Question:
Discuss About The Current Situation The Information Technology World?
Big Data generally refers to the gathering of huge amount of data sets and complex information. In this current situation the information technology world there we can see an issue where these technologies are exceeding the existing storage, communicational and computational capacities of conventional systems [1]. There are various techniques to connect to people or organization by the use of internet or any other conventional way. The technique and information that helps in connecting, is incrementing in a huge rate and volume. But this rapid increase is also creating a concern about the privacy and security issues of the data. Based on the networking system and hierarchical models the database system has also advanced its area of use to the relational and objective database system [15]. By the implementation of web sources these database can also be accessed via data or web management services. Since there is a great concern about the security and privacy of these network systems, it is important to know the aspects of theses security concerns.
In this report we are going to review and research about the privacy and security issues in domain of Big Data and IoT (Internet of Things).
Big Data is the set of complex and large data that the traditional data processing software applications lack capability to handle. Big Data is mainly used to increase the storage capability and increase the processing power [2]. It is more complex and includes challenges like storage, analysis, data capturing, transfer files, sharing, visualization, querying, updating information and privacy. Knowledge management in Big Data has three main functionalities Volume, Variety and Velocity. Recently two more V’s has been included Values and Variability. There are several kind of tools in Big Data analysis like NoSQ, MapReduce that includes Hadoop, S3 storage, Servers and Processing. But as the benefits rises there is a constant introduction of new and vulnerable [3]. Three has been a rise in the security concern in each of these different domains. There are privacy and security issues of Big Data by the following aspects:
Similarly, IoT refers to the communication paradigm that is recently envisioned as one of the most vital part of everyday life. It is the network of networks which gives value added service and in which a lot of massive objects, sensor devices and digital devices are connected through the ICT (Information Communications Technology) infrastructure. The IoT gathers data and information at anytime and at anyplace, related to anyone and anything, initially implementing at the path of network and services [4]. There are privacy and security issues of Internet of things by the following aspects:
Consumers those uses free online services like social networking, emails, websites etc. are aware of the fact that consequently they become the part of the online service and hence become the data source for the organizational business. This helps in analyzing of data sources and improves the satisfaction of the customers. Here is where the conflict comes when these data are sold to third party for further analysis without the concern of the security and online service privacy of the customers [14].
The number of user’s data that are gathered has to be significantly larger from the past collection gathered. Some of these technologies can gather such sensitive information of customers by analyzing the daily activities that may range from the health conditions to financial records.
There are several security issues regarding Big Data and IoT [5]:
There is requirement of approximation in this real world since the analyzing and data collection tools have security aspect that has been functionally stored in the technology. The deployment of Security and Information Event Management (SIEM) solution is vital to aggregated logs in security system and the automatic identification of potential breaches. Hadoop is another simple way to identify the big data security and privacy issues [6]. Thus, Hadoop has become one of the most popularly used technologies to address breaches. There has been a range of security leading solutions that has been provided to evolve the technologies which are ideally commercial grade that to help the lock down process. These systems are generally added together by the open source contributors, for example Apache Accumulo. Therefore, by the introduction of Hadoop in Big Data security system, the remaining techniques that can be used are the authentication check and encryption [7].
IoT is a system comprising of physical gadgets, which are additionally embedded with sensors, hardware, and programming, in this way enabling these gadgets to trade information [9]. This at last permits better joining between genuine physical substances and PC worked frameworks. IoT is the following huge thing affecting our lives in significant ways and number of elements. Innovations like Column-arranged databases, SQL in Hadoop, Hive, Wibidata, PLATFORA, SkyTree, Storage Technologies, Schema-less databases, or NoSQL databases, Streaming Big Data investigation, Big Information Lambda Architecture, Map-lessen, PIG, and so on., helps in managing the huge measure of information created by IoT and different sources. Real difficulties that can bring ground breaking prizes when they are fathomed:
The above focuses are a portion of the difficulties that IoT huge information faces. The rate in information development in extending each second, stockpiling in a major test, handling and keeping up is significantly more repetitive [11]. The apparatuses that are created to deal with the two innovations are step by step changing as per the requirement.
Conclusion
Associations must guarantee that every enormous datum bases are resistant to security dangers and vulnerabilities. Amid information accumulation, all the fundamental security insurances, for example, ongoing administration ought to be satisfied. There is a requirement to work together on advancing the standards and practice to identify the threats and security issues regarding Big Data and Internet of things. Since IoT has the requirement of being developed from level for safety, thus has to be tested. There are a couple of territories of concern and security and protection and information gathering productivity are likely the most troublesome issues we are confronting. Remembering the enormous size of huge information, associations ought to recollect the way that overseeing such information could be troublesome and requires remarkable endeavors. Be that as it may, making every one of these strides would help keep up purchaser security. There is a need of developers to work along with the manufacturers to ensure the security at highest priority. So protecting the customers and organization has to be the primary concern not the second thought. This report is a survey about the IoT and Big information security system, the effects of IoT on enormous information, the huge information advances and the challenges. Since there is a noteworthy effect of IoT on enormous information we have to rapidly collected, total structure to deal with the day by day evolving conditions. Security bargain and wasteful aspects in information gathering instruments result in lost status, cash, time and exertion. Yet, there is trust in light of the fact that both the IoT and the enormous information are at a developing stage and there will be redesign
Reference
[1]M. Conti, A. Dehghantanha, K. Franke and S. Watson, “Internet of Things security and forensics: Challenges and opportunities”, Future Generation Computer Systems, 2017.
[2]G. Newe, “Delivering the Internet of Things”, Network Security, vol. 2015, no. 3, pp. 18-20, 2015.
[3]K. Sood, S. Yu and Y. Xiang, “Software-Defined Wireless Networking Opportunities and Challenges for Internet-of-Things: A Review”, IEEE Internet of Things Journal, vol. 3, no. 4, pp. 453-463, 2016.
[4]J. Ziegeldorf, O. Morchon and K. Wehrle, “Privacy in the Internet of Things: threats and challenges”, Security and Communication Networks, vol. 7, no. 12, pp. 2728-2742, 2013.
[5]M. Hussain, “Internet of Things: challenges and research opportunities”, CSI Transactions on ICT, vol. 5, no. 1, pp. 87-95, 2016.
[6]”Lack of security in Internet of Things devices”, Network Security, vol. 2014, no. 8, p. 2, 2014.
[7]J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang and W. Zhao, “A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications”, IEEE Internet of Things Journal, pp. 1-1, 2017.
[8]M. Eltayeb, “Internet of Things”, International Journal of Hyperconnectivity and the Internet of Things, vol. 1, no. 1, pp. 1-18, 2017.
[9]C. Tankard, “Big data security”, Network Security, vol. 2012, no. 7, pp. 5-8, 2012.
[10]G. Lafuente, “The big data security challenge”, Network Security, vol. 2015, no. 1, pp. 12-14, 2015.
[11]T. Win, H. Tianfield and Q. Mair, “Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing”, IEEE Transactions on Big Data, pp. 1-1, 2017.
[12]C. Constantine, “Big data: an information security context”, Network Security, vol. 2014, no. 1, pp. 18-19, 2014.
[13]C. Everett, “Big data – the future of cyber-security or its latest threat?”, Computer Fraud & Security, vol. 2015, no. 9, pp. 14-17, 2015.
[14]R. Kemp, “Legal aspects of managing Big Data”, Computer Law & Security Review, vol. 30, no. 5, pp. 482-491, 2014.
[15]H. Hassan, L. Yang and M. Qiu, “Special issue on Big Data Security and Intelligent Data in Clouds (BDS-IDC)”, Concurrency and Computation: Practice and Experience, vol. 29, no. 14, p. e4215, 2017.
[16]”Using big data to reduce security risks”, Computer Fraud & Security, vol. 2012, no. 8, p. 3, 2012.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download