This website uses cookies to ensure you have the best experience. Learn more

Secure Big Data Essay

2243 words - 9 pages

Introduction
In a dynamic global economy, companies and organizations have started to rely more and more on statistics gathered from their customers insights and behavior, internal processes and business operations with the aim of finding new opportunities for growth. In order to find and determine this information, large complex sets of data should be generated and analyzed by skilled professionals. The compilation of this large collection of data is known as “Big Data”.
The last years companies and organizations are more and more using Big Data to find new methods to improve the decisions they make, to discover new opportunities and improve the overall performance. For example, big data can be harnessed to address the challenges that arise when information that is dispersed across several different systems that are not interconnected by a central system. By aggregating data across systems, big data can help improve decision-making capability. It also can augment data warehouse solutions by serving as a buffer to process new data for inclusion in the data warehouse or to remove infrequently accessed or aged data. [Tech-Faq Website, 2013]
The big challenge of collecting all this data is to find solutions in how to be converted into useable information by identifying patterns and deviations from those patterns and many companies and organizations are working on it. Developers and software providers are rising to this challenge, turning big data management into a booming industry with major players in both private industry and open source communities. [Villanova University official website, 2013]

Security in Big Data
People create 2.5 quintillion bytes of data every day and almost 90% of the data in the world today has been created in the last two years alone. This means that security and privacy issues are getting bigger as well. The velocity, volume, and variety of big data are factors that affect these issues such as large-scale cloud infrastructures, diversity of data sources and formats, streaming nature of data acquisition and high volume inter-cloud migration. The old, traditional security mechanisms, which were used to secure small-scale static data all these year, are inadequate for the Big Data.
Large-scale cloud infrastructures become really popular and together with them a diversity of software platforms, which is spread across many computers and networks, has increased the surface for attacks on those systems.
For example, analytics for anomaly detection would generate too many outliers. Preventing distributed Denial of Service (DoS) attacks will become more difficult. [US-CERT Website].
Similarly, it is not clear how to retrofit provenance in existing cloud infrastructures. Streaming data demands ultra-fast response times from security and privacy solutions. [Integration Developer News official website, 2013]
Data and transaction logs (files that record and store any action by the database) are stored in multi-tiered storage...

Find Another Essay On Secure Big Data

Store Your Data in the Cloud

1809 words - 8 pages Storage providers for security reasons. Many cloud storage provider using a high security. This makes your data more secure. The providers also avoid malware or viruses from corrupting your data. Data communication concepts related Cloud computing and storage involves the transfer of data and programs from user computers to Internet servers. This allows you to access your data from any device with an Internet connection, and

What are the security problems and solutions of the Internet?

1356 words - 5 pages those who only do general chatting online. For those who doing business (e.g. online shopping) or sending very private materials (e.g. personal information), security becomes a big issue. For this reason, encryption is widely used for protecting the confidentiality of data being transmitted. INTERNET BUSINESS FOR SECURITY Basically, online transaction security, email security, network security are major considerations. Online Transaction

Using Data Encryption for Security in Cloud Computing

2098 words - 8 pages will analyze cloud computing and the issues it faces from a security standpoint. The main focus for this paper will be on how data encryption can help safeguard information being stored in the cloud. Data encryption is a key component in security for cloud computing and is often used when secure information is being transmitted. Keywords: cloud, security, data encryption Using Data Encryption for Security in Cloud Computing Today

Data Mining

1299 words - 5 pages update and secure. Privacy Concerns of Personal Data for Mining Purposes Protecting personal data is not enough and protecting sensitive information implies; statistical databases dealing with security control mechanism. This can provide aggregated information about groups and confidential about individuals. Three Concerns raised by consumers Some of the concerns raised by consumers is honesty policy, full cookie disclosure and setting up a

Secure Personal Data Servers: a Vision Paper

2711 words - 11 pages transactions, availability and query facilities. This device contains of SIM card, secure USB stick, and wireless secure dongle. In addition, it is designed to be a combination of tamper resistance smart card microcontroller and tremendously big storage NAND flash memory chip. The main goal of the Secure Portable Tokens (SPT) device is to imbed software into it and allow users to inquire, manage and storing their personal data in a secure way

Disadvantages and Advantages of Encryption

834 words - 4 pages ; especially big companies. Furthermore, by not having good data protection companies can get their reputations cripple or cease to exist in the global economy. A lot of big organizations relay on data encryption to protect their client information or sensitive information from rivals. The two big names in that encryption process are Asymmetric and Symmetric. Asymmetric and Symmetric both have their disadvantages and advantages. Asymmetric is

Project Plan

1849 words - 8 pages -well configuration web server can lead to many security holes for hacker to take advantage to bypass security and take full control of the server. The ABC network design team need to work closely with IT department to configure all the web servers to ensure the system is safe and secure for the public. Database server also need be well consideration for security factor when design the network. Client sensitive data need to be projected because

Investing in the Future: Why the Medical Field Should Invest in Wireless Networks

1264 words - 6 pages device is sending or receiving data from another device. Attackers may change the destination of data or steal data by eavesdropping on the wireless communication media. Eavesdropping is possible when wireless access point providers do not secure the network appropriately; any attacker can intercept radio communications between the wireless nodes easily and stolen data may be used for malicious acts. If attackers eavesdrop on a wireless sensor node’s

Security in The Cloud

1724 words - 7 pages will be ready to troubleshoot if required” (Cardoza 2014). Ensuring that the data will be safe 24/7 bring an peace of mind to the consumer . In the same content as advantages, there always are disadvantages also. One of the most important disadvantage that the cloud has is it’s security measures. Big end companies have failed to have a strong enough security info structure that will promise the user that their data is secured 100%. In an

Company's Database

513 words - 2 pages know that the budget for maintenance is scarce. With any system of such size, security is also an issue. With so many personal details being held on a system and even just the purpose for which it is being used means that we would want the system to be secure in a number of ways; this including data integrity and the prevention of unauthorized access. The need for databases is the heart of running the business. The databases we use hold all

Cryptography in Computer Systems

1398 words - 6 pages social network analysis. Cryptography is method of keeping data secure when transfer over networks by using ciphers that prevent unauthorized people from using it. The most prospective modern day cipher is the open key system. An algorithm named the RSA is the basis for most all the Internet security transactions and is a mathematical foundation for all open key systems. Data loss is minimized by adopting PET methods and cryptography in computer

Similar Essays

Is Big Data A Strategic Tool?

1545 words - 7 pages eclipsed competitors with powerful new business models that derive from an ability to exploit data (11). Companies can gather all relevant information from the use of existing products. So that companies can gain the early mover position by developing the new products and updating existing products quickly. Early movers that secure access to the data necessary to create value are likely to reap the most benefit. (8) Additionally, the use of Big data

Cloud Computing Security Essay

1573 words - 6 pages cloud is secure. Despite the numerous advantages offered by cloud computing, security is a big issue concerned with cloud computing. There are various security issues and concerns associated with cloud computing, among them being phishing, data loss and data privacy. There are different mitigation measures that cloud pioneers are currently using to ensure data stored in the cloud remain secure and confidential as intended

Security Essay

3132 words - 13 pages about security design between them. They are going to exchange a large volume of data and use communication system between journalists and resources. Besides prerequisite a strong secure communication system, newspaper company also concerns about confidentiality of work-in-progress stored inside their local storage. They may want to apply secure inventory management to store data securely until it is published. They may give different

Importance Of Big Data Essay

2011 words - 9 pages , reputation for the company and the past experience of the with the company (Schoenbachler & Gordon, 2002). For behavioural targeting to be successful through Big Data, privacy laws need to be explored and regulated for the constantly changing society. Consumers would have to be informed and educated about the methods of data collection so any confidential information can be protected and individuals could feel secure about their privacy. Big Data can