Large Collection of Data: Secure Big Data

1749 Words4 Pages

Introduction
In a dynamic global economy, companies and organizations have started to rely more and more on statistics gathered from their customers insights and behavior, internal processes and business operations with the aim of finding new opportunities for growth. In order to find and determine this information, large complex sets of data should be generated and analyzed by skilled professionals. The compilation of this large collection of data is known as “Big Data”.
The last years companies and organizations are more and more using Big Data to find new methods to improve the decisions they make, to discover new opportunities and improve the overall performance. For example, big data can be harnessed to address the challenges that arise when information that is dispersed across several different systems that are not interconnected by a central system. By aggregating data across systems, big data can help improve decision-making capability. It also can augment data warehouse solutions by serving as a buffer to process new data for inclusion in the data warehouse or to remove infrequently accessed or aged data. [Tech-Faq Website, 2013]
The big challenge of collecting all this data is to find solutions in how to be converted into useable information by identifying patterns and deviations from those patterns and many companies and organizations are working on it. Developers and software providers are rising to this challenge, turning big data management into a booming industry with major players in both private industry and open source communities. [Villanova University official website, 2013]

Security in Big Data
People create 2.5 quintillion bytes of data every day and almost 90% of the data in the world today has been cre...

... middle of paper ...

...eedings of the 4th International Symposium on Information, Computer, and Communications Security. techterms Website, "P2P", [Internet] http http://www.techterms.com/definition/p2p [Accessed December 05, 2013]
SearchCIO.comofficial website, “digital rights management [DRM]”, [Internet] http://searchcio.techtarget.com/definition/digital-rights-management [Accessed December 05, 2013]
David Cash, Alptekin Küpçü, Daniel Wichs [2013] Dynamic Proofs of Retrievability via Oblivious RAM, Advances in Cryptology – EUROCRYPT 2013.
C. Chris Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia,[2012]Dynamic Provable Data Possession, Brown University, The 42nd IPP Symposium.
Jinyuan Li, Maxwell Krohn, David Mazieres, Dennis Shasha, Secure Untrusted Data Repository [SUNDR], NYU Department of Computer Science, 6th Symposium on Operating System Design and Implementation.

More about Large Collection of Data: Secure Big Data

Open Document