Question:
Discuss About The Current Situation The Information Technology World?
Big Data generally refers to the gathering of huge amount of data sets and complex information. In this current situation the information technology world there we can see an issue where these technologies are exceeding the existing storage, communicational and computational capacities of conventional systems [1]. There are various techniques to connect to people or organization by the use of internet or any other conventional way. The technique and information that helps in connecting, is incrementing in a huge rate and volume. But this rapid increase is also creating a concern about the privacy and security issues of the data. Based on the networking system and hierarchical models the database system has also advanced its area of use to the relational and objective database system [15]. By the implementation of web sources these database can also be accessed via data or web management services. Since there is a great concern about the security and privacy of these network systems, it is important to know the aspects of theses security concerns.
In this report we are going to review and research about the privacy and security issues in domain of Big Data and IoT (Internet of Things).
Big Data is the set of complex and large data that the traditional data processing software applications lack capability to handle. Big Data is mainly used to increase the storage capability and increase the processing power [2]. It is more complex and includes challenges like storage, analysis, data capturing, transfer files, sharing, visualization, querying, updating information and privacy. Knowledge management in Big Data has three main functionalities Volume, Variety and Velocity. Recently two more V’s has been included Values and Variability. There are several kind of tools in Big Data analysis like NoSQ, MapReduce that includes Hadoop, S3 storage, Servers and Processing. But as the benefits rises there is a constant introduction of new and vulnerable [3]. Three has been a rise in the security concern in each of these different domains. There are privacy and security issues of Big Data by the following aspects:
Similarly, IoT refers to the communication paradigm that is recently envisioned as one of the most vital part of everyday life. It is the network of networks which gives value added service and in which a lot of massive objects, sensor devices and digital devices are connected through the ICT (Information Communications Technology) infrastructure. The IoT gathers data and information at anytime and at anyplace, related to anyone and anything, initially implementing at the path of network and services [4]. There are privacy and security issues of Internet of things by the following aspects:
Consumers those uses free online services like social networking, emails, websites etc. are aware of the fact that consequently they become the part of the online service and hence become the data source for the organizational business. This helps in analyzing of data sources and improves the satisfaction of the customers. Here is where the conflict comes when these data are sold to third party for further analysis without the concern of the security and online service privacy of the customers [14].
The number of user’s data that are gathered has to be significantly larger from the past collection gathered. Some of these technologies can gather such sensitive information of customers by analyzing the daily activities that may range from the health conditions to financial records.
There are several security issues regarding Big Data and IoT [5]:
There is requirement of approximation in this real world since the analyzing and data collection tools have security aspect that has been functionally stored in the technology. The deployment of Security and Information Event Management (SIEM) solution is vital to aggregated logs in security system and the automatic identification of potential breaches. Hadoop is another simple way to identify the big data security and privacy issues [6]. Thus, Hadoop has become one of the most popularly used technologies to address breaches. There has been a range of security leading solutions that has been provided to evolve the technologies which are ideally commercial grade that to help the lock down process. These systems are generally added together by the open source contributors, for example Apache Accumulo. Therefore, by the introduction of Hadoop in Big Data security system, the remaining techniques that can be used are the authentication check and encryption [7].
IoT is a system comprising of physical gadgets, which are additionally embedded with sensors, hardware, and programming, in this way enabling these gadgets to trade information [9]. This at last permits better joining between genuine physical substances and PC worked frameworks. IoT is the following huge thing affecting our lives in significant ways and number of elements. Innovations like Column-arranged databases, SQL in Hadoop, Hive, Wibidata, PLATFORA, SkyTree, Storage Technologies, Schema-less databases, or NoSQL databases, Streaming Big Data investigation, Big Information Lambda Architecture, Map-lessen, PIG, and so on., helps in managing the huge measure of information created by IoT and different sources. Real difficulties that can bring ground breaking prizes when they are fathomed:
The above focuses are a portion of the difficulties that IoT huge information faces. The rate in information development in extending each second, stockpiling in a major test, handling and keeping up is significantly more repetitive [11]. The apparatuses that are created to deal with the two innovations are step by step changing as per the requirement.
Conclusion
Associations must guarantee that every enormous datum bases are resistant to security dangers and vulnerabilities. Amid information accumulation, all the fundamental security insurances, for example, ongoing administration ought to be satisfied. There is a requirement to work together on advancing the standards and practice to identify the threats and security issues regarding Big Data and Internet of things. Since IoT has the requirement of being developed from level for safety, thus has to be tested. There are a couple of territories of concern and security and protection and information gathering productivity are likely the most troublesome issues we are confronting. Remembering the enormous size of huge information, associations ought to recollect the way that overseeing such information could be troublesome and requires remarkable endeavors. Be that as it may, making every one of these strides would help keep up purchaser security. There is a need of developers to work along with the manufacturers to ensure the security at highest priority. So protecting the customers and organization has to be the primary concern not the second thought. This report is a survey about the IoT and Big information security system, the effects of IoT on enormous information, the huge information advances and the challenges. Since there is a noteworthy effect of IoT on enormous information we have to rapidly collected, total structure to deal with the day by day evolving conditions. Security bargain and wasteful aspects in information gathering instruments result in lost status, cash, time and exertion. Yet, there is trust in light of the fact that both the IoT and the enormous information are at a developing stage and there will be redesign
Reference
[1]M. Conti, A. Dehghantanha, K. Franke and S. Watson, “Internet of Things security and forensics: Challenges and opportunities”, Future Generation Computer Systems, 2017.
[2]G. Newe, “Delivering the Internet of Things”, Network Security, vol. 2015, no. 3, pp. 18-20, 2015.
[3]K. Sood, S. Yu and Y. Xiang, “Software-Defined Wireless Networking Opportunities and Challenges for Internet-of-Things: A Review”, IEEE Internet of Things Journal, vol. 3, no. 4, pp. 453-463, 2016.
[4]J. Ziegeldorf, O. Morchon and K. Wehrle, “Privacy in the Internet of Things: threats and challenges”, Security and Communication Networks, vol. 7, no. 12, pp. 2728-2742, 2013.
[5]M. Hussain, “Internet of Things: challenges and research opportunities”, CSI Transactions on ICT, vol. 5, no. 1, pp. 87-95, 2016.
[6]”Lack of security in Internet of Things devices”, Network Security, vol. 2014, no. 8, p. 2, 2014.
[7]J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang and W. Zhao, “A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications”, IEEE Internet of Things Journal, pp. 1-1, 2017.
[8]M. Eltayeb, “Internet of Things”, International Journal of Hyperconnectivity and the Internet of Things, vol. 1, no. 1, pp. 1-18, 2017.
[9]C. Tankard, “Big data security”, Network Security, vol. 2012, no. 7, pp. 5-8, 2012.
[10]G. Lafuente, “The big data security challenge”, Network Security, vol. 2015, no. 1, pp. 12-14, 2015.
[11]T. Win, H. Tianfield and Q. Mair, “Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing”, IEEE Transactions on Big Data, pp. 1-1, 2017.
[12]C. Constantine, “Big data: an information security context”, Network Security, vol. 2014, no. 1, pp. 18-19, 2014.
[13]C. Everett, “Big data – the future of cyber-security or its latest threat?”, Computer Fraud & Security, vol. 2015, no. 9, pp. 14-17, 2015.
[14]R. Kemp, “Legal aspects of managing Big Data”, Computer Law & Security Review, vol. 30, no. 5, pp. 482-491, 2014.
[15]H. Hassan, L. Yang and M. Qiu, “Special issue on Big Data Security and Intelligent Data in Clouds (BDS-IDC)”, Concurrency and Computation: Practice and Experience, vol. 29, no. 14, p. e4215, 2017.
[16]”Using big data to reduce security risks”, Computer Fraud & Security, vol. 2012, no. 8, p. 3, 2012.
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.