K.S.Rangasamy College of Technology
Tiruchengode, Namakkal.
Employing Attribute Relationship Methodology for Big Data Security
Authors:
Ramya.P E-mail: ramya1061994@gmail.com
Manjula.R
Karthikeyan.S
Abstract
There has been an increasing interest in big data and big data security with the expansion of network technology and cloud computing. However, big data is not an entirely new technology but an lean-to data mining. In this paper, we describe the background of big data, data mining and big data features, and suggest attribute selection methodology for big data for shielding the value of big data. Extracting important information is the main aim of analyzing big data which desires to be confined.
Therefore, weight between attributes
…show more content…
Initially, established cryptographic primitives for the idea of data security protection cannot be directly adopted due to the users loss of control of data in Cloud Computing. Therefore, confirmation of correct data storage in the cloud must be conducted without a explicit knowledge of the whole data. Taking into consideration that various kinds of data for each user stored in the cloud and the claim of long term continuous declaration of their data safety, the problem of verifying exactness of data storage in the cloud becomes even more demanding.
Secondly, the Cloud Computing is not just considered as a third party data warehouse. The data stored in the cloud may be recurrently updated by the users, including deletion, insertion, modification, appending, reordering, etc.
The disadvantage of these techniques, which can be useful to ensure the storage accuracy without having users possessing data, cannot address all the security threats in the cloud data storage, while they are all focusing on single server set-up and most of them do not reflect on dynamic data
Furthermore, the number of communications between C1 and C2 is constant. To perform range queries over encrypted integers in the cloud, we assume the data owner has encrypted and outsourced their database to C1. Integers in particular are encrypted using their bit representation. The lower and upper bound of the query are encrypted in a similar fashion. The comparison protocol is executed for every record.
Ever since data is in encrypted format, its probably difficult for attacker to decode it ; but this will ultimately lead to data owner to suffer in one or the other way. 6. In order to solve this problem metadata is stored for each server content into proxy server. 7. Suppose size of data stored in server 1 is 2GB and similarly size of data stored in server2 is 2 GB.
2.1 AWS Networking AWS provide a kind of networking services that also provide private network connections to the cloud, scalable DNS and tools to make logistically solitary networks. There are also have prevalent networking services comprise the Amazon Virtual Private Cloud (VPC) and Amazon Direct Connect. Amazon VPC generates a logically solitary set of Amazon EC2 for example which can be connected to current network using VPN connection. Amazon VPC generates a private cloud inside AWS, while deposition built-in security with security groups and network access control lists. When using Amazon EC2, VPC is free.
Every page, folder, template, group and user record has an audit trail that captures every change made, with the date/time and user stamp to indicate who made the change and when. Users with appropriate security access can view this information, and reporting is also available to pinpoint specific types of changes or to narrow down records to specific time frames. 6. How does the system ensure availability, security and privacy of data on shared
For example, George has handicaps, but Hazel doesn’t. It is obvious, that it is not equal. Some people may think that if George took off his handicaps, he wouldn’t be the same as Hazel. Therefore,
David Ward Dr. Powell Principles of Info Systems November 12, 2015 Cloud Project The purpose of this project is to investigate different cloud services that are being offered in today’s marketplace, analyze their different benefits as well as negatives, and pick a company who offers services that suits my business best. Regardless of what website we are looking at, all of the websites are offering the same thing, which is a cloud service. Cloud computing service providers can provide IT services, ranging from storage space all the way to complete applications. This has become a viable service, as these companies have the ability to provide IT services with higher quality and more efficiently than their customers can.
2.7 Observations from GMPCS Model Based on the above model, several observations can be made as follows. Observation_1: According to an interoperability feature between CSPs, a storage service will be hosted over a pool of resources that are in different geographical locations. Furthermore, different technologies, protocols, and security strategies are applied by each CSP within its datacentres to facilitate managing an environment to protect both resources and data. The technologies and strategies, therefore, might be disparate in terms of efficiency, and the type of storage network or storage system might be varied as well.
Second-order relational information involves comparing the first-order analysis to facial features of a “typical” or “average face.” Therefore, because second-order relational information involves the aspect of comparison, it is heavily influenced by experience. The idea of the “typical” or “average face” is built up through out our lifetime and affected by our own experiences (p.122). Once again, this idea seems like a similar concept known as top-down processing which is also used in object recognition.
Amazon is purely an online sales portal. Based on premium web rating organizations Amazon has a position ranging from 4 to 10 on a global ranking of premium websites. The presence of Amazon in the virtual world of internet is unquestionable. Big Data is a technology area which is highly talked about during the last several years. During the last 18 months, companies in the retail sector, manufacturing, construction, and technology areas have realized the extreme potential of Big Data and are trying to gain maximum advantage from it.
Big Data refers to the massive amounts of structured and unstructured data that is collected over time from various internal as well as external sources. Enterprises are facing challenges in integrating these new and different types of data and also turning this data into meaningful information. The data is growing at a tremendous rate due to increase in connectedness of machines and people. Analyzing this data to extract sensible and meaningful insights is a big challenging task; integrating and optimizing this data, storing, organizing and analyzing is a challenge. The Big Data must be captured, stored, organized and analyzed to influence the decision making in any enterprise or business
The firm procures raw materials and components across the world and continually examines its production requirement against its manufacturing capacities to pursue cost reduction. Capabilities Thanks to the cloud, Revlon has been able to resolve the difficulties of big-data management efficiently by classifying all the unstructured data in the company (Swan,
The Internet Privacy also has a risk because there are many ways in which people can divulge their personal information, for instance by use of “Social Media” and by sending bank and credit card information to various websites. Moreover, directly observed
Big Data There are many different definitions for Big Data. SAS (n.d.) an analytical software company describes it as, “a popular term used to describe the exponential growth and availability of data, both structured and unstructured.” Many think Big Data just came into existence but it has been around for years. Banks, retail, advertisers have been using big data for marketing purposes.
How would the platforms interact with the different stakeholders? Accordin to Freeman (1984), stakeholders are anyone that can influence or be influenced by the company’s actions. And there are two types of stakeholders, including the primary and seconday stakeholders ( Clarkson, 1995). For Starbucks, its major stakeholders include employees, customers, suppliers and stockholders. Starbucks’ performances and business strategies could also affect the general public and the society.
5 – Main risks going forward for Amazon.com are to loose its competitive advantage because of opportunities that Internet offered to its competitor : low prices, deliver, costumer’s service, etc. Moreover, if the business develops, it may encounter logistical problems and limits : geographical and logistical constraints (energy, delivery and connection and some contries) and legislative constraints (censorship, taxes and state agreement : Corea, Sri Lanka, Indonesia, etc). Founded in 1994, Amazon started as an online bookstore and quickly became popular as it received high marks on several Internet rankings. Today, Amazon.com, Inc. is the world's largest online retailing company headquartered in Seattle, WA