SlideShare a Scribd company logo
8/29/2015
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING
SECURITY ISSUES ASSOCIATED
WITH BIG DATA IN CLOUD
COMPUTING
Seminar Advance Topics One
Submitted By
Md.Mehedi Hassan
1/26
Supervisor
Sajjad Waheed
Associate Professor
Dept. of ICT,MBSTU
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING8/29/2015
Outline
 Introduction
 Big Data
 Why Big Data
 Cloud Computing
 How Big Data is Related with Cloud Computing
 Why Choose Big Data as a Thesis Topic
 Introduction to Hadoop
 MapReduce
 Hadoop Distributed File System(HDFS)
 Application
 Advantages of Big Data
 Alternative of Big Data
 Security Issue of Big Data
 Motivation and Related Work
 Issues and Challenges
 The Proposed Approaches
 Conclusions
2/26
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING8/29/2015
Introduction
 To analyze complex data and to identify patterns it is very important
to securely store, manage and share large amounts of complex data
(big data).
 Big data applications are a great benefit to organizations, business,
companies and many large scale and small scale industries.
 Cloud resources are needed to support big data storage and projects,
and big data is a huge business case for moving to cloud
 The main focus is on security issues in cloud computing that are
associated with big data.
3/26
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING8/29/2015
Big Data
 Big Data is the word used to describe massive volumes of structured
and unstructured data that are so large that it is very difficult to
process this data using traditional databases and software
technologies.
 Big Data Source :
4/26
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING8/29/2015
Big Data
 Volume
 Many factors contribute towards increasing Volume
storing transaction, live streaming and data
collected from sensors etc
 Variety
 Structured: Relational data.
 Semi Structured: XML data.
Unstructured: Word, PDF, Text,
Media Logs
 Velocity
 Big Data Velocity deals with the
pace at which data flows in from
sources and human interaction
5/26
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING8/29/2015
Why Big Data
 Speed, Capacity and Scalability of Cloud Storage
 End Users Can Visualize Data
 Manage Data Better
 Company Can Find New Business Opportunities
 Data Analysis Methods, Capabilities will Evolve
6/26
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING8/29/2015
Cloud Computing
 Cloud Computing is a technology which
depends on sharing of computing
resources than having local servers or
personal devices to handle the
applications.
 In Cloud Computing, the word “Cloud”
means “The Internet”, so Cloud
Computing means a type of computing in
which services are delivered through the
Internet.
7/26
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING8/29/2015
How Big Data is Related with Cloud Computing
 Cloud computing is a powerful technology to perform massive-scale and
complex computing.
 It eliminates the need to maintain expensive computing hardware,
dedicated space, and software
 Big Data need large on-demand compute power and distributed storage to
crunch the 3V data problem and Cloud seamlessly provides this elastic on-
demand
8/26
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING8/29/2015
Why Choose Big Data as a Thesis Topic
 As a software developer I have handle large volume of data for banking
transaction.
 Already observed for time consume to execute data for a particular select
statement or analytical SQL
 System is very slow when all branch are parallel processing.
 This problem over come using Big Data concept
 Already use Facebook,Goole,IBM etc.
 Open source (Hadoop)
 In this case I choose Big Data Topic
9/26
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING8/29/2015
Introduction to Hadoop
10/26
 Hadoop : Apache open source framework written in java that allows
distributed processing of large datasets across clusters of computers using
simple programming models
 Doug Cutting son’s toy
 Hadoop Architecture
Two major layers
 Processing layer :
MapReduce
 Storage layer :
Hadoop Distributed
File System
MapReduce
(Distributed Computation)
HDFS
(Distributed Storage)
YARN Framework Common Utilities
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING8/29/2015
Introduction to Hadoop (cont.)
 How Hadoop works
 Core tasks across a cluster of computers
 Data dividing into directories and files
 Files are then distributed across various cluster nodes
 HDFS, supervises the processing.
 Blocks are replicated.
 Performing sort that takes place between the map and reduce stages.
 Sending the sorted data to a certain computer.
 Advantages
 Low-cost alternative to build bigger servers
 Fault-tolerance and high availability.
 Dynamic clustering
 Automatic data distribution and open source
11/26
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING8/29/2015
MapReduce
 What is MapReduce : A processing technique and a program model for
distributed computing based on java.
 Mapper
 Shuffle
 Reducer
 Java based
 Key Value
12/26
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING8/29/2015
MapReduce (cont.)
13/26
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING8/29/2015
MapReduce Example
14/26
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING8/29/2015
Hadoop Distributed File System(HDFS)
 The HDFS is a distributed, scalable, and portable file-system written in
Java for the Hadoop framework
 Features
 Distributed storage and processing
 Name Node
 Data Node
 Interface in Hadoop
 Streaming access
 Cluster status check
15/26
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING8/29/2015
Hadoop Distributed File System(cont.)
16/26
Name Node
Meta data(Name, replica…)
/home/foo/data, 3…
Client
Blocks
Replication
Write
Meta data Ops
Read
Block Ops
D a t a n o d e s D a t a n o d e s
Rack 1 Rack 2
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING8/29/2015
Application
17/26
Homeland
Security
Smarter
Healthcare
Multi-channel
sales
Telecom
Manufacturing
Traffic Control
Trading
Analytics
Search
Quality
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING8/29/2015
Advantages of Big Data
 Cost reduction
 Faster, better decision making
 New products and services
 Perform risk analysis
18/26
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING8/29/2015
Alternative of Big Data
 Apache Spark (Less security than Hadoop)
 Cluster Map Reduce(Slow and less security than Hadoop)
19/26
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING8/29/2015
Issue and Challenge
 Network level
 Distributed Nodes
 Distributed Data
 Internodes Communication
 Authentication level
 Data Protection
 Administrative Rights for Nodes
 Authentication of Applications and Nodes
 Logging
 Data level
 Confidentiality
 Integrity
 Availability
 Generic types
 Traditional Security Tools
 Use of Different Technologies
20/26
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING8/29/2015
The Proposed Approaches
 File Encryption
 Network Encryption
 Logging
 Software Format and Node Maintenance
 Nodes Authentication
 Rigorous System Testing of Map Reduce Jobs
 Honeypot Nodes
 Layered Framework for Assuring Cloud
 Third Party Secure Data Publication to Cloud
 Access Control
21/26
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING8/29/2015
Conclusions
 I have highlighted the main advantages and application of Big data with
cloud computing .
 Summarized security issues associated with big data in cloud computing .
 Propose cloud environments can be secured for complex business
operations.
 Propose approaches for Big Data security
22/26
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING8/29/2015
Future Works
 To Implement data chaptering algorithm with data security
 Data flow Hadoop to Cloud with confidential security
23/26
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING8/29/2015
Q & A
24/26
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING8/29/2015 25/26
SECURITY ISSUES ASSOCIATED WITH BIG
DATA IN CLOUD COMPUTING8/29/2015
References
 Ren, Yulong, and Wen Tang. "A SERVICE INTEGRITY ASSURANCE
FRAMEWORK FOR CLOUD COMPUTING BASED ON
MAPREDUCE."Proceedings of IEEE CCIS2012. Hangzhou: 2012, pp 240 –
244, Oct. 30 2012-Nov. 1 2012
 Hao, Chen, and Ying Qiao. "Research of Cloud Computing based on the
Hadoop platform."Chengdu, China: 2011, pp. 181 – 184, 21-23 Oct 2011.
 N, Gonzalez, Miers C, Redigolo F, Carvalho T, Simplicio M, de Sousa G.T,
and Pourzandi M. "A Quantitative Analysis of Current Security Concerns and
Solutions for Cloud Computing.". Athens:2011., pp 231 – 238, Nov. 29 2011-
Dec. 1 2011
 Hao, Chen, and Ying Qiao. "Research of Cloud Computing based on the
Hadoop platform.".Chengdu, China: 2011, pp. 181 – 184, 21-23 Oct 2011.
26/26

More Related Content

What's hot

Hadoop technology
Hadoop technologyHadoop technology
Hadoop technology
tipanagiriharika
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
 
PPT on Hadoop
PPT on HadoopPPT on Hadoop
PPT on Hadoop
Shubham Parmar
 
Hash function
Hash function Hash function
Hash function
Salman Memon
 
GOOGLE FILE SYSTEM
GOOGLE FILE SYSTEMGOOGLE FILE SYSTEM
GOOGLE FILE SYSTEM
JYoTHiSH o.s
 
Database security
Database securityDatabase security
Database security
Software Engineering
 
Big data lecture notes
Big data lecture notesBig data lecture notes
Big data lecture notes
Mohit Saini
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
Hadoop Overview & Architecture
Hadoop Overview & Architecture  Hadoop Overview & Architecture
Hadoop Overview & Architecture
EMC
 
Feistel cipher
Feistel cipherFeistel cipher
Feistel cipher
MDKAWSARAHMEDSAGAR
 
Hadoop File system (HDFS)
Hadoop File system (HDFS)Hadoop File system (HDFS)
Hadoop File system (HDFS)
Prashant Gupta
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
Tirthika Bandi
 
Apache HBase™
Apache HBase™Apache HBase™
Apache HBase™
Prashant Gupta
 
Hadoop Map Reduce
Hadoop Map ReduceHadoop Map Reduce
Hadoop Map Reduce
VNIT-ACM Student Chapter
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
Dr. Kapil Gupta
 
Introduction to HDFS
Introduction to HDFSIntroduction to HDFS
Introduction to HDFS
Bhavesh Padharia
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer network
Disi Dc
 
5.1 mining data streams
5.1 mining data streams5.1 mining data streams
5.1 mining data streams
Krish_ver2
 
Multiversion Concurrency Control Techniques
Multiversion Concurrency Control TechniquesMultiversion Concurrency Control Techniques
Multiversion Concurrency Control Techniques
Raj vardhan
 
Developing a Map Reduce Application
Developing a Map Reduce ApplicationDeveloping a Map Reduce Application
Developing a Map Reduce Application
Dr. C.V. Suresh Babu
 

What's hot (20)

Hadoop technology
Hadoop technologyHadoop technology
Hadoop technology
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
PPT on Hadoop
PPT on HadoopPPT on Hadoop
PPT on Hadoop
 
Hash function
Hash function Hash function
Hash function
 
GOOGLE FILE SYSTEM
GOOGLE FILE SYSTEMGOOGLE FILE SYSTEM
GOOGLE FILE SYSTEM
 
Database security
Database securityDatabase security
Database security
 
Big data lecture notes
Big data lecture notesBig data lecture notes
Big data lecture notes
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Hadoop Overview & Architecture
Hadoop Overview & Architecture  Hadoop Overview & Architecture
Hadoop Overview & Architecture
 
Feistel cipher
Feistel cipherFeistel cipher
Feistel cipher
 
Hadoop File system (HDFS)
Hadoop File system (HDFS)Hadoop File system (HDFS)
Hadoop File system (HDFS)
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
 
Apache HBase™
Apache HBase™Apache HBase™
Apache HBase™
 
Hadoop Map Reduce
Hadoop Map ReduceHadoop Map Reduce
Hadoop Map Reduce
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
Introduction to HDFS
Introduction to HDFSIntroduction to HDFS
Introduction to HDFS
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer network
 
5.1 mining data streams
5.1 mining data streams5.1 mining data streams
5.1 mining data streams
 
Multiversion Concurrency Control Techniques
Multiversion Concurrency Control TechniquesMultiversion Concurrency Control Techniques
Multiversion Concurrency Control Techniques
 
Developing a Map Reduce Application
Developing a Map Reduce ApplicationDeveloping a Map Reduce Application
Developing a Map Reduce Application
 

Viewers also liked

Security issues associated with big data in cloud
Security issues associated  with big data in cloudSecurity issues associated  with big data in cloud
Security issues associated with big data in cloud
sornalathaNatarajan
 
Big data security
Big data securityBig data security
Big data security
Joey Echeverria
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
Michael C. Keeling, Esq.
 
Big Data: Issues and Challenges
Big Data: Issues and ChallengesBig Data: Issues and Challenges
Big Data: Issues and Challenges
Harsh Kishore Mishra
 
Issue with Internet in college (Computer Security and Cyber Law)
Issue with Internet in college (Computer Security and Cyber Law)Issue with Internet in college (Computer Security and Cyber Law)
Issue with Internet in college (Computer Security and Cyber Law)
Govinda Aryal
 
Solve Big Data Security Issues
Solve Big Data Security IssuesSolve Big Data Security Issues
Solve Big Data Security Issues
Editor IJCATR
 
security issue
security issuesecurity issue
security issue
JAINIK PATEL
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect storm
Ulf Mattsson
 
Single Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud ComputingSingle Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud Computing
Rahul Roshan
 
SKILLWISE-BIGDATA ANALYSIS
SKILLWISE-BIGDATA ANALYSISSKILLWISE-BIGDATA ANALYSIS
SKILLWISE-BIGDATA ANALYSIS
Skillwise Consulting
 
Journal of Network Security vol 4 issue 3
Journal of Network Security vol 4 issue 3Journal of Network Security vol 4 issue 3
Journal of Network Security vol 4 issue 3
STM Journals
 
Fp12_Efficient_SCM
Fp12_Efficient_SCMFp12_Efficient_SCM
Fp12_Efficient_SCM
Md. Al-Amin Khandaker Nipu
 
Socket programing
Socket programingSocket programing
Socket programing
Pankil Agrawal
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1
Omkar Salunke
 
Big Data Analysis : Deciphering the haystack
Big Data Analysis : Deciphering the haystack Big Data Analysis : Deciphering the haystack
Big Data Analysis : Deciphering the haystack
Srinath Perera
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issue
sommerville-videos
 
Age verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solutionAge verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solution
Aboul Ella Hassanien
 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
ranjit banshpal
 
Gsm based smart card information for lost atm cards
Gsm based smart card information for lost atm cardsGsm based smart card information for lost atm cards
Gsm based smart card information for lost atm cards
Somanchi Aditya
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for Authentication
AnIsh Kumar
 

Viewers also liked (20)

Security issues associated with big data in cloud
Security issues associated  with big data in cloudSecurity issues associated  with big data in cloud
Security issues associated with big data in cloud
 
Big data security
Big data securityBig data security
Big data security
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
 
Big Data: Issues and Challenges
Big Data: Issues and ChallengesBig Data: Issues and Challenges
Big Data: Issues and Challenges
 
Issue with Internet in college (Computer Security and Cyber Law)
Issue with Internet in college (Computer Security and Cyber Law)Issue with Internet in college (Computer Security and Cyber Law)
Issue with Internet in college (Computer Security and Cyber Law)
 
Solve Big Data Security Issues
Solve Big Data Security IssuesSolve Big Data Security Issues
Solve Big Data Security Issues
 
security issue
security issuesecurity issue
security issue
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect storm
 
Single Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud ComputingSingle Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud Computing
 
SKILLWISE-BIGDATA ANALYSIS
SKILLWISE-BIGDATA ANALYSISSKILLWISE-BIGDATA ANALYSIS
SKILLWISE-BIGDATA ANALYSIS
 
Journal of Network Security vol 4 issue 3
Journal of Network Security vol 4 issue 3Journal of Network Security vol 4 issue 3
Journal of Network Security vol 4 issue 3
 
Fp12_Efficient_SCM
Fp12_Efficient_SCMFp12_Efficient_SCM
Fp12_Efficient_SCM
 
Socket programing
Socket programingSocket programing
Socket programing
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1
 
Big Data Analysis : Deciphering the haystack
Big Data Analysis : Deciphering the haystack Big Data Analysis : Deciphering the haystack
Big Data Analysis : Deciphering the haystack
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issue
 
Age verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solutionAge verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solution
 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
 
Gsm based smart card information for lost atm cards
Gsm based smart card information for lost atm cardsGsm based smart card information for lost atm cards
Gsm based smart card information for lost atm cards
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for Authentication
 

Similar to Big Data (security Issue)

BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD
BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD
BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD
IJNSA Journal
 
Big data security and privacy issues in the
Big data security and privacy issues in theBig data security and privacy issues in the
Big data security and privacy issues in the
IJNSA Journal
 
Sycamore Quantum Computer 2019 developed.pptx
Sycamore Quantum Computer 2019 developed.pptxSycamore Quantum Computer 2019 developed.pptx
Sycamore Quantum Computer 2019 developed.pptx
shujee381
 
Cloud Computing & Big Data
Cloud Computing & Big DataCloud Computing & Big Data
Cloud Computing & Big Data
Mrinal Kumar
 
IRJET- Secured Hadoop Environment
IRJET- Secured Hadoop EnvironmentIRJET- Secured Hadoop Environment
IRJET- Secured Hadoop Environment
IRJET Journal
 
Big Data on Public Cloud
Big Data on Public CloudBig Data on Public Cloud
Big Data on Public Cloud
IMC Institute
 
Fundamental question and answer in cloud computing quiz by animesh chaturvedi
Fundamental question and answer in cloud computing quiz by animesh chaturvediFundamental question and answer in cloud computing quiz by animesh chaturvedi
Fundamental question and answer in cloud computing quiz by animesh chaturvedi
Animesh Chaturvedi
 
Cloud and Bid data Dr.VK.pdf
Cloud and Bid data Dr.VK.pdfCloud and Bid data Dr.VK.pdf
Cloud and Bid data Dr.VK.pdf
kalai75
 
A scalabl e and cost effective framework for privacy preservation over big d...
A  scalabl e and cost effective framework for privacy preservation over big d...A  scalabl e and cost effective framework for privacy preservation over big d...
A scalabl e and cost effective framework for privacy preservation over big d...
amna alhabib
 
BIG DATA
BIG DATABIG DATA
BIG DATA
Shashank Shetty
 
Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...
Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...
Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...
IRJET Journal
 
A Comprehensive Study on Big Data Applications and Challenges
A Comprehensive Study on Big Data Applications and ChallengesA Comprehensive Study on Big Data Applications and Challenges
A Comprehensive Study on Big Data Applications and Challenges
ijcisjournal
 
Top ten big data security and privacy challenges
Top ten big data security and privacy challengesTop ten big data security and privacy challenges
Top ten big data security and privacy challenges
Bee_Ware
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challenges
Tom Kirby
 
High level view of cloud security
High level view of cloud securityHigh level view of cloud security
High level view of cloud security
csandit
 
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONS
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONSHIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONS
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONS
cscpconf
 
Sdn in big data
Sdn in big dataSdn in big data
Sdn in big data
ahmed kassab
 
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudNo More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
PaaSword EU Project
 
Solving Big Data Problems
Solving Big Data ProblemsSolving Big Data Problems
Solving Big Data Problems
Evaluator Group
 
Big Data Performance and Capacity Management
Big Data Performance and Capacity ManagementBig Data Performance and Capacity Management
Big Data Performance and Capacity Management
rightsize
 

Similar to Big Data (security Issue) (20)

BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD
BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD
BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD
 
Big data security and privacy issues in the
Big data security and privacy issues in theBig data security and privacy issues in the
Big data security and privacy issues in the
 
Sycamore Quantum Computer 2019 developed.pptx
Sycamore Quantum Computer 2019 developed.pptxSycamore Quantum Computer 2019 developed.pptx
Sycamore Quantum Computer 2019 developed.pptx
 
Cloud Computing & Big Data
Cloud Computing & Big DataCloud Computing & Big Data
Cloud Computing & Big Data
 
IRJET- Secured Hadoop Environment
IRJET- Secured Hadoop EnvironmentIRJET- Secured Hadoop Environment
IRJET- Secured Hadoop Environment
 
Big Data on Public Cloud
Big Data on Public CloudBig Data on Public Cloud
Big Data on Public Cloud
 
Fundamental question and answer in cloud computing quiz by animesh chaturvedi
Fundamental question and answer in cloud computing quiz by animesh chaturvediFundamental question and answer in cloud computing quiz by animesh chaturvedi
Fundamental question and answer in cloud computing quiz by animesh chaturvedi
 
Cloud and Bid data Dr.VK.pdf
Cloud and Bid data Dr.VK.pdfCloud and Bid data Dr.VK.pdf
Cloud and Bid data Dr.VK.pdf
 
A scalabl e and cost effective framework for privacy preservation over big d...
A  scalabl e and cost effective framework for privacy preservation over big d...A  scalabl e and cost effective framework for privacy preservation over big d...
A scalabl e and cost effective framework for privacy preservation over big d...
 
BIG DATA
BIG DATABIG DATA
BIG DATA
 
Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...
Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...
Privacy Preserving Data Analytics using Cryptographic Technique for Large Dat...
 
A Comprehensive Study on Big Data Applications and Challenges
A Comprehensive Study on Big Data Applications and ChallengesA Comprehensive Study on Big Data Applications and Challenges
A Comprehensive Study on Big Data Applications and Challenges
 
Top ten big data security and privacy challenges
Top ten big data security and privacy challengesTop ten big data security and privacy challenges
Top ten big data security and privacy challenges
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challenges
 
High level view of cloud security
High level view of cloud securityHigh level view of cloud security
High level view of cloud security
 
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONS
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONSHIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONS
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONS
 
Sdn in big data
Sdn in big dataSdn in big data
Sdn in big data
 
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudNo More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
 
Solving Big Data Problems
Solving Big Data ProblemsSolving Big Data Problems
Solving Big Data Problems
 
Big Data Performance and Capacity Management
Big Data Performance and Capacity ManagementBig Data Performance and Capacity Management
Big Data Performance and Capacity Management
 

More from Export Promotion Bureau

Advance Technology
Advance TechnologyAdvance Technology
Advance Technology
Export Promotion Bureau
 
16.psc.pdf
16.psc.pdf16.psc.pdf
Advance Technology
Advance TechnologyAdvance Technology
Advance Technology
Export Promotion Bureau
 
8.Information Security
8.Information Security8.Information Security
8.Information Security
Export Promotion Bureau
 
14.Linux Command
14.Linux Command14.Linux Command
14.Linux Command
Export Promotion Bureau
 
12.Digital Logic.pdf
12.Digital Logic.pdf12.Digital Logic.pdf
12.Digital Logic.pdf
Export Promotion Bureau
 
11.Object Oriented Programming.pdf
11.Object Oriented Programming.pdf11.Object Oriented Programming.pdf
11.Object Oriented Programming.pdf
Export Promotion Bureau
 
9.C Programming
9.C Programming9.C Programming
9.C Programming
Export Promotion Bureau
 
4.Database Management System.pdf
4.Database Management System.pdf4.Database Management System.pdf
4.Database Management System.pdf
Export Promotion Bureau
 
Lab Question
Lab QuestionLab Question
DMZ
DMZDMZ
loopback address
loopback addressloopback address
loopback address
Export Promotion Bureau
 
Race Condition
Race Condition Race Condition
Race Condition
Export Promotion Bureau
 
BCS (WRITTEN) EXAMINATION.pptx
BCS (WRITTEN) EXAMINATION.pptxBCS (WRITTEN) EXAMINATION.pptx
BCS (WRITTEN) EXAMINATION.pptx
Export Promotion Bureau
 
Nothi_update.pptx
Nothi_update.pptxNothi_update.pptx
Nothi_update.pptx
Export Promotion Bureau
 
word_power_point_update.pptx
word_power_point_update.pptxword_power_point_update.pptx
word_power_point_update.pptx
Export Promotion Bureau
 
ICT-Cell.pptx
ICT-Cell.pptxICT-Cell.pptx
Incoterms.pptx
Incoterms.pptxIncoterms.pptx
Incoterms.pptx
Export Promotion Bureau
 
EPB-Flow-Chart.pptx
EPB-Flow-Chart.pptxEPB-Flow-Chart.pptx
EPB-Flow-Chart.pptx
Export Promotion Bureau
 
Subnetting.pptx
Subnetting.pptxSubnetting.pptx
Subnetting.pptx
Export Promotion Bureau
 

More from Export Promotion Bureau (20)

Advance Technology
Advance TechnologyAdvance Technology
Advance Technology
 
16.psc.pdf
16.psc.pdf16.psc.pdf
16.psc.pdf
 
Advance Technology
Advance TechnologyAdvance Technology
Advance Technology
 
8.Information Security
8.Information Security8.Information Security
8.Information Security
 
14.Linux Command
14.Linux Command14.Linux Command
14.Linux Command
 
12.Digital Logic.pdf
12.Digital Logic.pdf12.Digital Logic.pdf
12.Digital Logic.pdf
 
11.Object Oriented Programming.pdf
11.Object Oriented Programming.pdf11.Object Oriented Programming.pdf
11.Object Oriented Programming.pdf
 
9.C Programming
9.C Programming9.C Programming
9.C Programming
 
4.Database Management System.pdf
4.Database Management System.pdf4.Database Management System.pdf
4.Database Management System.pdf
 
Lab Question
Lab QuestionLab Question
Lab Question
 
DMZ
DMZDMZ
DMZ
 
loopback address
loopback addressloopback address
loopback address
 
Race Condition
Race Condition Race Condition
Race Condition
 
BCS (WRITTEN) EXAMINATION.pptx
BCS (WRITTEN) EXAMINATION.pptxBCS (WRITTEN) EXAMINATION.pptx
BCS (WRITTEN) EXAMINATION.pptx
 
Nothi_update.pptx
Nothi_update.pptxNothi_update.pptx
Nothi_update.pptx
 
word_power_point_update.pptx
word_power_point_update.pptxword_power_point_update.pptx
word_power_point_update.pptx
 
ICT-Cell.pptx
ICT-Cell.pptxICT-Cell.pptx
ICT-Cell.pptx
 
Incoterms.pptx
Incoterms.pptxIncoterms.pptx
Incoterms.pptx
 
EPB-Flow-Chart.pptx
EPB-Flow-Chart.pptxEPB-Flow-Chart.pptx
EPB-Flow-Chart.pptx
 
Subnetting.pptx
Subnetting.pptxSubnetting.pptx
Subnetting.pptx
 

Recently uploaded

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

Big Data (security Issue)

  • 1. 8/29/2015 SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING Seminar Advance Topics One Submitted By Md.Mehedi Hassan 1/26 Supervisor Sajjad Waheed Associate Professor Dept. of ICT,MBSTU
  • 2. SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING8/29/2015 Outline  Introduction  Big Data  Why Big Data  Cloud Computing  How Big Data is Related with Cloud Computing  Why Choose Big Data as a Thesis Topic  Introduction to Hadoop  MapReduce  Hadoop Distributed File System(HDFS)  Application  Advantages of Big Data  Alternative of Big Data  Security Issue of Big Data  Motivation and Related Work  Issues and Challenges  The Proposed Approaches  Conclusions 2/26
  • 3. SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING8/29/2015 Introduction  To analyze complex data and to identify patterns it is very important to securely store, manage and share large amounts of complex data (big data).  Big data applications are a great benefit to organizations, business, companies and many large scale and small scale industries.  Cloud resources are needed to support big data storage and projects, and big data is a huge business case for moving to cloud  The main focus is on security issues in cloud computing that are associated with big data. 3/26
  • 4. SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING8/29/2015 Big Data  Big Data is the word used to describe massive volumes of structured and unstructured data that are so large that it is very difficult to process this data using traditional databases and software technologies.  Big Data Source : 4/26
  • 5. SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING8/29/2015 Big Data  Volume  Many factors contribute towards increasing Volume storing transaction, live streaming and data collected from sensors etc  Variety  Structured: Relational data.  Semi Structured: XML data. Unstructured: Word, PDF, Text, Media Logs  Velocity  Big Data Velocity deals with the pace at which data flows in from sources and human interaction 5/26
  • 6. SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING8/29/2015 Why Big Data  Speed, Capacity and Scalability of Cloud Storage  End Users Can Visualize Data  Manage Data Better  Company Can Find New Business Opportunities  Data Analysis Methods, Capabilities will Evolve 6/26
  • 7. SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING8/29/2015 Cloud Computing  Cloud Computing is a technology which depends on sharing of computing resources than having local servers or personal devices to handle the applications.  In Cloud Computing, the word “Cloud” means “The Internet”, so Cloud Computing means a type of computing in which services are delivered through the Internet. 7/26
  • 8. SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING8/29/2015 How Big Data is Related with Cloud Computing  Cloud computing is a powerful technology to perform massive-scale and complex computing.  It eliminates the need to maintain expensive computing hardware, dedicated space, and software  Big Data need large on-demand compute power and distributed storage to crunch the 3V data problem and Cloud seamlessly provides this elastic on- demand 8/26
  • 9. SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING8/29/2015 Why Choose Big Data as a Thesis Topic  As a software developer I have handle large volume of data for banking transaction.  Already observed for time consume to execute data for a particular select statement or analytical SQL  System is very slow when all branch are parallel processing.  This problem over come using Big Data concept  Already use Facebook,Goole,IBM etc.  Open source (Hadoop)  In this case I choose Big Data Topic 9/26
  • 10. SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING8/29/2015 Introduction to Hadoop 10/26  Hadoop : Apache open source framework written in java that allows distributed processing of large datasets across clusters of computers using simple programming models  Doug Cutting son’s toy  Hadoop Architecture Two major layers  Processing layer : MapReduce  Storage layer : Hadoop Distributed File System MapReduce (Distributed Computation) HDFS (Distributed Storage) YARN Framework Common Utilities
  • 11. SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING8/29/2015 Introduction to Hadoop (cont.)  How Hadoop works  Core tasks across a cluster of computers  Data dividing into directories and files  Files are then distributed across various cluster nodes  HDFS, supervises the processing.  Blocks are replicated.  Performing sort that takes place between the map and reduce stages.  Sending the sorted data to a certain computer.  Advantages  Low-cost alternative to build bigger servers  Fault-tolerance and high availability.  Dynamic clustering  Automatic data distribution and open source 11/26
  • 12. SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING8/29/2015 MapReduce  What is MapReduce : A processing technique and a program model for distributed computing based on java.  Mapper  Shuffle  Reducer  Java based  Key Value 12/26
  • 13. SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING8/29/2015 MapReduce (cont.) 13/26
  • 14. SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING8/29/2015 MapReduce Example 14/26
  • 15. SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING8/29/2015 Hadoop Distributed File System(HDFS)  The HDFS is a distributed, scalable, and portable file-system written in Java for the Hadoop framework  Features  Distributed storage and processing  Name Node  Data Node  Interface in Hadoop  Streaming access  Cluster status check 15/26
  • 16. SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING8/29/2015 Hadoop Distributed File System(cont.) 16/26 Name Node Meta data(Name, replica…) /home/foo/data, 3… Client Blocks Replication Write Meta data Ops Read Block Ops D a t a n o d e s D a t a n o d e s Rack 1 Rack 2
  • 17. SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING8/29/2015 Application 17/26 Homeland Security Smarter Healthcare Multi-channel sales Telecom Manufacturing Traffic Control Trading Analytics Search Quality
  • 18. SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING8/29/2015 Advantages of Big Data  Cost reduction  Faster, better decision making  New products and services  Perform risk analysis 18/26
  • 19. SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING8/29/2015 Alternative of Big Data  Apache Spark (Less security than Hadoop)  Cluster Map Reduce(Slow and less security than Hadoop) 19/26
  • 20. SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING8/29/2015 Issue and Challenge  Network level  Distributed Nodes  Distributed Data  Internodes Communication  Authentication level  Data Protection  Administrative Rights for Nodes  Authentication of Applications and Nodes  Logging  Data level  Confidentiality  Integrity  Availability  Generic types  Traditional Security Tools  Use of Different Technologies 20/26
  • 21. SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING8/29/2015 The Proposed Approaches  File Encryption  Network Encryption  Logging  Software Format and Node Maintenance  Nodes Authentication  Rigorous System Testing of Map Reduce Jobs  Honeypot Nodes  Layered Framework for Assuring Cloud  Third Party Secure Data Publication to Cloud  Access Control 21/26
  • 22. SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING8/29/2015 Conclusions  I have highlighted the main advantages and application of Big data with cloud computing .  Summarized security issues associated with big data in cloud computing .  Propose cloud environments can be secured for complex business operations.  Propose approaches for Big Data security 22/26
  • 23. SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING8/29/2015 Future Works  To Implement data chaptering algorithm with data security  Data flow Hadoop to Cloud with confidential security 23/26
  • 24. SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING8/29/2015 Q & A 24/26
  • 25. SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING8/29/2015 25/26
  • 26. SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING8/29/2015 References  Ren, Yulong, and Wen Tang. "A SERVICE INTEGRITY ASSURANCE FRAMEWORK FOR CLOUD COMPUTING BASED ON MAPREDUCE."Proceedings of IEEE CCIS2012. Hangzhou: 2012, pp 240 – 244, Oct. 30 2012-Nov. 1 2012  Hao, Chen, and Ying Qiao. "Research of Cloud Computing based on the Hadoop platform."Chengdu, China: 2011, pp. 181 – 184, 21-23 Oct 2011.  N, Gonzalez, Miers C, Redigolo F, Carvalho T, Simplicio M, de Sousa G.T, and Pourzandi M. "A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing.". Athens:2011., pp 231 – 238, Nov. 29 2011- Dec. 1 2011  Hao, Chen, and Ying Qiao. "Research of Cloud Computing based on the Hadoop platform.".Chengdu, China: 2011, pp. 181 – 184, 21-23 Oct 2011. 26/26