Storage Infrastructure Management
Storage Infrastructure Management
With the exponential growth of data ,the responsibility to keep it secure and integral also grow.There
are many challenges which are to be faced in this process of maintaining data privacy and security
since the amount of data handling at any instance is huge.
These are some of the challenges that are faced while striving to maintain data privacy:
Most of the existing big data are stored in distributed,horizontal and scalable manner such as
HDFS,tachyon,QFS,Ceph ,GlusterFS .Though these schemes are good in storability and scalability,they
do not guarantee concurrency and do not meet the security needs of cloud applications.security of
distributed data is also a tough job.
Analytical challenges
Data scalability is the greatest challenge in analysis of data.Data privacy is usually provided by data
encryption methods.But with increase in size increases the security load.Distributed storage of data
will cause tough time in analysing the data.
Transmit and sharing challenges
Big data usually take greater transmission time.There are 2 solutions in order to reduce the
transmission delay.They are:
● Keep the big data and send only the analysis result
● Classify the data and send only the important data downstream
Cooperation of different companies for customer and business data sharing adds to the risk of client
privacy disclosure, since most of the user/client data are managed by big companies.
Just a wide range of data sharing is not important ,it must also ensure a secure and trusted
environment
Techniques
Homomorphic encryption
Encrypted text is operated directly without any decryption.Noise is difficult to control therefore it
shows low efficiency in cloud environment.
Secure multiparty computation
It calculates a function f in a distributed cloud environment for multiple parties with their private
input.Each parity is given their input and their output for the given inputs.The result of honest
parties are in no way affected by the dishonest parties.
Attribute based encryption
In this form of encryption the data is labelled by their owners using some set of attributes.The user of
the data is required to provide the legal authority for those attributes.Only then the data is decrypted
using those attributes and delivered to the user.
One of the important sources of big data is social networks.The data in these networks are managed in
form of graphs.Therefore the way of data protection is very different from that in structured form like
table.User information like users’ location and identity has to be secured .Attackers usually try to steal
these information by exploiting attributes of the nodes in the above mentioned graph structure.these
type of graph structures use anonymous privacy securing schemes like t-closeness,t-diversity and
k-anonymity
Drawbacks
Need for technical expertise
Working with big data needs a great deal of technical proficiency and there are only few people who
match those deal of technical proficiency. That is one of the key reasons for which big data experts
and data scientists are highly paid.
Training existing staff or hiring experts to handle big data can easily increase the cost of a business
considerably.This can be an efficient solution to the problem of technical expertise.rather than hiring
individual with technical proficiency in handling big data,companies can themselves train people and
increase their proficiency which can help the company to increase its performance considerably .
Rather than following the general template of big data analysis techniques companies can create
custom strategies to suit their company’s data analysis.By this approach the companies need not
make huge differences to their business strategies or change them completely and can save
considerable amount of money.
CONCLUSION
Data powers almost everything these days and businesses have only started to scratch the surface of
the possibilities and with the explosion of artificial intelligence and Internet of Things (IoT) devices,
big data has become more valuable than ever before. But no matter the business, government or
organizational need for big data, it remains crucial for big data operations to develop best practices
for real-time analysis that protect private user information.With the explosion of artificial
intelligence and Internet of Things (IoT) devices, big data has become more valuable than ever
before.
Since big data is a developing technology ,the awareness about its security is still not so huge.Hence
some level of importance should be given to the security of big data.In future big data will really be
an inevitable part in everyday life.