Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Dissertations on Hadoop infrastructure integrates with cybersecurity

Category: Engineering Paper Type: Dissertation & Thesis Writing Reference: APA Words: 7200

Contents

1. Introduction………………………………………………………………………………………………………………………....3

1.1Big Data Analytics 4

1.2 Problem statement 5

1.3 Aims and objective 6

1.4 Structure of assignment 6

1.4.1 Introduction 6

1.4.2 Background information and definition 6

1.4.3 Main chapter (s) on theory 7

1.4.4 Case study 7

1.4.5 Conclusion 7

1.5 Methodology 7

2. 2. Background information and Definitions 8

2.1 Background Information 9

2.2 Definitions 12

3. 3. The main chapter on theory 15

4. 4. Case study 19

4.1 Case study A 19

4.1.1 Data Privacy Issues 20

4.1.2 Challenges in Industry Control Systems 20

4.2 Case study B 20

4.3 Critical Comparison of 22

5. . Conclusion 23

5.1 Summary of results 23

5.2 Outlook 23

6. References 24

Hadoop infrastructure integrates with cybersecurity 

1. Introduction of Hadoop infrastructure integrates with cybersecurity

In technology, HADOOP is considered one of the most important trends that are particularly utilized as the cloud storage framework. It is usually known as the open sources distributed by utilizing the computing network that is usually implemented in JAVA. It is contained in the two modules that are the HADOOP distributed file systems as well as Map-reduce. To procession on large data set usually the Map-reduce is utilized and it allows users for utilizing the thousands of the commodity machines efficiently and effectively. The massive data can be processed by the users by reducing the functions and simplify defining the map. HDFS is usually used to storing the particular data that is distributed on the machines of the clusters .

The innovations in the novel applications and technological advances for instances, smart mobile devices, sensors, data analytics, physical systems, internet of things, cloud systems and social network that is usually used to making it probable for processing, collecting and storing the data; that is usually considered as the big data. It is related to everything that is collected at any time from everywhere.  The analytics of the paradigm featuring 5V as well as data management can be denoted by the terms of the bug data. The 5Vs are included as; high variety, high data volume, high velocity, high value, and low veracity .

The public attention has been attracted by the topic of the bug data even before the revelations related to the amounts of the astronomical data that has been stored, collected, and analyzed from the numerous intelligence agencies. In order to run and store the application on the particular commodity hardware clusters; the HADOOP is considered as a framework of the open-source software. This infrastructure depends upon the distributed file systems as well as it also based upon the parallel programming model. Nowadays, organizations are moving towards the HADOOP due to its ability to process the huge amount of diverse data as well as the ability to store the amount of the data quickly .

 

Figure 1: Hadoop Architecture

1.1Big data Analytics of Hadoop infrastructure integrates with cybersecurity

 The big data’s technological world based upon the particular framework by which the volumes of the big data become beneficial . These infrastructure and framework are contained on the set of the systems that are deployed over the multiple clusters and parallel nodes. It also alludes to the performance of the huge computation for reduced infrastructure. In order to process the big data, Apache HADOOP is considered as one of the most important and first tools. The analytics tools of the  HADOOP is considered as the open-source software that is mainly conceived for the big data. It is usually considered as the architecture of the non-relational database that is usually dealing with the very bug amount of the heterogeneous distributed data .

Hadoop is considered as one of the most important and popular for the various functions for such choices between the organizations. In order to store large amounts of data, HADOOP is usually suited. It is also used to understanding and storing the large amounts of the unstructured data that consist of big data stores. It also offers the large size of the technologies and tools by which organizations can take help in order to tackle the numerous problems that are engaged in analyzing the massive swathes of information.  It also includes data mining, enterprise search, and logo analysis .

1.2 Problem statement of Hadoop infrastructure integrates with cybersecurity

There are two major computations, capabilities, and storage that are offered by the HADOOP. In order to process the large amount of data HADOOP is considered as one of the most important and famous distributed programming frameworks for the demands of its particularly distributed file systems in order to store the file and securing the computed file that can grow quickly. Therefore, the encryptions of the storing HDFS blocks do not support the HADOOP. It is also known as the fundamental solution for the security of the HADOOP. The HADOOP infrastructures become one of the most important and well-known systems in the current organization, but the problems are occurring due to the various kinds of security perspectives. In the current era, security aspects have becomes an essential element. To cope and overcome such problems, the HADOOP infrastructure is integrating with cybersecurity. The integration of the HADOOP infrastructure with the cybersecurity is necessary. 

1.3 Aims and objective of Hadoop infrastructure integrates with cybersecurity

There are several objectives of the research study that must be attained in the various parts of the research study. The most important and major objective of the particular paper is the protection of data security in the clouds. There are several other objectives it includes;

To make sure the security of the data in the storage of the HADOOP data.

To explore the phenomena that are required to integrate the HADOOP infrastructure with cybersecurity. 

To explains the phenomena for integrating cybersecurity with HADOOP infrastructure.

To explores the various challenges and benefits of the big data with the considerations of the HADOOP infrastructure. 

1.4 Structure of the assignment of Hadoop infrastructure integrates with cybersecurity

The research paper particularly contains on the major five sections that include as;

1.4.1 Introduction of Hadoop infrastructure integrates with cybersecurity

This is the first section of the research paper. It introduces a particular topic that is required to conduct the research. It also justifies the topic in explanative manners. The problem statements are also explored under this section along with the aim and objectives. At the end of this particular section, the materials and methods are explained that are used in conducting this research.

1.4.2 Background information and definition

This is the second section of the research study and it is also one of the most important sections because it explains the background of the topic that is a major point while researching any topic. It also offers various important definitions on the topic of the HDOOP infrastructures. 

1.4.3 Main chapter (s) on theory

This is the third section of the research study. Under this section, all kinds of theories and aspects are explored. It also builds the major and important chapter in the forms of the section for conducting the research study. 

1.4.4 Case study of Hadoop infrastructure integrates with cybersecurity

This is the fourth section of the research study. It is also considered as the analysis of the study in which all of the data is explores in a good way by using the case studies. The various causes of the various functions and companies are explained in good ways. 

1.4.5 Conclusion of Hadoop infrastructure integrates with cybersecurity

At the end of the research study, all of the data has been concluded in good ways. The entire information is summed up in various exclusive manners.

1.5 Methodology of Hadoop infrastructure integrates with cybersecurity

The numerous security development models of the various Hadoop infrastructures are investigated by the qualitative research methods, and this study is conducted by using the inductive research approach that leads towards the detailed analysis of the various theories that are related to the particular topics. The qualitative research methods provide information related to the model utilization for the secure Hadoop infrastructure integrates with cybersecurity. It also includes several kinds of tools and security approaches that are developed by several researchers in their studies on this particular topic.

The secondary source of data collection is particularly used. It referred to the pre-existing data that is mostly related to the operating systems' securities. It includes journal articles, conference papers, books, research papers, news articles, and sources of the websites. From the secondary sources of the data collections, the qualitative research methods are used to conduct the research study on this particular topic of operating systems security tools.

 From the qualitative research methods observation method is employed in this research study for analyzing the securities tools of the various Hadoop infrastructures. The observation methods are a good approach to analyze the studies of several authors because all of the studies are presented in the literature review for the Hadoop infrastructure integrates with cybersecurity.

All of these studies most relevant to the topic and explores the concepts of aspects of the study by offering detailed views on these particular topics. More than 250 research studies are explored for the said research worker, but only the most similar and best-suited studies are particularly used in this study. 

It can be said the particular study is extracted from more than 250 publications by using the particular scientific sources. Such as ACM Digital Library, Scopus, IEEE Computer Society, Science Direct, Springer Link, ISI Web, and Google-Scholar. The Google-Scholar is mostly used for the various publications because it is considered as one of the most important platforms to search the various latest publications.  Most of the data for the Hadoop infrastructure integrate with cybersecurity has been collected by the numerous web links that are exploring the details about the operating systems as well as their relevant security tools.

After observations and investigation, only 200 studies considered best studies for this research, which is based upon the well-defined exclusion and inclusion criteria. Several keywords are used for searching the relevant data in this study because these keywords are closely matched to the said research work and these are mostly used in this entire research to conduct the research study. 

2. Background information and Definitions

2.1 Background Information of Hadoop infrastructure integrates with cybersecurity

As it has been said that in the year of Big Data the living style of individuals and their routine wise habits and some manners of cognition have been experienced some of the earth-shaking modifications. As well as it has now become one of the most significant topics for investigation in institutions and industries as well. moreover,  big data holds double edge swords. It also brings and convivence individuals to transports some hazards.  As well as in the procedure of data collection, securing and utilizing and it can easily be a move toward breaching of personal information. 

Data has been expanding in the universe because of the fame of extroverted media and computer-predicted conversation. Moreover, the surfeit of data that has been amassed through various sources involving IP address, email, log files, and the internet by using controversies that have been held by hand . The article also talks about privacy and security problems that have been faced in the enormously colossal data and some of the reviews the current research challenges and some of the typical privacy methods and also error regarding data confidentiality and security problems. Furthermore, in this, some of the methods have been presented on how to settle security and privacy.

In this study it has been mentioned that Big Data has been taken as the collection of the great amount of historic and significant data which is one of the most probable possessions for each of the company and being used by perfectly for the business to support the decisions which has been based on facts despite from views . As well as big data has to archive the collection of historic data while using the Hadoop framework along with the help of various equipment. Hadoop has been taken as the meaning of Big Data and it has been based on four V’s as it has been mentioned in the study.


As well as data security has continuously been one of the significant problems within information technology. Within the cloud computing atmosphere, it becomes specifically serious due to the isolation of data in various areas even in the whole world. As many techniques have been included in the topics within cloud computing and it has been identified in both industry and institutions,  as well as privacy protection and data problems has now become one of the most significant for the upcoming growth of cloud computing technology within industry, government, and mainly in business.

Moreover, here some of the discussions about hacking. In this Hacking has been explained as in the form of fast-growing national issues in the market which might fail to resolve due to persons often choose lower than optimal level of security  in the universe of positive transference cost. In this, some of the authors suggested that hacking is the procedure that bypasses the security mechanism of an informative network or system. furthermore, it can also be described as unauthorized usage of network and computer resources.  There are some of the hacking types has also been explained and these are mainly in four types, computer hacking, virus and worms, password hacking and phishing. 

In some of the previous decades fastest growth and propagation of computers within the company of all functions and sizes. As well as the expansion continued and security had not been taken within the system and design stages. Furthermore, in the latest time, it is not be documented that computing systems were simply compromised . As well as the study also involves the center for information system research along with in connection with the MIT information processing center has now become one of the most sites which have been participated in the IBM Data security study.


There are some of the detailed explanations of significant topics that are related to the association of data science and security . Despite from this some of the data science techniques and methods have been used to address some of the most challenging issues which have been presented in the filed likewise management of the great amount of log data and the investigation of anomalies and some other signs which may be pinpoint actions pretentiousness a threat for an industry. It will also move toward the development of extremely new resolutions such as some of the anti-virus products of the next generation.

In this study, some of the complex issues challenging the computer organization recently have that the data security. This issue has been including the development, user, and operator which incorporates physical facilities, computer hardware, operational processes. Software and some of the programming techniques . In this, it has also been said that in the political, social, and technical lives have been entrenched within the society which has been based on information along with the enhancement required for the collection and the storage of information. It is mainly agreed that the efficient usage of information gives the ability for industry to enhance its effectiveness of the operation.  

2.2 Definitions of Hadoop infrastructure integrates with cybersecurity

In this Data warehouse saves the sensitive data which encircle in most of the business secretes. This is now become one of the most obvious data sources and has been utilized by analytic equipment for developing business intelligence and supports decision making in many associations. As well as they also develop and expanded attractive for both of the exterior and interior attackers. Some of the presenting facts securing them toward damage of data and information breaching are difficult . As well as the study suggested that the structure of security for integrating data confidentiality solutions and interruption detection in DWs.

Data Warehouse represents the gathering of databases that have been come from various sources and has been combined in the company and utilized for working on some of the significant issues and decision making. Although it has also been mentioned that the Data warehouse holds a great variety of information which offers a coherent image of the organization's actions and suppliers' standard managerial decisions  has been made based on the analysis. Data warehouse initiations had possible due to the economic propensities and some of the technological advancement. The technological advancement has sanctioned the enhancement of the calculation capacity and some of the high-quality standards.  


This wireless sensor network has the network of sensors organized in areas unsuitable for individuals and stable monitoring has been needed. They work with reduced cost smart devices that hold restricted computing resources. Taking in the observation of the data they transfer, and their security form the passive or active attack which was quite difficult. As well as the cooperative network,  and each of the single nodes has there owned processing abilities. In arrears to the fact that wireless sensor network has the real-time system which has been applicable within the system.

As well as some of the security Data warehouses have been used to collect and correlate IT security data. Moreover, it also involves IT asset creativity likewise operating system and patch levels, user login, users, and remote access dial-in and VPN. the process was purified and manly tested before and deployment of SDW. As well as it has also been mentioned that SDW correlates with all types of data with their relationship with time . There are some of the other features have been presented which is related to SDW Architecture and has been underlying difficulties of the data model and some of the host mapping algorithms have been encapsulated in an easy to use.

Cloud computing has the computing paradigm where the biggest pool of systems has been associated with a national and international network to give a framework for the implementation file and data storage. Cloud also gives the essential space to the user utilizing different technologies. Such as web server and a significant environment. It is computing which gives the services only to the registered users based on payment. Cloud computing indorses availability and validity. Cloud computing has been divided into three parts and in four of the deployment models . As well as data security over cloud computing is one of the most significant issues for the providers of services.

 

In this paper, some of the cloud servers have been found which has been moved around for some of the years and most of the web hosts in recent days did not transfer to the cloud still.  Hadoop is one of the most famous platforms for the computing cloud. It has been taken as the free software under the Apache License . This study also explains the technology which has been presented behind the HDFS and the expansion to the Hadoop security characteristics along with Kerberos. As well as the technology has been depending on data transaction performance and security features of HDFS and GridFTP server.


There are some of the progress has been in internet and bandwidth ability as been attained in the numeric form of latest applications to be created, in this regard most of these latest applications has also been explained in this . In this it has also been mentioned that some of them have been accessed anywhere and anytime is one of the most significant in the twenty centuries. Furthermore, the broader spread adoption of electric business and the rapid internet access which has been done through broadband givers access to business and commerce in any of the time.

3. The main chapter on theory of Hadoop infrastructure integrates with cybersecurity

In this article, it has been mentioned that Big Data has been taken as the latest technology and it has been going to rule the world within the forthcoming. In this, it has also been stated that small data has been collected in big size forms and has been known as big data and in the original time . Furthermore, the study also involves some of the significant issues and mainly pays emphasis on the security issues which have been aroused within the Hadoop Architecture has been known as Hadoop Distributed File System.

In this study, it has been stated that Big data has been attained as the term that refers to the great volumes of knowledge and also worried about the complexity of the information and the rapidity in which it has been developed. Moreover, information has been created at an excellent rate in the latest world. Some of the undertakings advancingly and have been based on Hadoop for putting away their lucrative knowledge and developing it. Furthermore, there is considerable helplessness that has been obtained in Hadoop that can inspect the security of the subtle data which activities and has been put away on it.  

It has been suggested in the paper that in the department of US of Defense in which it has been said that it has been documented that Big Data issue. Moreover, some of the increased volumes of streaming data were swallowed from the planned edge and managing for the range of sensors. As well as Apache Hadoop has an open-source of application which has been deepened on the Google File system. Two of the elements have been based on the Hadoop MapReduce engine as well as the task tracker and job tracker. To solve this issue authors utilized the Security-Enhanced Linux.

In this paper, some of the cloud servers have been found which has been moved around for some of the years and most of the web hosts in recent days did not transfer to the cloud still.  Hadoop is one of the most famous platforms for the computing cloud. It has been taken as the free software under the Apache License. This study also explains the technology which has been presented behind the HDFS and the expansion to the Hadoop security characteristics along with Kerberos. As well as the technology has been depending on data transaction performance and security features of HDFS and GridFTP server. 

There are some of the progress has been in internet and bandwidth ability as been attained in the numeric form of latest applications to be created, in this regard most of these latest applications has also been explained in this.  In this it has also been mentioned that some of them have been accessed anywhere and anytime is one of the most significant in the twenty centuries. Furthermore, the broader spread adoption of electric business and the rapid internet access which has been done through broadband givers access to business and commerce in any of the time  

Form the very first biosensor had been introduced in the era of 1962 and has been developed by Clark and Lyons. As well as there are some of the expanding demands for these types of analytical devices in the original application has been mentioned. Moreover, in this paper, Human Health information has been obtained from the healthcare system which gives the significant diagnosis data and references for the doctors. For the development of secure and effective healthcare applications which has been based on Hadoop healthcare security communication which has been suggested. As well as in some of the wireless networks and authentication transaction 

Form the very first biosensor had been introduced in the era of 1962 and has been developed by Clark and Lyons. As well as there are some of the expanding demands for these types of analytical devices in the original application has been mentioned. Moreover, the study mainly emphasis on detector principles and acknowledgment components to attain the user-friendly and excellent performing analytical device, in this most of the elements have to be taken into account. Furthermore, some of the Biosensors have been created for most of the years, and investigations have become most famous in recent years.

In this study, some of the conventional data has been utilized anonymity techniques to secure the personal information which will cause side links attacks. As well as Big Data mainly be linked with the retrieval of data analytics and storage. Data anonymization will also address some of these considerations by giving instruments to mask and also help with secreting the susceptible data. As well as there are some of the expanding demands for these types of analytical devices in the original application has been mentioned. Moreover, in this paper, Human Health information has been obtained from the healthcare system which gives the significant diagnosis data and references for the doctors.

In this study, it has been mentioned that Big Data has been taken as the collection of the great amount of historic and significant data which is one of the most probable possessions for each of the company and being used by perfectly for the business to support the decisions which has been based on facts despite from views . As well as big data has to archive the collection of historic data while using the Hadoop framework along with the help of various equipment. Hadoop has been taken as the meaning of Big Data and it has been based on four V’s as it has been mentioned in the study. 

4. Case study of Hadoop infrastructure integrates with cybersecurity

In order to analyze the integration of the HDOOP infrastructure with cybersecurity, the various cases are discussed that are considered as the best and important examples of the study. It is a good source to analyze the integration of the HADOOP infrastructure with cybersecurity. These cases are a good example of cybersecurity along with its integration of the HADOOP infrastructure. The use of big data analytics has also been explored and critically analyzed to exploring the particular process of the integration of HADOOP infrastructure with cybersecurity.    

4.1 Case study A of Hadoop infrastructure integrates with cybersecurity

In 2006 an incident occurred that is usually known as the incidents of the data Valdez. It particularly occurred when the worth search queries from 65000 members were posted by the employees of the AOL in three months. Even this act was done by the employees of AOL for the sake of research. They have taken steps to anonymize the several members. The data has been made the AOL that is available for the numerous weeks on their particular site that is named as aol.com. The privacy implication has been realized by the company by the time in which the material was pulled . 

In this scenario, the data was particularly downloaded by the third parties that are required to making the available mirrors on sites. Even it was not confirmed and informed that how much members of the AOL was engaged in submitting the claims. Specifically, there are the numbers of users who don’t know whether their particular search quires were released publically. Even it has been stated by the notice of the settlement that there are not particular ways for the people in order to determine how the particular data was published. This data was also based upon the username. The control, authorization, and authentication has been provided by the incremental security model of the HADOOP along with the particular encryption that utilized for the policy which has been considered as the right users along with its particular regulatory data  

4.1.1 Data Privacy Issues of Hadoop infrastructure integrates with cybersecurity

The protection of information is subject to the association of how the association utilizes the information. The information must be utilized for the reason it is gathered and not any more separated from that specific. The information ought not to be shared among others to get business benefits or to get names in the market. Be that as it may, there are numerous apparatuses and methods in enormous information condition that extricate the private information and make infringement simpler .

4.1.2 Challenges in Industry Control Systems

IoT is the place the Internet meets the physical world. This has some genuine ramifications on security as the assault danger moves from controlling data to controlling activation (i.e, moving from the computerized to the physical world). Thus, it extends the assault surface from known dangers and known gadgets to extra security dangers of new gadgets, conventions, and work processes. Many assembling frameworks are moving from shut frameworks

4.2 Case study B of Hadoop infrastructure integrates with cybersecurity

The prize of the $ 1 million has been offered by Netflix in 2006 for the 10% improvements in the system of the movie recommendation. The “anonymized” training data set has been released for viewing the history of the movie by half of the million subscribers. Therefore, in this particular contest, there were numbers of developers who were participating . They also have some data to utilize for this particular contest. The rating of the movie is included in the particular data set that had been watched by the subscribers of Netflix. In this particular process, the entire personally-identifying information has been removed. In order to settle the user, data misuse charges the $9miilion has been paid by Netflix. It was aimed to misuse more and more data along with Facebook. It has been accounted by the Netflix that company of the video streaming had kept the copies for their rental history as well as personal information from the particular accounts that have been usually closed long before the accounts . 

The recreation of the recommendations becomes easier for retaining data on the individual users for the list of the customers in order to return the services after closing the previous accounts. The recommendations recreations also become easier by using the anonymized aggregations of the data for showing the behavior of users. By using such kinds of restrictions on the kinds of data the services company can easily maintain the length of the time that can retain personally identifiable records that can be the cause of the endless trouble for particular non-rental companies, for instance, Facebook . Even they are currently engaged in maintaining the Netflix itself and it was away from the user of Facebook. The security model if the HADOOP incremental is always concerned with the data along with its accessibility. It also includes the utilization of sensitive information across the particular systems along with the auditing in order to track the provenance of the data .

4.3 Critical Comparison of Hadoop infrastructure integrates with cybersecurity

The above given both of the case studies are discussing the different points for the protection and security of the. By considering both of these case studies it has been observed that these are revolving around one similar point. Both of these case studies are discussing the perspectives of data security and work efficiency by stabling their reputation in its organization. It discusses the two different companies that are playing their roles in the various lie of business. It includes; Netflix that is one of the most important and well-known video streaming companies and offering it’s a global level. In the case of Netflix, it discusses the arrangements and management of the data that has been managed by the set of developers. The management of the data set is required for viewing the history of the movie by half of the million subscribers. In order to manage this data set and the recreation of the recommendations becomes easier for retaining data on the individual users for the list of the customers in order to return the services after closing the previous accounts . It has been observed that the security model if the HADOOP incremental is always concerned with the data along with its accessibility. These results that are attained in this particular case of the Netflix are similar to the study of the .

Another case that has been considered as the best example for the said study is related to the AOL  that was suffered from the problems of the data Valdez this incident occurred when the employees were engaged in searching something most important to ensuring the security of the data. In order to make sure the security of the data this firm also used HADOOP infrastructure. The control, authorization, and authentication has been provided by the incremental security model of the HADOOP along with the particular encryption that utilized for the policy which has been considered as the right users along with its particular regulatory data 

5. Conclusion of Hadoop infrastructure integrates with cybersecurity

5.1 Summary of results

It has been observed that HADOOP infrastructures integrate with cybersecurity. It has shown in the results of the case study that HADOOP is the best infrastructure for securing the data while it integrates with cybersecurity .The case study's experiments and incidents show that the file encrypted size can be enhanced by our new approach. It becomes increased by 20% of the original file. It can easily increase performances of the decryption and encryption of the file . In order to improve the performance, the particular proposed approach can be executed parallel for the decryption processing map.

5.2 Outlook 

This study also explains the technology which has been presented behind the HDFS and the expansion to the Hadoop security characteristics along with Kerberos. As well as the technology has been depending on data transaction performance and security features of HDFS and GridFTP server. There are some of the detailed explanations of significant topics that are related to the association of data science and security. In this study, some of the complex issues challenging the computer organization recently have that the data security. This issue has been including the development, user and operator which incorporate physical facilities, computer hardware, and operational processes. Software and some of the programming techniques. This study also explains the technology which has been presented behind the HDFS and the expansion to the Hadoop security characteristics along with Kerberos. As well as the technology has been depending on data transaction performance and security features of HDFS and GridFTP server.

References of Hadoop infrastructure integrates with cybersecurity

Abouelmehdi, K. B.-H. (2016). Big data emerging issues: Hadoop security and privacy. 2016 5th International Conference on Multimedia Computing and Systems (ICMCS).

Adluru, P. D. (2015). Hadoop ecosystem for big data security and privacy. 2015 Long Island Systems, Applications, and Technology.

Anne, H., & Gummaraju, J. (2017). Virtual Hadoop manager. U.S. Patent.

Bernardino, J., & Vieira, M. (2014). ENHANCING DATA SECURITY INDATA WAREHOUSING. Faculty of Sciences and Technology of The University of Coimbra.

Bertino, E. &. (2017). Big Data Security and Privacy. A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years. 425–439.

Bhathal, Singh, G., & Singh, A. (2019). Big data: Hadoop framework vulnerabilities, security issues, and attacks. Array.

Crawford, Desai, Ganti, & Raghavendra. (2017). Enabling a Hadoop file system with POSIX compliance. International Business Machines Corp.

Cuzzocrea, A. (2014). Privacy and Security of Big Data. Proceedings of the First International Workshop on Privacy and Security of Big Data -PSBD '14.

Da-Wei Zhang, F.-Q. S. (2011). Research on Hadoop-based enterprise file cloud storage system. 2011 3rd International Conference on Awareness Science and Technology (past).

Demchenko, Y. N. (2014). Big Security for Big Data: Addressing Security Challenges for the Big Data Infrastructure. Secure Data Management, 76–94. 

Dharminder, Y., Maheshwari, D., & Chandra, D. (2019). Big Data Hadoop: Security and Privacy. Umesh, Big Data Hadoop: Security and Privacy.

Elisa, B., & Ferrari, E. (2018). Big data security and privacy. In A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years, 425-439.

Erraissi, A. (2017). Digging into Hadoop-based Big Data Architectures. IJCSI International Journal of Computer Science, Issues, Volume 14, Issue 6, November.

Gahi, Y. G. (2016). Big Data Analytics: Security and privacy challenges. 2016 IEEE Symposium on Computers and Communication (ISCC).

Grolinger, K. H. (2014). Challenges for MapReduce in Big Data. 2014 IEEE World Congress on Services.

He, H. M. (2016). The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence. 2016 IEEE Congress on E.

Hu, J. &. (2016). Energy Big Data Analytics and Security: Challenges and Opportunities. IEEE Transactions on Smart Grid, 7(5), 2423–2.

Jam, M. R. (2014). A survey on the security of Hadoop. 2014 4th International Conference on Computer and Knowledge Engineering (ICKE).

Jayasingh, B. B. (2016). Security issues and challenges of big data analytics and visualization. 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I).

Johnson, L. (2019). Security Data Warehouse Application. Intelligent Distributed Computing, 140.

Larson, D. L. (2013). COMPUTERDATASECURITY. springer.

Mahmoud, H. H. (2018). An approach for big data security based on the Hadoop distributed file system. 2018 International Conference on Innovative Trends in Computer Engineering (ITCE).

McCarth. (2004). DATA WAREHOUSES SECURITY IMPLEMENTATION. springer.

Mompoloki, P., Yahya, A., & Chuma, J. (2017). Wireless Sensor Data security. Journal of applied research and technology, 562-570.

Park, S. &. (2013). Secure Hadoop with Encrypted HDFS. Lecture Notes in Computer Science, 134–141.

Roshan, J., & Alam, A. (2016). Security Issues Challenging Facebook. International Journal of Computer Application, 36-40.

Sachin, B., & Shedge, R. (2016). Dealing with small files problem in the Hadoop distributed file system. Procedia Computer Science, 1001-1012.

Sahafizadeh, E. ( 2015). A Survey on Security Issues in Big Data and NoSQL. ACSIJ Advances in Computer Science: an International Journal, Vol. 4, Issue 4, No.16, July. 

Shashi, M., & Mishra, A. (2016). Cloud Computing Models: Background, Data security, & Security Issue. Journal of Web Development and Web Designing.

Sun, Y., Zhang, J., & Xiong, Y. (2014). Data security and privacy in cloud computing. International Journal of Distributed Sensor Networks.

Tankard, C. (2012). Big data security. Network Security, 2012(7), 5–8.

Tellenbach, B., Rennhard, M., & Schweizer, R. (2018). SecurityofDataScienceandDataScienceforSecurity. AppliedDataScience-LessonsLearned for the Data-Driven Business”, Springer.

VijayKumar, G. M. ( 2016). MetaCloudDataStorage Architecture for Big Data Security in Cloud Computing. Procedia Computer Science, Pages 128-133, 87,

Vivekanand, M., & Vidyavathi, B. M. (2015). Security Challenges in Big Data: Review. International Journal of Advanced Research in Computer Science; )., Udaipur Vol. 6, Iss. 6, (Jul.

Yang, C. L. (2013). A Novel Triple Encryption Scheme for Hadoop-based Cloud Data Security. 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies.

Yawar, K. A., & Marg, J. (2013). CYBERSECURITY. International Journal of Students Research in Technology & Management, 89-93.

Zhang, D. (2018). Big data security and privacy protection. In the 8th International Conference on Management and Computer Science (.

Zhou, H. &. (2014). A new solution of data security accessing for Hadoop based on CP-ABE. 2014 IEEE 5th International Conference on Software Engineering and Service Science.

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Supreme Essay Writer

ONLINE

Supreme Essay Writer

1890 Orders Completed

Top Quality Assignments

ONLINE

Top Quality Assignments

1071 Orders Completed

Unique Academic Solutions

ONLINE

Unique Academic Solutions

6510 Orders Completed