2. Outline
What is Big Data?
Characteristics
Big Data Issues
Tools in Big Data
Security Issue
3. What is Big Data?
Big data refers to
the databases
whose size is
beyond the
normal size of
traditional
databases.
It handles and
measures in
terabytes and
zeta bytes.
Big data has hardly
ever generated by
human being,
whereas machine
and sensors
provides data.
4. 12+ TBs
of tweet data
every day
25+ TBs of
log data
every day
?TBsof
dataeveryday
2+
billion
people on
the Web
by end
2011
30 billion RFID
tags today
(1.3B in 2005)
4.6
billion
camera
phones
world wide
100s of
millions
of GPS
enabled
devices
sold
annually
76 million smart
meters in 2009…
200M by 2014
5. Big Data : 4’V
Volume
• Large scale of Data.
Variety
• Different form of data
Velocity
• Analysis of streaming of data
Veracity
• Uncertainty of data
8. Hadoop
Hadoop is a framework written in java
which allows distributed processing of huge
scale of data sets using programming
model.
It is distributed file system called Hadoop
distributed file system (HDFS).
It basically help us to store large data sets
of file in distributed file system.
9. Map Reduce
Map reduce is a programming model
and used to implement large data
sets.
12. Security Issue in Big Data
Some personal or confidential data
can be reuse by another sector.
User authentication and access to
sensitive data is out of controlled.
User are not comfortable with the idea
about service providers are able to
gather information like credit card, log
files, location based data etc.
15. Kerberos Mechanism
Kerberos is a network authentication
protocol developed at MIT as part of
the Project Athena. It uses private-key
cryptography for providing the
authentication across the open
network
16. Steps in Kerberos:-
1. Authentication:-A client must
authenticates itself to the Authentication
Server and receives the time stamped
Ticket- Granting Ticket (TGT).
2. Authorization:-The client with the TGT,
requests for a service ticket from the
Ticket Granting Server(TGT).
3. Service Request:- The client uses the
service ticket for authenticate itself to the
server which is providing the service
which client is using.
17. AES-MR
AES-MR is only the mix of the AES
encryption algorithm and MapReduce
parallel programming Paradigm.
The AES encryption algorithm is one of
the best, quickest conceivable
approaches to encode the data very still,
which is our goal in our work.
MapReduce will be utilized as a part of
our work to encode the huge data
volumes and vital data utilizing the AES
encryption algorithm
22. References
Devika Tondon,Monika Khurana “Security of Big Data in Hadoop
Using AES-MR with Auditing “ Volume 7, Issue 1, January 2017 pp
no. 100-105
Devika Tandon,”A survey on security of big data in hadoop”
,International journal of research development and technology,
Volume-5,Issue-6 (June-16) ISSN (O) :- 2349-3585
Mehak,Gagandeep,"Improving Data Storage Security in Cloud
using Hadoop",Mehak Int. Journal of Engineering Research and
Applications,ISSN : 2248-9622, Vol. 4, Issue 9( Version 3),
September 2014, pp.133-138
Venkata Narasimha Inukollu ,Sailaja Arsi,Srinivasa Rao
Ravuri,"SECURITY ISSUES ASSOCIATED WITH BIG DATA IN
CLOUD COMPUTING"International Journal of Network Security &
Its Applications (IJNSA), Vol.6, No.3, May 2014
Rajesh Laxman Gaikwad,Prof. Dhananjay M Dakhane,Prof.
Ravindra L Pardhi,"Network Security Enhancement in Hadoop
Clusters",International Journal of Application or Innovation in
Engineering & Management (IJAIEM),Volume 2, Issue 3, March
2013, ISSN 2319 - 4847
Vikas Saxena, Shyam Kumar Doddavula,Akansha Jain,"Open
Access Implementation of a secure genome sequence search