Discuss about the Security and Privacy Issues in Big Data Analytics.
Everything in today’s technological world is incomplete without data. Innovation in technology has altered the very definition of information and its aspects. Data is the raw and unprocessed form of information. Big Data is a term used to define the heaps of data used to analyze patterns and other statistical information for strategical purpose in variety of organizations. Data mining technology and its advancements has brought a revolution and is the genesis of Big Data (Kshetri 2014). It has its advantages and challenges. Big Data and its analysis has quite a number of challenges that are to be faced to keep it secure and private for the use of targeted entities. In this review, the concerns and its remedies are discussed in relation with the Big Data and its security in the network. Discussion of every aspect of security of Big Data analysis is provided in a very precise manner.
Big Data technology is different from the previously data mining and processing techniques. It allows larger amount of data to be processed at one time. This technique differs in three ways from the previous methods such as the conversion and transmission rate of data, types of data that is processed and the amount of data to be processed. This technology is advanced in way so that it can connect and accept data from different sources and in different formats. Analysis of data helps the organizations to make deductions, draw conclusions and predict market behavior. Cloud computing has also proven to be a vital platform for the storage, processing and collection of data (Moura and Serrão 2016). It is much easier to mine data available on the cloud because it is connected to the internet. The success of Big Data can be credited by the software Apache Hadoop. This software platforms helps Big Data to be collected and stored in clusters which makes it easier to process and analyze. It is scalable to use as it can access thousands of severs and its threads from one system (Moreno, Serrano and Fernández-Medina 2016).
Mapping study of the software is done in four stages that gives a comprehensive idea of how the data is scaled thorough different systems in a network of systems. The phases involved are:-
Questions of research: During the exploration of questioning methods it is found that issues related to objectives and other security dimensions are adhered to in some methodologies developed previously to counter these problems (Moreno, Serrano and Fernández-Medina 2016).
Methods of research: Different online libraries are searched and are used as methods. These libraries are Digital Library of IEEE, ACM, and SCOPUS.
Analysis of data: Data that is collected from different sources and filtered on certain parameters so that it can result in the targeted statistic development.
Data Interpretation: The data that is mined and processed is used for interpretation by different organizations and for different processes (Moreno, Serrano and Fernández-Medina 2016).
In spite of the advancements and features provided by the data mining technology, many technocrats are quite concerned about the security of this amount of large data, its privacy and its application. A heap of data contains many types of private data of the individuals that can prove detrimental to the people if leaked of made public. In acquiring these types of data, unauthorized access is done and undesirable procurement is executed. In this process the privacy of an individual in breached without his consent which calls for a serious issue of data security. To deal with such an issue a new technology in compliance with data mining has been developed which is privacy preserving data mining (PPDM) (Kshetri 2014). This technology aims at non-disclosure of data and to retain the application of data in the desired manner.There are two aspects of PPDM in data security. One deals with the privacy of sensitive individual’s data such as social security number, bank details user id and passwords. Another one deals with the analytical results of the large amount of data whose leakage can lead to serious security consequences (Xu et al. 2014).
According to Xu et al. (2014), privacy protection and its approaches are as follows:
Increased risk of leakage of information: Data range and coverage in cyber space is unfathomable. Increased number of social networking sites and email services has exponentially increased the amount of data. As these details are personal, risk of leakage is huge. In data mining different types of data such as business transactions, classified government records. Two very important facets of information is derived from sources such as personal data and national data. Personal data can cause damage to individuals or group of persons in a very effective way. Data mining and Big Data provides innumerable facilities to the consumers and people using technology but can also cause grievous consequences if leaked or got in wrong hands (Thayananthan and Albeshri 2015). Personal information such as house address, telephone number, credit card details, emails accounts, passwords and one time passwords are some that can be exemplified. Leakage of these information can cause serious economic consequences to the affected person. Coming to the national security issue related with the data one can observe that automation of all the government agencies has been done rapidly. Due to this, government records and sensitive information is uploaded on the internet which automatically makes it vulnerable to leakage and disclosure. Defense records and other data of various departments are available for the taking to hackers and interested parties. This raises serious concern on the front of national security (Mengke et al. 2016).
According to Mengke et al. (2016), security platform of big data can be divided into five layers that are listed below:
These five layers of Big Data Security also includes the application of the collected data.
As discussed above, Big Data contains variety of data from sources that are very much valuable to be oozed out in the hands of unwanted sources. Big data combined with cloud computing mechanisms are distributed in different layers. These layers are of application, hardware, network, business process, database and operation. Moreover, cloud computing provides its certain privileged assistance in the face of elastic storage, elastic computing, elastic networks, BPaaS, virtualization and AaaS. These processes and methods assists Big Data with the following facilities of faster decision making, Cost of DB License, Running of simulations, Scaling in and out, Reducing intensity of IT and running of environments (Gholami and Laure 2016).
As per Ahmed and Saeed (2014) Cloud computing structure that deals with the Big Data comprises of three stages:
Modeling: This model counters with the data-leakage and other attacks of the cyber space which targets the most vulnerable points of the storage.
Analysis: This is done to figure out the possibilities to avoid threats that have been made before.
Implementation: Application of the security models in the structure of cloud.
Cloud computing has certain security mechanisms that are mentioned as follows:
Security of Infrastructure:
Data Privacy:
Management of Data:
Reactive Security and Integrity.
Certain core technologies have been developed to provide security and privacy to Big Data:
Conclusion:
From the above review, it can be established that Big Data and its analytics has certain issues that needs to be taken care of for the security and privacy of consumers. A lot can be at stake if the data used for storage and analysis gets leaked or disclosed. The privacy issues and steps taken to remove the problems are stated in the review that will provide solution for some major issues. Since internet is an open arena for everyone, it is highly unlikely to assume that the data can be completely secured. There are many entities who can breach the security of data if intended to. The review also states the collaboration of cloud computing techniques with Big Data and how it affects the storage, collection and analysis of the Big Data. It has proved to be the base on which Big Data technology has advanced its features to some extent. Since the cloud computing supports Big Data, security of cloud is also of utmost importance. It has certain security mechanism of its own which are discussed above. Size of Big Data, time taken for analysis of the data and application of data in personal and public uses are also discussed in details. Thus it can be concluded that this cocktail of technology is turning tables in the recent IT segment.
Research works regarding this topic can be done more efficiently by targeting a Big Data Analytical company based on Cloud Computing. The real-time observations of problems that occur in the data collection, storage and analysis can be done with greater transparency. Taking a test subject of a Big Data division, each and every facet of security breach can be applied and tested for its resilience so that other problems and weak spots of the security mechanism can be clearly identified.
References:
Ahmed, E.S.A. and Saeed, R.A., 2014. A Survey of Big Data Cloud Computing Security. International Journal of Computer Science and Software Engineering (IJCSSE), 3(1), pp.78-85.
Gholami, A. and Laure, E., 2016. Big data security and privacy issues in the cloud. International Journal of Network Security & Its Applications (IJNSA), Issue January.
Kshetri, N., 2014. Big data׳ s impact on privacy, security and consumer welfare. Telecommunications Policy, 38(11), pp.1134-1145.
Mengke, Y., Xiaoguang, Z., Jianqiu, Z. and Jianjian, X., 2016. Challenges and solutions of information security issues in the age of big data. China Communications, 13(3), pp.193-202.
Moreno, J., Serrano, M.A. and Fernández-Medina, E., 2016. Main Issues in Big Data Security. Future Internet, 8(3), p.44.
Moura, J. and Serrão, C., 2016. Security and privacy issues of big data.arXiv preprint arXiv:1601.06206.
Subaira, A. S., Gayathri, R. and Sindhujaa, N., 2016, January. Security Issues and Challenges in Big Data Analysis International Journal of Advanced Research in Computer Science and Software Engineering, 6(2), pp. 530-536
Thayananthan, V. and Albeshri, A., 2015. Big Data Security Issues Based on Quantum Cryptography and Privacy with Authentication for Mobile Data Center. Procedia Computer Science, 50, pp.149-156.
Xu, L., Jiang, C., Wang, J., Yuan, J. and Ren, Y., 2014. Information security in big data: privacy and data mining. IEEE Access, 2, pp.1149-1176.
Yu, Y., Mu, Y. and Ateniese, G. 2015. Recent advances in security and privacy in big data. Journal of Universal Computer Science, 21(3), 365-368.
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.