improving Data Storage Security in Cloud using Hadoop",Mehak Int. Journal of Engineering Research and Applications,ISSN : 2248-9622, Vol. 4, Issue 9( Version 3), September 2014, pp.133-138  Venkata Narasimha Inukollu ,Sailaja Arsi,Srinivasa Rao Ravuri,"SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING"International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.3, May 2014  Rajesh Laxman Gaikwad,Prof. Dhananjay M Dakhane,Prof. Ravindra L Pardhi,"Network Security Enhancement in Hadoop Clusters",International Journal of Application or Innovation in Engineering & Management (IJAIEM),Volume 2, Issue 3, March 2013, ISSN 2319 - 4847  Vikas Saxena, Shyam Kumar Doddavula,Akansha Jain,"Open Access Implementation of a secure genome sequence search