Open Access   Article Go Back

Anchoring Your Big Data Environment

S. Regha1 , M. Manimekalai2

Section:Research Paper, Product Type: Journal Paper
Volume-06 , Issue-11 , Page no. 28-34, Dec-2018

Online published on Dec 31, 2018

Copyright © S. Regha, M. Manimekalai . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Regha, M. Manimekalai, “Anchoring Your Big Data Environment,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.28-34, 2018.

MLA Style Citation: S. Regha, M. Manimekalai "Anchoring Your Big Data Environment." International Journal of Computer Sciences and Engineering 06.11 (2018): 28-34.

APA Style Citation: S. Regha, M. Manimekalai, (2018). Anchoring Your Big Data Environment. International Journal of Computer Sciences and Engineering, 06(11), 28-34.

BibTex Style Citation:
@article{Regha_2018,
author = {S. Regha, M. Manimekalai},
title = {Anchoring Your Big Data Environment},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2018},
volume = {06},
Issue = {11},
month = {12},
year = {2018},
issn = {2347-2693},
pages = {28-34},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=535},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=535
TI - Anchoring Your Big Data Environment
T2 - International Journal of Computer Sciences and Engineering
AU - S. Regha, M. Manimekalai
PY - 2018
DA - 2018/12/31
PB - IJCSE, Indore, INDIA
SP - 28-34
IS - 11
VL - 06
SN - 2347-2693
ER -

           

Abstract

Security and protection issues are amplified by the volume, assortment, and speed of Big Data. The decent variety of information sources, arrangements, and information streams, joinExternalize data security when possible and d with the gushing idea of information procurement and high volume make one of kind security dangers. This paper points of interest the security challenges when associations begin moving touchy information to a Big Data store like Hadoop. It distinguishes the diverse danger models and the security control structure to address and alleviate security hazards because of the recognized risk conditions and use models. The system laid out in this paper is likewise intended to be circulation skeptic.

Key-Words / Index Term

Hadoop, Big Data, enterprise, defense, risk, Big Data Reference Framework, Security and Privacy, threat model

References

[1] EMC Big Data 2020 Projects http:// www.emc.com/leadership/digitaluniverse/iview /big-data-2020.html
[2] NIST Special Publication 1500-1 NIST Big Data Interoperability Framework: Volume 1, Definitions http:// bigdatawg.nist.gov/_uploadfiles/M0392_v1_3022325181.pdf
[3] Securosis – Securing Big Data Security issues with Hadoop environments https://securosis.com/blog /securing-big-datasecurity-issues-with-hadoop-environments
[4] Top 10 Big Data Security and Privacy Challenges, Cloud Security Alliance,2012 https://downloads .cloudsecurityalliance.org/inititives/bdwg/ Big_Data_Top_Ten_v1.pdf
[5] Hadoop in Action, Second Edition by Manning Publications.ISBN:9781617291227http://www.manning. com/ lam2/