SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3197
Big Data: Privacy and Security Aspects
Shraddha Ovale1, Vallabh Kulkarni2, Shreya Patil3, Priyanka Nalla4, Pranav Patil5
1Assistant Professor, Dept of Computer Engineering, PCCOE, Pune, Maharashtra, India
2,3,4,5Dept of Computer Engineering, PCCOE, Pune, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In the ever-growing era of technology and
commercialization, data has been a very important research
topic for techno-savvy people. 'Data' is something that is
processed by one party and provided by another party. On a
commercial level, companies and consumers are the two
parties in which the exchange of data occurs as per the
benefits and requirements of the company and the
consumer. Hence, on different stages and scales, various
transactions and exchanges of data lead to concern about
the privacy and security of the data. At the company level, a
lot of data having complex information, high variety,
increased volume, and having high velocity is exchanged
among multiple parties. This data is called 'Big Data '. Such
huge and complex data makes the exchange to be
complicated and the preservation of privacy and security of
big data requires various mechanisms. This review paper
puts light on the various concerns about the protection of
privacy and security of big data. The infrastructure, the
mechanisms of protection, and the cycle of big data are
discussed in this paper.
Key Words: Big data; Privacy; Security; Information
Security: Mechanisms; Security Protection; Infrastructure;
the cycle of big data; Data Analysis; Social Applications.
1. INTRODUCTION
In the last few years, data has become a prime
significant factor for businesses, companies, governments,
the medical sector, engineering sector to name a few. Data
is an essential asset for these companies and organizations
to carry out their business plans, marketing strategies and
to make decisions. A single smartphone user generates
approximately 40 Exabytes of data every month. Existence
of this data is in the form of pictures, emails, music and
songs, texts, videos, searches, etc. The number of users of
smartphones is in the millions and thus data generated is
quite a lot of traditional computing systems to process and
analyze it. This collection of large and complex sets of data
is termed "Big Data". As we live in the era of big data, we
need to go through all the important aspects of big data. So
how do we classify a set of data as Big Data? This can be
explained with velocity, volume, variety, value and
veracity. Big data is super beneficial once it is processed
and analyzed properly.
From a privacy and security perspective, a glance
is to be taken on the fact that, for marketing purposes,
making business strategies and research; many
companies use data collected from consumers but they
may not provide a future economic profit to consumers on
a significant level. Instead this collected data may be
misused to track the irrelative history of a consumer.
Many businesses, companies and organizations use
petabytes of data about their customers and company.
These companies use technology to store and analyze
data. Classification of this information (extracted from
analyzed data) becomes even more critical. These issues of
big data are related not only to variety and volume but
also to security and privacy. A balance between data
privacy and information needs is to be maintained. Hence,
this review paper focuses on Big data - privacy and
security solutions.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3198
2. LITERATURE REVIEW
Paper[1] written by Mr. Apparao et al. proposed a
method of data privacy and protection in transaction logs
and threats in stealing the user credentials. Also, the paper
had proposed and explained some newer methodologies
to prevent privacy in the transaction field. Big data is not
structured and it is very big in volume that it is a tough
process to store such a huge amount of data. So, one
technology named Robust technology comes into the
picture which helps to store data and gives tools which
analyze it. To increase privacy in big data, especially in
transaction logs, a mechanism called the auto-tier
mechanism is explained.
Paper[2] i.e. journal written by S. K. Saravanan et
al. explained the concept of the use of encryption and
decryption techniques to prevent the security and privacy
aspects of Big Data information. Some technologies pose a
serious threat to one's information like Data mining.
Encrypting and decrypting the data makes it unreadable to
third parties and the data is stored safely. But, to
emphasize the security in big data, ‘SHA3’ algorithms of
encryption and decryption are used.
In paper[3], B.B Gupta et al. proposed security and
privacy issues regarding the information on an online
platform, log-in into apps, and cloud computing. Cyber
threat is considered a major task today because the issue
is being faced by all countries whether it is developed or
developing. On multimedia, users share most of the
memories of their life and the explosion and use of that
information wrongly creates distrust among users
regarding social media. So, it is a very challenging task that
is taken into consideration because Big data is not only
huge in volume but also it is unstructured.
In paper[4], Julio Moreno et al. explained
problems and challenges related to security issues in Big
Data. The author further stated that security issues were
much more significant when big data was introduced.
Many researchers, therefore, focused on their research on
solutions for security and privacy issues. Moreover, the
protection of the Hadoop system is of prime significance
for researchers. If a proper framework on security in big
data is carried out by the government, there will be a rapid
spread of big data technology. Big Data technology will be
useful for the basic development of upcoming technology.
In Paper[5], Jose Moura et al. explained the
infrastructure security in big data considering the assured
modeled processing of data and provided the mechanisms
regarding security for databases that are not in the specific
storage pattern. The author stated about the aspects of
data analysis through data mining, granular access control,
granular audits, and data provenance. The author also
proposed ‘cryptographic’ solutions regarding storing data
in a secure and private manner. Various case studies in
secure social apps are taken into account in the research
paper. A large capacity and highly distributed architecture
will be required, exposed to a hostile environment.
The present state of the legal rules and
regulations regarding the security and privacy of big data
is proposed by Nils Gruschka et al. in their research
paper[6] by analyzing various data conservation and
privacy-oriented mechanisms. In addition, for complying
with the 'Data regulation laws', the author presented and
analyzed two authentic research projects as case studies
dealing with sensitive data and actions. The research
paper proposed employed techniques under the legal
requirements for protecting privacy, and the influence of
these techniques on the data processing phase. This paper
also explained how privacy preservation can be applied
and in what manner the data protection laws are implied.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3199
Nandhini. P, in her research paper[7], depicts the
various security and privacy protection methodologies
proposed by the various researchers and analyses the
merits and demerits of those methodologies. The security
and handling of big data are also considered with
algorithms and techniques to do so. Challenges with the
security and privacy of transaction data, stored data, and
cloud computing are discussed with the help of surveys
and other research material. She concluded that there is a
need to consider new technologies and modifications in
the available technologies to make the data secure and to
provide privacy.
In paper [8], the author Venkata Narasimha
Inukollu has discussed cloud computing, the Hadoop
environment, and Big data. The author has conversed
about security concerns about big data in cloud
computing. The author broached the issues and
provocations at various levels, namely: the network,
validation, data, and generic level. The possible solutions
for the issues and challenges allied with cloud computing
security and Hadoop are also mentioned. The role played
by cloud computing in sectors of data protection, its
applications as well as the related infrastructure by
assistance of policies, technologies, controls, and big data
tools is also mooted. Measures and proposed approaches
such as encryption of files and network, logging, software
format and maintenance of node, authentication of node,
honeypot nodes, acrid system testing of map-reduce jobs,
and framework for persuading cloud can be implemented
to improvise the security issues in cloud computing.
The author 'Kudakwashe Zvarevashe' of the paper
[9] has emphasized the subjects such as big data,
MongoDB, Hadoop, Kerberos, NoSQL, and social networks.
The paper pinpoints the list of directions of research from
2009 to 2014, which includes the topics such as security
matters generated during the inventions of social
networks, smart devices like smartphones, etc., and other
technological advancements. The paper highlights the
major security problems linked with Big Data. Using nodes
like mapper nodes, reducer nodes. The use of encryption
with Kerberos protocol makes the data more secure.
However, security and privacy issues are faced in different
forms such that Kerberos might not be enough to fully
secure the data.
The paper written by Dongpo Zhang [10] tells us
about the impact, dependence, and importance of big data
in the daily lives of human beings. It elaborates the need
for strengthening the privacy and security of huge data
transfers, to protect and secure the privacy. Big data is
essential for ordinary people and very necessary in
industrial, economical, and commercial sectors. This
article states how to ensure the security of big data and
the protection of privacy of lives. One of the most
important aspect mentioned in this research paper is that
to ensure the authenticity and reliability of data.
According to author, the citizens of a country should also
be made aware so that the privacy and security is
protected.
Paper Id
Related
Work
Mechani
sm/
Algorith
m
Results
Advanta
ges
Disadva
ntages
[1]
Cloud
security
alliance
member
ship and
surveyed
security
practical
oriented
intervie
wed by
them to
get a
basic
idea of
high-
security
issues
Auto-tie
ring
mechani
sm
propose
d
Propose
d more
ways to
secure
data
from
hacking
Propose
d new
mechani
sms and
techniqu
es
Auto-tie
ring
mechani
sm is not
explaine
d in
detail
[2]
Explaine
d use of
encrypti
on and
decrypti
on to
prevent
security
SHA3
algorith
m
Propose
d
encrypti
on and
decrypti
on
techniqu
e
Data
mining is
explaine
d in brief
PPDM is
not
explaine
d in brief
[3]
Paper
explains
mainly
on
multime
dia
explosio
n and
difficulty
in
handling
it
--- Cyber
threat is
consider
ed a
major
issue
faced by
countrie
s.
Explains
well
about
cyber
threat
Explanat
ion is
very
basic
[4]
Explains
how
Hadoop
techniqu
e is big
concern
for
research
ers
--- Displays
all
possible
problem
s in Big
data.
Explaine
d well
about
threats
and
problem
s related
to
security
issues
related
to Big
data .
Does not
provide
solutions
to threat
[5]
The
infrastru
cture
security
in big
Case
Study
A high
capacity
and
highly
distribut
Cryptogr
aphic
solutions
are
propose
Impleme
ntation
of
solutions
is not
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3200
data
consideri
ng the
assured
modeled
processi
ng of
data.
ed
architect
ure will
be
necessar
y when
exposed
to a
hostile
environ
ment.
d. discusse
d .
[6]
The
present
state of
the legal
regulatio
ns
regardin
g big
data
security
is
propose
d.
Data
regulatio
n
Data
Regulati
on Laws
should
be
consider
ed when
dealing
with
security
and
privacy
of big
data.
Propose
d
employe
d
techniqu
es under
the legal
require
ments
for
protectin
g
privacy.
Legal
Actions
on
violation
of laws is
not
explaine
d.
[7]
Study of
various
security
and
privacy
methodo
logies
and their
merits
and
demerits
Survey
Study
Modifica
tions
required
in the
available
technolo
gy
Challeng
es with
the
security
and
privacy
of
transacti
on data,
stored
data, and
cloud
computi
ng are
discusse
d .
The
holistic
Framew
ork is
not
explaine
d in
detail.
[8]
Research
about
data
storage
on
clouds,
the
Hadoop
environ
ment
and the
security
issues in
cloud
computi
ng.
--- Cloud
environ
ments
can be
secured
for
complex
business
operatio
ns by
applicati
ons of
propose
d
approac
hes.
Data
Security
and
Privacy
issues at
various
levels
are
discusse
d.
Third-
Party
involvin
g is not
discusse
d
thorough
ly.
[9]
Security
issues
generate
d during
the
inventio
ns of
social
network
--- Use of
encrypti
on with
Kerberos
protocol
makes
the data
more
secure.
Concept
of
encrypti
on is
introduc
ed to
protect
data
hacking.
Kerberos
may not
be
sufficient
for fully
securing
the data.
s, smart
devices
like
smartph
ones,
and
other
technolo
gical
advance
ments.
[10]
The need
for
strength
ening the
privacy
and
security
of huge
data
transfers
, to
protect
and
secure
the
privacy.
Awarene
ss of
common
people
The
citizens
of a
country
should
be made
aware
about
data
hacking
along
with
other
measure
s.
Focus is
on
authenti
city and
reliabilit
y of data
and
common
people.
Full
supervisi
on is
propose
d which
may be
violation
of
privacy
itself.
3. CONCLUSION
This review paper presented a view about various
papers which include various security and privacy aspects.
Not only big data in mobiles and multimedia but also in
cloud storage of data. Also, the security aspects of mobiles
and cloud-based data transfers are taken into account. It is
helpful in knowing about many open questions related to
security. The huge data transactions and mining as well as
the significance of big data in the networks encourages
researchers to look into various security and privacy
problems that are essential to be resolved crucially by
developing efficient and effective solutions. Massive work
is essential prior to this solution getting quixotically taken
on. We hope the papers dealt with in this review paper
will be a good provision to the trends and issues coming to
the picture regarding the security and privacy of big data
in transfers and computing. Modifications and research
are still required to set the seal on the security and privacy
of big data. The current ways and mechanisms to protect
data are insufficient to handle big data and will fail to
protect it from misuse. Thus finding out the solutions to
current problems and making big data transactions more
secure and confidential is a need of technology.
REFERENCES
[1] Mr. Yannam Apparao, Mrs. Kadiyala
Laxminarayanamma. "Security Issue on “Secure
Data Storage and Transaction Logs” In Big Data ".
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3201
[2] SHASHANK -PG Student II year MCA
S.K.Saravanan, Assistant Professor (Sel.Gr)
G.Rekha, Assistant Professor (Sen.Gr).
"Information Security in Big Data using Encryption
and Decryption".
[3] B. B. Gupta1 & Shingo Yamaguchi 2 & Dharma P.
Agrawal 3."Advances in Security and Privacy of
Multimedia Big Data in Mobile and Cloud
Computing ".
[4] Julio Moreno *, Manuel A. Serrano and Eduardo
Fernández-Medina. "Main Issues in Big Data
Security".
[5] Jose Maura, Carlos Serrao. "Security and Privacy
Issues of Big Data".
[6] Nils Gruschka† , Vasileios Mavroeidis† , Kamer
Vishi† , Meiko Jensen∗ †Research Group of
Information and Cyber Security, University of Oslo,
Norway. "Privacy Issues and Data Protection in Big
Data: A Case Study Analysis under GDPR".
[7] Nandhini. P. "A Research on Big Data Analytics
Security and Privacy in Cloud, Data Mining,
Hadoop and MapReduce".
[8] Venkata Narasimha Inukollu1, Sailaja Arsi1, and
Srinivasa Rao Ravuri3, "SECURITY ISSUES
ASSOCIATED WITH BIG DATA IN CLOUD
COMPUTING".
[9] Kudakwashe Zvarevashe1, Mainford
Mutandavari2, Trust Gotora3, "A Survey of the
Security Use Cases in Big Data" from International
Journal of Innovative Research in Computer and
Communication Engineering (An ISO 3297: 2007
Certified Organization) Vol. 2, Issue 5, May 2014.
[10] Dongpo Zhang, "Big Data Security and Privacy
Protection" from Advances in Computer Science
Research, volume 77.

More Related Content

Similar to Big Data: Privacy and Security Aspects

Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata PrivacyTwo-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacydbpublications
 
IRJET- Big Data Management and Growth Enhancement
IRJET- Big Data Management and Growth EnhancementIRJET- Big Data Management and Growth Enhancement
IRJET- Big Data Management and Growth EnhancementIRJET Journal
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applicationsSubrat Swain
 
Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...IRJET Journal
 
IRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and TechniquesIRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and TechniquesIRJET Journal
 
Protection of big data privacy
Protection of big data privacyProtection of big data privacy
Protection of big data privacyredpel dot com
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityAssociate Professor in VSB Coimbatore
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesEditor IJMTER
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET Journal
 
IRJET- Big Data: A Study
IRJET-  	  Big Data: A StudyIRJET-  	  Big Data: A Study
IRJET- Big Data: A StudyIRJET Journal
 
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...
IRJET-  	  Comparative Analysis of Various Tools for Data Mining and Big Data...IRJET-  	  Comparative Analysis of Various Tools for Data Mining and Big Data...
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...IRJET Journal
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxtodd521
 
IRJET- A Study on Data Mining in Software
IRJET- A Study on Data Mining in SoftwareIRJET- A Study on Data Mining in Software
IRJET- A Study on Data Mining in SoftwareIRJET Journal
 
Big Data: Review, Classification and Analysis Survey
Big Data: Review, Classification and Analysis  SurveyBig Data: Review, Classification and Analysis  Survey
Big Data: Review, Classification and Analysis SurveyAM Publications,India
 
A SURVEY OF BIG DATA ANALYTICS
A SURVEY OF BIG DATA ANALYTICSA SURVEY OF BIG DATA ANALYTICS
A SURVEY OF BIG DATA ANALYTICSijistjournal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods IJECEIAES
 

Similar to Big Data: Privacy and Security Aspects (20)

Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata PrivacyTwo-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
 
IRJET- Big Data Management and Growth Enhancement
IRJET- Big Data Management and Growth EnhancementIRJET- Big Data Management and Growth Enhancement
IRJET- Big Data Management and Growth Enhancement
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applications
 
Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...Cloud Security: Techniques and frameworks for ensuring the security and priva...
Cloud Security: Techniques and frameworks for ensuring the security and priva...
 
IRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and TechniquesIRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and Techniques
 
Protection of big data privacy
Protection of big data privacyProtection of big data privacy
Protection of big data privacy
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for Databases
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
Sample
Sample Sample
Sample
 
IRJET- Big Data: A Study
IRJET-  	  Big Data: A StudyIRJET-  	  Big Data: A Study
IRJET- Big Data: A Study
 
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...
IRJET-  	  Comparative Analysis of Various Tools for Data Mining and Big Data...IRJET-  	  Comparative Analysis of Various Tools for Data Mining and Big Data...
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
 
IRJET- A Study on Data Mining in Software
IRJET- A Study on Data Mining in SoftwareIRJET- A Study on Data Mining in Software
IRJET- A Study on Data Mining in Software
 
Big Data: Review, Classification and Analysis Survey
Big Data: Review, Classification and Analysis  SurveyBig Data: Review, Classification and Analysis  Survey
Big Data: Review, Classification and Analysis Survey
 
A SURVEY OF BIG DATA ANALYTICS
A SURVEY OF BIG DATA ANALYTICSA SURVEY OF BIG DATA ANALYTICS
A SURVEY OF BIG DATA ANALYTICS
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 
Solving Linear Differential Equations with Constant Coefficients
Solving Linear Differential Equations with Constant CoefficientsSolving Linear Differential Equations with Constant Coefficients
Solving Linear Differential Equations with Constant CoefficientsIRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 
Solving Linear Differential Equations with Constant Coefficients
Solving Linear Differential Equations with Constant CoefficientsSolving Linear Differential Equations with Constant Coefficients
Solving Linear Differential Equations with Constant Coefficients
 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 

Recently uploaded (20)

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 

Big Data: Privacy and Security Aspects

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3197 Big Data: Privacy and Security Aspects Shraddha Ovale1, Vallabh Kulkarni2, Shreya Patil3, Priyanka Nalla4, Pranav Patil5 1Assistant Professor, Dept of Computer Engineering, PCCOE, Pune, Maharashtra, India 2,3,4,5Dept of Computer Engineering, PCCOE, Pune, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In the ever-growing era of technology and commercialization, data has been a very important research topic for techno-savvy people. 'Data' is something that is processed by one party and provided by another party. On a commercial level, companies and consumers are the two parties in which the exchange of data occurs as per the benefits and requirements of the company and the consumer. Hence, on different stages and scales, various transactions and exchanges of data lead to concern about the privacy and security of the data. At the company level, a lot of data having complex information, high variety, increased volume, and having high velocity is exchanged among multiple parties. This data is called 'Big Data '. Such huge and complex data makes the exchange to be complicated and the preservation of privacy and security of big data requires various mechanisms. This review paper puts light on the various concerns about the protection of privacy and security of big data. The infrastructure, the mechanisms of protection, and the cycle of big data are discussed in this paper. Key Words: Big data; Privacy; Security; Information Security: Mechanisms; Security Protection; Infrastructure; the cycle of big data; Data Analysis; Social Applications. 1. INTRODUCTION In the last few years, data has become a prime significant factor for businesses, companies, governments, the medical sector, engineering sector to name a few. Data is an essential asset for these companies and organizations to carry out their business plans, marketing strategies and to make decisions. A single smartphone user generates approximately 40 Exabytes of data every month. Existence of this data is in the form of pictures, emails, music and songs, texts, videos, searches, etc. The number of users of smartphones is in the millions and thus data generated is quite a lot of traditional computing systems to process and analyze it. This collection of large and complex sets of data is termed "Big Data". As we live in the era of big data, we need to go through all the important aspects of big data. So how do we classify a set of data as Big Data? This can be explained with velocity, volume, variety, value and veracity. Big data is super beneficial once it is processed and analyzed properly. From a privacy and security perspective, a glance is to be taken on the fact that, for marketing purposes, making business strategies and research; many companies use data collected from consumers but they may not provide a future economic profit to consumers on a significant level. Instead this collected data may be misused to track the irrelative history of a consumer. Many businesses, companies and organizations use petabytes of data about their customers and company. These companies use technology to store and analyze data. Classification of this information (extracted from analyzed data) becomes even more critical. These issues of big data are related not only to variety and volume but also to security and privacy. A balance between data privacy and information needs is to be maintained. Hence, this review paper focuses on Big data - privacy and security solutions.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3198 2. LITERATURE REVIEW Paper[1] written by Mr. Apparao et al. proposed a method of data privacy and protection in transaction logs and threats in stealing the user credentials. Also, the paper had proposed and explained some newer methodologies to prevent privacy in the transaction field. Big data is not structured and it is very big in volume that it is a tough process to store such a huge amount of data. So, one technology named Robust technology comes into the picture which helps to store data and gives tools which analyze it. To increase privacy in big data, especially in transaction logs, a mechanism called the auto-tier mechanism is explained. Paper[2] i.e. journal written by S. K. Saravanan et al. explained the concept of the use of encryption and decryption techniques to prevent the security and privacy aspects of Big Data information. Some technologies pose a serious threat to one's information like Data mining. Encrypting and decrypting the data makes it unreadable to third parties and the data is stored safely. But, to emphasize the security in big data, ‘SHA3’ algorithms of encryption and decryption are used. In paper[3], B.B Gupta et al. proposed security and privacy issues regarding the information on an online platform, log-in into apps, and cloud computing. Cyber threat is considered a major task today because the issue is being faced by all countries whether it is developed or developing. On multimedia, users share most of the memories of their life and the explosion and use of that information wrongly creates distrust among users regarding social media. So, it is a very challenging task that is taken into consideration because Big data is not only huge in volume but also it is unstructured. In paper[4], Julio Moreno et al. explained problems and challenges related to security issues in Big Data. The author further stated that security issues were much more significant when big data was introduced. Many researchers, therefore, focused on their research on solutions for security and privacy issues. Moreover, the protection of the Hadoop system is of prime significance for researchers. If a proper framework on security in big data is carried out by the government, there will be a rapid spread of big data technology. Big Data technology will be useful for the basic development of upcoming technology. In Paper[5], Jose Moura et al. explained the infrastructure security in big data considering the assured modeled processing of data and provided the mechanisms regarding security for databases that are not in the specific storage pattern. The author stated about the aspects of data analysis through data mining, granular access control, granular audits, and data provenance. The author also proposed ‘cryptographic’ solutions regarding storing data in a secure and private manner. Various case studies in secure social apps are taken into account in the research paper. A large capacity and highly distributed architecture will be required, exposed to a hostile environment. The present state of the legal rules and regulations regarding the security and privacy of big data is proposed by Nils Gruschka et al. in their research paper[6] by analyzing various data conservation and privacy-oriented mechanisms. In addition, for complying with the 'Data regulation laws', the author presented and analyzed two authentic research projects as case studies dealing with sensitive data and actions. The research paper proposed employed techniques under the legal requirements for protecting privacy, and the influence of these techniques on the data processing phase. This paper also explained how privacy preservation can be applied and in what manner the data protection laws are implied.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3199 Nandhini. P, in her research paper[7], depicts the various security and privacy protection methodologies proposed by the various researchers and analyses the merits and demerits of those methodologies. The security and handling of big data are also considered with algorithms and techniques to do so. Challenges with the security and privacy of transaction data, stored data, and cloud computing are discussed with the help of surveys and other research material. She concluded that there is a need to consider new technologies and modifications in the available technologies to make the data secure and to provide privacy. In paper [8], the author Venkata Narasimha Inukollu has discussed cloud computing, the Hadoop environment, and Big data. The author has conversed about security concerns about big data in cloud computing. The author broached the issues and provocations at various levels, namely: the network, validation, data, and generic level. The possible solutions for the issues and challenges allied with cloud computing security and Hadoop are also mentioned. The role played by cloud computing in sectors of data protection, its applications as well as the related infrastructure by assistance of policies, technologies, controls, and big data tools is also mooted. Measures and proposed approaches such as encryption of files and network, logging, software format and maintenance of node, authentication of node, honeypot nodes, acrid system testing of map-reduce jobs, and framework for persuading cloud can be implemented to improvise the security issues in cloud computing. The author 'Kudakwashe Zvarevashe' of the paper [9] has emphasized the subjects such as big data, MongoDB, Hadoop, Kerberos, NoSQL, and social networks. The paper pinpoints the list of directions of research from 2009 to 2014, which includes the topics such as security matters generated during the inventions of social networks, smart devices like smartphones, etc., and other technological advancements. The paper highlights the major security problems linked with Big Data. Using nodes like mapper nodes, reducer nodes. The use of encryption with Kerberos protocol makes the data more secure. However, security and privacy issues are faced in different forms such that Kerberos might not be enough to fully secure the data. The paper written by Dongpo Zhang [10] tells us about the impact, dependence, and importance of big data in the daily lives of human beings. It elaborates the need for strengthening the privacy and security of huge data transfers, to protect and secure the privacy. Big data is essential for ordinary people and very necessary in industrial, economical, and commercial sectors. This article states how to ensure the security of big data and the protection of privacy of lives. One of the most important aspect mentioned in this research paper is that to ensure the authenticity and reliability of data. According to author, the citizens of a country should also be made aware so that the privacy and security is protected. Paper Id Related Work Mechani sm/ Algorith m Results Advanta ges Disadva ntages [1] Cloud security alliance member ship and surveyed security practical oriented intervie wed by them to get a basic idea of high- security issues Auto-tie ring mechani sm propose d Propose d more ways to secure data from hacking Propose d new mechani sms and techniqu es Auto-tie ring mechani sm is not explaine d in detail [2] Explaine d use of encrypti on and decrypti on to prevent security SHA3 algorith m Propose d encrypti on and decrypti on techniqu e Data mining is explaine d in brief PPDM is not explaine d in brief [3] Paper explains mainly on multime dia explosio n and difficulty in handling it --- Cyber threat is consider ed a major issue faced by countrie s. Explains well about cyber threat Explanat ion is very basic [4] Explains how Hadoop techniqu e is big concern for research ers --- Displays all possible problem s in Big data. Explaine d well about threats and problem s related to security issues related to Big data . Does not provide solutions to threat [5] The infrastru cture security in big Case Study A high capacity and highly distribut Cryptogr aphic solutions are propose Impleme ntation of solutions is not
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3200 data consideri ng the assured modeled processi ng of data. ed architect ure will be necessar y when exposed to a hostile environ ment. d. discusse d . [6] The present state of the legal regulatio ns regardin g big data security is propose d. Data regulatio n Data Regulati on Laws should be consider ed when dealing with security and privacy of big data. Propose d employe d techniqu es under the legal require ments for protectin g privacy. Legal Actions on violation of laws is not explaine d. [7] Study of various security and privacy methodo logies and their merits and demerits Survey Study Modifica tions required in the available technolo gy Challeng es with the security and privacy of transacti on data, stored data, and cloud computi ng are discusse d . The holistic Framew ork is not explaine d in detail. [8] Research about data storage on clouds, the Hadoop environ ment and the security issues in cloud computi ng. --- Cloud environ ments can be secured for complex business operatio ns by applicati ons of propose d approac hes. Data Security and Privacy issues at various levels are discusse d. Third- Party involvin g is not discusse d thorough ly. [9] Security issues generate d during the inventio ns of social network --- Use of encrypti on with Kerberos protocol makes the data more secure. Concept of encrypti on is introduc ed to protect data hacking. Kerberos may not be sufficient for fully securing the data. s, smart devices like smartph ones, and other technolo gical advance ments. [10] The need for strength ening the privacy and security of huge data transfers , to protect and secure the privacy. Awarene ss of common people The citizens of a country should be made aware about data hacking along with other measure s. Focus is on authenti city and reliabilit y of data and common people. Full supervisi on is propose d which may be violation of privacy itself. 3. CONCLUSION This review paper presented a view about various papers which include various security and privacy aspects. Not only big data in mobiles and multimedia but also in cloud storage of data. Also, the security aspects of mobiles and cloud-based data transfers are taken into account. It is helpful in knowing about many open questions related to security. The huge data transactions and mining as well as the significance of big data in the networks encourages researchers to look into various security and privacy problems that are essential to be resolved crucially by developing efficient and effective solutions. Massive work is essential prior to this solution getting quixotically taken on. We hope the papers dealt with in this review paper will be a good provision to the trends and issues coming to the picture regarding the security and privacy of big data in transfers and computing. Modifications and research are still required to set the seal on the security and privacy of big data. The current ways and mechanisms to protect data are insufficient to handle big data and will fail to protect it from misuse. Thus finding out the solutions to current problems and making big data transactions more secure and confidential is a need of technology. REFERENCES [1] Mr. Yannam Apparao, Mrs. Kadiyala Laxminarayanamma. "Security Issue on “Secure Data Storage and Transaction Logs” In Big Data ".
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3201 [2] SHASHANK -PG Student II year MCA S.K.Saravanan, Assistant Professor (Sel.Gr) G.Rekha, Assistant Professor (Sen.Gr). "Information Security in Big Data using Encryption and Decryption". [3] B. B. Gupta1 & Shingo Yamaguchi 2 & Dharma P. Agrawal 3."Advances in Security and Privacy of Multimedia Big Data in Mobile and Cloud Computing ". [4] Julio Moreno *, Manuel A. Serrano and Eduardo Fernández-Medina. "Main Issues in Big Data Security". [5] Jose Maura, Carlos Serrao. "Security and Privacy Issues of Big Data". [6] Nils Gruschka† , Vasileios Mavroeidis† , Kamer Vishi† , Meiko Jensen∗ †Research Group of Information and Cyber Security, University of Oslo, Norway. "Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR". [7] Nandhini. P. "A Research on Big Data Analytics Security and Privacy in Cloud, Data Mining, Hadoop and MapReduce". [8] Venkata Narasimha Inukollu1, Sailaja Arsi1, and Srinivasa Rao Ravuri3, "SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING". [9] Kudakwashe Zvarevashe1, Mainford Mutandavari2, Trust Gotora3, "A Survey of the Security Use Cases in Big Data" from International Journal of Innovative Research in Computer and Communication Engineering (An ISO 3297: 2007 Certified Organization) Vol. 2, Issue 5, May 2014. [10] Dongpo Zhang, "Big Data Security and Privacy Protection" from Advances in Computer Science Research, volume 77.