.1 Big data
Big data[1] is described as huge massive amount of data which is complex , diverse, heterogeneous in nature. These data are difficult to process, analyze and store by traditional systems[4].
According to review conducted on Big data[1], It is studied that nowadays we are awashed with digital data. Till 2003, 5 exabytes of data was created, but today this figure can be achieved in 2 days. Volume of data is increasing in such a pace that it would reach to 8 zettabytes in coming Year. Currently, In order to store to all world's data, it would requires billion of powerful computers. A vast variety of semi structured or unstructured data is created by social media. 10 billion text messages are sent by mobile subscribers daily. Velocity with which videos, audios, tweets, posts, emails, social interactions are created is really unprecedented. Due to increase in massive amount of data, it is estimated that information would increase by 50 times in the coming 10 years. Big data have its importance in many fields like storing logs in IT industries, storing and analyzing disease pattern in healthcare, digital data optimization, Social media interactions, demand forecasting and risk reduction in financial institutions. But security and privacy is considered as main issue for big data. So it needs to be tackle by implementing framework which includes authentication or cryptographic secure system.
2.2 MapReduce
At the time when we are deluged with data, parallel processing of tasks has become essential to process huge amount of data in reasonable time. MapReduce[8] is a programming tool developed by Google to process large datasets running on parallel computers like commodity clusters. The main idea of the MapReduce mode...
... middle of paper ...
...ons i.e., it doesn't move to next stage until all the tasks of previous stage are completed . but this property causes performance degradation and makes it difficult to support online processing. An incremental MapReduce framework is developed, which processes data like streaming engines. Each task runs continuously with a sliding window. Their system generates outputs of MapReduce by reading the items within the window.
e) Performance Tuning: MapReduce programs are used for data analysis mostly. In order to complete these programs in reasonable time, it is best to provide the feature of automatic optimization for MapReduce programs. An static analysis approach called MANIMAL for automatic optimization of a single Map- Reduce job is proposed. In their approach, an analyzer examines program codes before execution without any runtime information.
2.3 HBase
rapidly chooses how to convey the set of uses and framework servers over different machines in the cloud. Large portions of the conventional parallel applications for the most part utilize an altered number of strings on the other hand procedures characterized as a parameter toward the begin of the application. The choice for the number of strings is frequently chosen by the client in a push to completely use the parallel assets of the framework or to take care of top demand of a specific administration. fos utilizes the duplicated server model which permits extra transforming units to be alterably included amid runtime permitting the framework to attain a finer use for element workloads and lightening the client from such
Big Data is characterized by four key components, volume, velocity, variety, and value. Furthermore, Big Data can come from an array sources such as Facebook, Twitter, call
...now use. Majority of the world’s data is unstructured. Big data technology lets us analyze and bring together data of different types. A common theme in the data is that it is diverse. It doesn’t fall into a relational structure. Different browsers send different data; users withhold information, different forms of software versions, or vendors to communicate with you. There will be many errors and inconsistency if the process involves people. Big data is used to take unstructed data and extract ordered meaning. This is for consumption by users or it is structured input into an application.
In today’s society, technology has become more advanced than the human’s mind. Companies want to make sure that their information systems stay up-to-date with the rapidly growing technology. It is very important to senior-level executives and board of directions of companies that their systems can produce the right and best information for their company to result in a greater outcome and new organizational capabilities. Big data and data analytics are one of those important factors that contribute to a successful company and their updated software and information systems.
Big Data is a term used to refer to extremely large and complex data sets that have grown beyond the ability to manage and analyse them with traditional data processing tools. However, Big Data contains a lot of valuable information which if extracted successfully, it will help a lot for business, scientific research, to predict the upcoming epidemic and even determining traffic conditions in real time. Therefore, these data must be collected, organized, storage, search, sharing in a different way than usual. In this article, invite you and learn about Big Data, methods people use to exploit it and how it helps our life.
Social medias have become a big part of our society now, they are being used in all aspects of our life. We are connected twenty-four hours a day, at work, school, home, shopping etc. There is a necessity, a need to be connected to these social media’s, to feel like you are a part of society. With these growing numbers in being connected to social media’s on the web, there comes a growing desire for privacy and safety. In this paper I will discuss and analyze the social media’s themselves, the dangers that arise from them, and how all these correlate to privacy.
Despite the numerous advantages offered by cloud computing, security is a big issue concerned with cloud computing. There are various security issues and concerns associated with cloud computing, among them being phishing, data loss and data privacy. There are different mitigation measures that cloud pioneers are currently using to ensure data stored in the cloud remain secure and confidential as intended. Encryption is one mitigation method used to ensure security in cloud computing. According to Krutz and Vines (2010), encryption involves coding of the data stored in the computing cloud such that hackers cannot gain access to the data. Data encryption seems to be the most effective method of ensuring security in computing (Krutz and Vines, 2010). However, it is of paramount importance to note that encrypted data is usually difficult to search or perform various calculations on it.
Friedman, Uri. “Big Data: A Short History.” foreignpolicy.com. Foreign Policy, 8 Oct. 2012. Web. 16 Mar. 2014.
Big data will then be defined as large collections of complex data which can either be structured or unstructured. Big data is difficult to notate and process due to its size and raw nature. The nature of this data makes it important for analyses of information or business functions and it creates value. According to Manyika, Chui et al. (2011: 1), “Big data is not defined by its capacity in terms of terabytes but it’s assumed that as technology progresses, the size of datasets that are considered as big data will increase”.
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including:
This white paper identifies some of the considerations and techniques which can significantly improve the performance of the systems handling large amounts of data.
Today internet privacy has become a major issue in day to day life with the introduction of social media. Personal information like photos, videos should be maintained securely in social media accounts. Moreover, internet surfing has become dangerous with the hackers. Information in websites can be hack if the necessary steps are not taken thus privacy of data will not ensure.
Technology has advanced tremendously over the past decade, and appears to be advancing at a rapid pace each and every day. The social media is growing just as rapidly. Social media is an interaction between individuals that want to exchange information, photographs, and ideas in different types of networks. Social media users include people of all ages. These people have various experiences, have different cultures, and have various technical skills. (Brandtzaeg 1008) The social media depend on net-based technologies to generate the network for users to share. Social media includes everything that has to do with the Internet. By using the Internet, users can communicate with people locally and worldwide. People are no longer required to travel across the world to experience another culture. This can be done with social networking. The types of social media today come with many different types of communication such as social blogs, wall-postings, songs, photographs, and podcasts. The communication between users is informational, interactive, and also educational. However, unfortunately, most social networking sites keep track of all the interactions that take place, and this is a concern about Internet privacy for Facebook, Twitter, Google, and other social media users. Not only do they keep track of all interactions by the users, they also own all the content, including pictures that the users upload. The social network keeps this information on the user, even if the user deactivates their account with that particular site. Most users do not have any idea that the operator of the networking service keeps this information, and has access to all pictures and tags. By not having adequate security...
Adopting big data can also help the banking industry by saving them from lots of embarrassment resulting from increase in the number of customer which in turn requires banks to improve on their performance. As stated earlier banks are entrusted with lots of information and this information must be safe will be required to be accessed ready and in a timely fashion. The use a normal small database will not be enough to perform this operation and if banks don’t embrace the use of big data they might start to experience failure in there system.