Submit Search
Upload
Big Data: Privacy and Security Aspects
•
0 likes
•
7 views
IRJET Journal
Follow
https://www.irjet.net/archives/V9/i4/IRJET-V9I4421.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
IRJET- Big Data Privacy and Security Challenges in Industries
IRJET- Big Data Privacy and Security Challenges in Industries
IRJET Journal
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
IJECEIAES
IRJET- Scope of Big Data Analytics in Industrial Domain
IRJET- Scope of Big Data Analytics in Industrial Domain
IRJET Journal
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
IRJET Journal
Big Data Security Challenges: An Overview and Application of User Behavior An...
Big Data Security Challenges: An Overview and Application of User Behavior An...
IRJET Journal
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
IRJET Journal
Data security and privacy
Data security and privacy
rajab ssemwogerere
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET Journal
Recommended
IRJET- Big Data Privacy and Security Challenges in Industries
IRJET- Big Data Privacy and Security Challenges in Industries
IRJET Journal
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
IJECEIAES
IRJET- Scope of Big Data Analytics in Industrial Domain
IRJET- Scope of Big Data Analytics in Industrial Domain
IRJET Journal
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
IRJET Journal
Big Data Security Challenges: An Overview and Application of User Behavior An...
Big Data Security Challenges: An Overview and Application of User Behavior An...
IRJET Journal
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
IRJET Journal
Data security and privacy
Data security and privacy
rajab ssemwogerere
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET Journal
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
dbpublications
IRJET- Big Data Management and Growth Enhancement
IRJET- Big Data Management and Growth Enhancement
IRJET Journal
Big Data Analytics
Big Data Analytics
JOSEPH FRANCIS
Fundamentals of data mining and its applications
Fundamentals of data mining and its applications
Subrat Swain
Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...
IRJET Journal
IRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET Journal
Protection of big data privacy
Protection of big data privacy
redpel dot com
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
IRJET Journal
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
Associate Professor in VSB Coimbatore
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for Databases
Editor IJMTER
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET Journal
Sample
Sample
MohdAnasSiddiqui
IRJET- Big Data: A Study
IRJET- Big Data: A Study
IRJET Journal
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...
IRJET Journal
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
todd521
IRJET- A Study on Data Mining in Software
IRJET- A Study on Data Mining in Software
IRJET Journal
Big Data: Review, Classification and Analysis Survey
Big Data: Review, Classification and Analysis Survey
AM Publications,India
A SURVEY OF BIG DATA ANALYTICS
A SURVEY OF BIG DATA ANALYTICS
ijistjournal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods
IJECEIAES
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to Big Data: Privacy and Security Aspects
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
dbpublications
IRJET- Big Data Management and Growth Enhancement
IRJET- Big Data Management and Growth Enhancement
IRJET Journal
Big Data Analytics
Big Data Analytics
JOSEPH FRANCIS
Fundamentals of data mining and its applications
Fundamentals of data mining and its applications
Subrat Swain
Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...
IRJET Journal
IRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET Journal
Protection of big data privacy
Protection of big data privacy
redpel dot com
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
IRJET Journal
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
Associate Professor in VSB Coimbatore
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for Databases
Editor IJMTER
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET Journal
Sample
Sample
MohdAnasSiddiqui
IRJET- Big Data: A Study
IRJET- Big Data: A Study
IRJET Journal
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...
IRJET Journal
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
todd521
IRJET- A Study on Data Mining in Software
IRJET- A Study on Data Mining in Software
IRJET Journal
Big Data: Review, Classification and Analysis Survey
Big Data: Review, Classification and Analysis Survey
AM Publications,India
A SURVEY OF BIG DATA ANALYTICS
A SURVEY OF BIG DATA ANALYTICS
ijistjournal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods
IJECEIAES
Similar to Big Data: Privacy and Security Aspects
(20)
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
IRJET- Big Data Management and Growth Enhancement
IRJET- Big Data Management and Growth Enhancement
Big Data Analytics
Big Data Analytics
Fundamentals of data mining and its applications
Fundamentals of data mining and its applications
Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...
IRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and Techniques
Protection of big data privacy
Protection of big data privacy
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for Databases
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
Sample
Sample
IRJET- Big Data: A Study
IRJET- Big Data: A Study
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
IRJET- A Study on Data Mining in Software
IRJET- A Study on Data Mining in Software
Big Data: Review, Classification and Analysis Survey
Big Data: Review, Classification and Analysis Survey
A SURVEY OF BIG DATA ANALYTICS
A SURVEY OF BIG DATA ANALYTICS
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Solving Linear Differential Equations with Constant Coefficients
Solving Linear Differential Equations with Constant Coefficients
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Solving Linear Differential Equations with Constant Coefficients
Solving Linear Differential Equations with Constant Coefficients
Recently uploaded
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
power system scada applications and uses
power system scada applications and uses
DevarapalliHaritha
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
Recently uploaded
(20)
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
power system scada applications and uses
power system scada applications and uses
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
Big Data: Privacy and Security Aspects
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3197 Big Data: Privacy and Security Aspects Shraddha Ovale1, Vallabh Kulkarni2, Shreya Patil3, Priyanka Nalla4, Pranav Patil5 1Assistant Professor, Dept of Computer Engineering, PCCOE, Pune, Maharashtra, India 2,3,4,5Dept of Computer Engineering, PCCOE, Pune, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In the ever-growing era of technology and commercialization, data has been a very important research topic for techno-savvy people. 'Data' is something that is processed by one party and provided by another party. On a commercial level, companies and consumers are the two parties in which the exchange of data occurs as per the benefits and requirements of the company and the consumer. Hence, on different stages and scales, various transactions and exchanges of data lead to concern about the privacy and security of the data. At the company level, a lot of data having complex information, high variety, increased volume, and having high velocity is exchanged among multiple parties. This data is called 'Big Data '. Such huge and complex data makes the exchange to be complicated and the preservation of privacy and security of big data requires various mechanisms. This review paper puts light on the various concerns about the protection of privacy and security of big data. The infrastructure, the mechanisms of protection, and the cycle of big data are discussed in this paper. Key Words: Big data; Privacy; Security; Information Security: Mechanisms; Security Protection; Infrastructure; the cycle of big data; Data Analysis; Social Applications. 1. INTRODUCTION In the last few years, data has become a prime significant factor for businesses, companies, governments, the medical sector, engineering sector to name a few. Data is an essential asset for these companies and organizations to carry out their business plans, marketing strategies and to make decisions. A single smartphone user generates approximately 40 Exabytes of data every month. Existence of this data is in the form of pictures, emails, music and songs, texts, videos, searches, etc. The number of users of smartphones is in the millions and thus data generated is quite a lot of traditional computing systems to process and analyze it. This collection of large and complex sets of data is termed "Big Data". As we live in the era of big data, we need to go through all the important aspects of big data. So how do we classify a set of data as Big Data? This can be explained with velocity, volume, variety, value and veracity. Big data is super beneficial once it is processed and analyzed properly. From a privacy and security perspective, a glance is to be taken on the fact that, for marketing purposes, making business strategies and research; many companies use data collected from consumers but they may not provide a future economic profit to consumers on a significant level. Instead this collected data may be misused to track the irrelative history of a consumer. Many businesses, companies and organizations use petabytes of data about their customers and company. These companies use technology to store and analyze data. Classification of this information (extracted from analyzed data) becomes even more critical. These issues of big data are related not only to variety and volume but also to security and privacy. A balance between data privacy and information needs is to be maintained. Hence, this review paper focuses on Big data - privacy and security solutions.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3198 2. LITERATURE REVIEW Paper[1] written by Mr. Apparao et al. proposed a method of data privacy and protection in transaction logs and threats in stealing the user credentials. Also, the paper had proposed and explained some newer methodologies to prevent privacy in the transaction field. Big data is not structured and it is very big in volume that it is a tough process to store such a huge amount of data. So, one technology named Robust technology comes into the picture which helps to store data and gives tools which analyze it. To increase privacy in big data, especially in transaction logs, a mechanism called the auto-tier mechanism is explained. Paper[2] i.e. journal written by S. K. Saravanan et al. explained the concept of the use of encryption and decryption techniques to prevent the security and privacy aspects of Big Data information. Some technologies pose a serious threat to one's information like Data mining. Encrypting and decrypting the data makes it unreadable to third parties and the data is stored safely. But, to emphasize the security in big data, ‘SHA3’ algorithms of encryption and decryption are used. In paper[3], B.B Gupta et al. proposed security and privacy issues regarding the information on an online platform, log-in into apps, and cloud computing. Cyber threat is considered a major task today because the issue is being faced by all countries whether it is developed or developing. On multimedia, users share most of the memories of their life and the explosion and use of that information wrongly creates distrust among users regarding social media. So, it is a very challenging task that is taken into consideration because Big data is not only huge in volume but also it is unstructured. In paper[4], Julio Moreno et al. explained problems and challenges related to security issues in Big Data. The author further stated that security issues were much more significant when big data was introduced. Many researchers, therefore, focused on their research on solutions for security and privacy issues. Moreover, the protection of the Hadoop system is of prime significance for researchers. If a proper framework on security in big data is carried out by the government, there will be a rapid spread of big data technology. Big Data technology will be useful for the basic development of upcoming technology. In Paper[5], Jose Moura et al. explained the infrastructure security in big data considering the assured modeled processing of data and provided the mechanisms regarding security for databases that are not in the specific storage pattern. The author stated about the aspects of data analysis through data mining, granular access control, granular audits, and data provenance. The author also proposed ‘cryptographic’ solutions regarding storing data in a secure and private manner. Various case studies in secure social apps are taken into account in the research paper. A large capacity and highly distributed architecture will be required, exposed to a hostile environment. The present state of the legal rules and regulations regarding the security and privacy of big data is proposed by Nils Gruschka et al. in their research paper[6] by analyzing various data conservation and privacy-oriented mechanisms. In addition, for complying with the 'Data regulation laws', the author presented and analyzed two authentic research projects as case studies dealing with sensitive data and actions. The research paper proposed employed techniques under the legal requirements for protecting privacy, and the influence of these techniques on the data processing phase. This paper also explained how privacy preservation can be applied and in what manner the data protection laws are implied.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3199 Nandhini. P, in her research paper[7], depicts the various security and privacy protection methodologies proposed by the various researchers and analyses the merits and demerits of those methodologies. The security and handling of big data are also considered with algorithms and techniques to do so. Challenges with the security and privacy of transaction data, stored data, and cloud computing are discussed with the help of surveys and other research material. She concluded that there is a need to consider new technologies and modifications in the available technologies to make the data secure and to provide privacy. In paper [8], the author Venkata Narasimha Inukollu has discussed cloud computing, the Hadoop environment, and Big data. The author has conversed about security concerns about big data in cloud computing. The author broached the issues and provocations at various levels, namely: the network, validation, data, and generic level. The possible solutions for the issues and challenges allied with cloud computing security and Hadoop are also mentioned. The role played by cloud computing in sectors of data protection, its applications as well as the related infrastructure by assistance of policies, technologies, controls, and big data tools is also mooted. Measures and proposed approaches such as encryption of files and network, logging, software format and maintenance of node, authentication of node, honeypot nodes, acrid system testing of map-reduce jobs, and framework for persuading cloud can be implemented to improvise the security issues in cloud computing. The author 'Kudakwashe Zvarevashe' of the paper [9] has emphasized the subjects such as big data, MongoDB, Hadoop, Kerberos, NoSQL, and social networks. The paper pinpoints the list of directions of research from 2009 to 2014, which includes the topics such as security matters generated during the inventions of social networks, smart devices like smartphones, etc., and other technological advancements. The paper highlights the major security problems linked with Big Data. Using nodes like mapper nodes, reducer nodes. The use of encryption with Kerberos protocol makes the data more secure. However, security and privacy issues are faced in different forms such that Kerberos might not be enough to fully secure the data. The paper written by Dongpo Zhang [10] tells us about the impact, dependence, and importance of big data in the daily lives of human beings. It elaborates the need for strengthening the privacy and security of huge data transfers, to protect and secure the privacy. Big data is essential for ordinary people and very necessary in industrial, economical, and commercial sectors. This article states how to ensure the security of big data and the protection of privacy of lives. One of the most important aspect mentioned in this research paper is that to ensure the authenticity and reliability of data. According to author, the citizens of a country should also be made aware so that the privacy and security is protected. Paper Id Related Work Mechani sm/ Algorith m Results Advanta ges Disadva ntages [1] Cloud security alliance member ship and surveyed security practical oriented intervie wed by them to get a basic idea of high- security issues Auto-tie ring mechani sm propose d Propose d more ways to secure data from hacking Propose d new mechani sms and techniqu es Auto-tie ring mechani sm is not explaine d in detail [2] Explaine d use of encrypti on and decrypti on to prevent security SHA3 algorith m Propose d encrypti on and decrypti on techniqu e Data mining is explaine d in brief PPDM is not explaine d in brief [3] Paper explains mainly on multime dia explosio n and difficulty in handling it --- Cyber threat is consider ed a major issue faced by countrie s. Explains well about cyber threat Explanat ion is very basic [4] Explains how Hadoop techniqu e is big concern for research ers --- Displays all possible problem s in Big data. Explaine d well about threats and problem s related to security issues related to Big data . Does not provide solutions to threat [5] The infrastru cture security in big Case Study A high capacity and highly distribut Cryptogr aphic solutions are propose Impleme ntation of solutions is not
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3200 data consideri ng the assured modeled processi ng of data. ed architect ure will be necessar y when exposed to a hostile environ ment. d. discusse d . [6] The present state of the legal regulatio ns regardin g big data security is propose d. Data regulatio n Data Regulati on Laws should be consider ed when dealing with security and privacy of big data. Propose d employe d techniqu es under the legal require ments for protectin g privacy. Legal Actions on violation of laws is not explaine d. [7] Study of various security and privacy methodo logies and their merits and demerits Survey Study Modifica tions required in the available technolo gy Challeng es with the security and privacy of transacti on data, stored data, and cloud computi ng are discusse d . The holistic Framew ork is not explaine d in detail. [8] Research about data storage on clouds, the Hadoop environ ment and the security issues in cloud computi ng. --- Cloud environ ments can be secured for complex business operatio ns by applicati ons of propose d approac hes. Data Security and Privacy issues at various levels are discusse d. Third- Party involvin g is not discusse d thorough ly. [9] Security issues generate d during the inventio ns of social network --- Use of encrypti on with Kerberos protocol makes the data more secure. Concept of encrypti on is introduc ed to protect data hacking. Kerberos may not be sufficient for fully securing the data. s, smart devices like smartph ones, and other technolo gical advance ments. [10] The need for strength ening the privacy and security of huge data transfers , to protect and secure the privacy. Awarene ss of common people The citizens of a country should be made aware about data hacking along with other measure s. Focus is on authenti city and reliabilit y of data and common people. Full supervisi on is propose d which may be violation of privacy itself. 3. CONCLUSION This review paper presented a view about various papers which include various security and privacy aspects. Not only big data in mobiles and multimedia but also in cloud storage of data. Also, the security aspects of mobiles and cloud-based data transfers are taken into account. It is helpful in knowing about many open questions related to security. The huge data transactions and mining as well as the significance of big data in the networks encourages researchers to look into various security and privacy problems that are essential to be resolved crucially by developing efficient and effective solutions. Massive work is essential prior to this solution getting quixotically taken on. We hope the papers dealt with in this review paper will be a good provision to the trends and issues coming to the picture regarding the security and privacy of big data in transfers and computing. Modifications and research are still required to set the seal on the security and privacy of big data. The current ways and mechanisms to protect data are insufficient to handle big data and will fail to protect it from misuse. Thus finding out the solutions to current problems and making big data transactions more secure and confidential is a need of technology. REFERENCES [1] Mr. Yannam Apparao, Mrs. Kadiyala Laxminarayanamma. "Security Issue on “Secure Data Storage and Transaction Logs” In Big Data ".
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3201 [2] SHASHANK -PG Student II year MCA S.K.Saravanan, Assistant Professor (Sel.Gr) G.Rekha, Assistant Professor (Sen.Gr). "Information Security in Big Data using Encryption and Decryption". [3] B. B. Gupta1 & Shingo Yamaguchi 2 & Dharma P. Agrawal 3."Advances in Security and Privacy of Multimedia Big Data in Mobile and Cloud Computing ". [4] Julio Moreno *, Manuel A. Serrano and Eduardo Fernández-Medina. "Main Issues in Big Data Security". [5] Jose Maura, Carlos Serrao. "Security and Privacy Issues of Big Data". [6] Nils Gruschka† , Vasileios Mavroeidis† , Kamer Vishi† , Meiko Jensen∗ †Research Group of Information and Cyber Security, University of Oslo, Norway. "Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR". [7] Nandhini. P. "A Research on Big Data Analytics Security and Privacy in Cloud, Data Mining, Hadoop and MapReduce". [8] Venkata Narasimha Inukollu1, Sailaja Arsi1, and Srinivasa Rao Ravuri3, "SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING". [9] Kudakwashe Zvarevashe1, Mainford Mutandavari2, Trust Gotora3, "A Survey of the Security Use Cases in Big Data" from International Journal of Innovative Research in Computer and Communication Engineering (An ISO 3297: 2007 Certified Organization) Vol. 2, Issue 5, May 2014. [10] Dongpo Zhang, "Big Data Security and Privacy Protection" from Advances in Computer Science Research, volume 77.
Download now