0% found this document useful (0 votes)
49 views11 pages

Storage Infrastructure Management

There are many challenges in securing big data, including storage, sharing, and analytical challenges. Techniques like homomorphic encryption, secure multiparty computation, and attribute-based encryption can help address these challenges but have drawbacks like low efficiency. Companies must train existing staff or hire experts to properly handle big data security, as this emerging field requires significant technical proficiency.

Uploaded by

swe tha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views11 pages

Storage Infrastructure Management

There are many challenges in securing big data, including storage, sharing, and analytical challenges. Techniques like homomorphic encryption, secure multiparty computation, and attribute-based encryption can help address these challenges but have drawbacks like low efficiency. Companies must train existing staff or hire experts to properly handle big data security, as this emerging field requires significant technical proficiency.

Uploaded by

swe tha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Challenged and techniques in

big data security and privacy


- Swetha.M
( 17C104 )
ABSTRACT

In recent days,due to the development of information and network there is a data


explosion.Due to drastic increase in the amount of web services and cloud computing the
amount of data to be handled has also increased from petabyte to exabyte and zetabyte in
just two decades.A dataset is called as a big data if it large and contains some valuable
information.
There are many challenges in handling big data.Some of the important challenges include
security and privacy issues.
Usually these risks are overcome by utilizing cryptographic technologies and trusted
computing environments in case of ordinary users.
But in the case of big companies who act both as producers as well as managers of those
data,it is difficult to maintain privacy and security just by technical means.
INTRODUCTION

With the exponential growth of data ,the responsibility to keep it secure and integral also grow.There
are many challenges which are to be faced in this process of maintaining data privacy and security
since the amount of data handling at any instance is huge.

These are some of the challenges that are faced while striving to maintain data privacy:

● Storage and management challenges


● Transmit and sharing challenges
● Analytical challenges
Challenges
Storage and management challenges

Most of the existing big data are stored in distributed,horizontal and scalable manner such as
HDFS,tachyon,QFS,Ceph ,GlusterFS .Though these schemes are good in storability and scalability,they
do not guarantee concurrency and do not meet the security needs of cloud applications.security of
distributed data is also a tough job.

Analytical challenges

Data scalability is the greatest challenge in analysis of data.Data privacy is usually provided by data
encryption methods.But with increase in size increases the security load.Distributed storage of data
will cause tough time in analysing the data.
Transmit and sharing challenges

Big data usually take greater transmission time.There are 2 solutions in order to reduce the
transmission delay.They are:
● Keep the big data and send only the analysis result
● Classify the data and send only the important data downstream
Cooperation of different companies for customer and business data sharing adds to the risk of client
privacy disclosure, since most of the user/client data are managed by big companies.
Just a wide range of data sharing is not important ,it must also ensure a secure and trusted
environment
Techniques

Homomorphic encryption

Encrypted text is operated directly without any decryption.Noise is difficult to control therefore it
shows low efficiency in cloud environment.
Secure multiparty computation
It calculates a function f in a distributed cloud environment for multiple parties with their private
input.Each parity is given their input and their output for the given inputs.The result of honest
parties are in no way affected by the dishonest parties.
Attribute based encryption

In this form of encryption the data is labelled by their owners using some set of attributes.The user of
the data is required to provide the legal authority for those attributes.Only then the data is decrypted
using those attributes and delivered to the user.

Anonymous protection in social network

One of the important sources of big data is social networks.The data in these networks are managed in
form of graphs.Therefore the way of data protection is very different from that in structured form like
table.User information like users’ location and identity has to be secured .Attackers usually try to steal
these information by exploiting attributes of the nodes in the above mentioned graph structure.these
type of graph structures use anonymous privacy securing schemes like t-closeness,t-diversity and
k-anonymity
Drawbacks
Need for technical expertise
Working with big data needs a great deal of technical proficiency and there are only few people who
match those deal of technical proficiency. That is one of the key reasons for which big data experts
and data scientists are highly paid.

Changes in business strategies


Real-time analysis requires constant data collection rather than periodic collection, requiring major
changes to business strategies and a significant investment of money.And in order to carry out
real-time analysis, companies can’t simply depend on software alone.They must hire data scientists,
experts on big data visualization and other related professionals in order to make sense of the
information, which further adds to the price of admission.
SUGGESTIONS

Training existing staff or hiring experts to handle big data can easily increase the cost of a business
considerably.This can be an efficient solution to the problem of technical expertise.rather than hiring
individual with technical proficiency in handling big data,companies can themselves train people and
increase their proficiency which can help the company to increase its performance considerably .

Rather than following the general template of big data analysis techniques companies can create
custom strategies to suit their company’s data analysis.By this approach the companies need not
make huge differences to their business strategies or change them completely and can save
considerable amount of money.
CONCLUSION

Data powers almost everything these days and businesses have only started to scratch the surface of
the possibilities and with the explosion of artificial intelligence and Internet of Things (IoT) devices,
big data has become more valuable than ever before. But no matter the business, government or
organizational need for big data, it remains crucial for big data operations to develop best practices
for real-time analysis that protect private user information.With the explosion of artificial
intelligence and Internet of Things (IoT) devices, big data has become more valuable than ever
before.

Since big data is a developing technology ,the awareness about its security is still not so huge.Hence
some level of importance should be given to the security of big data.In future big data will really be
an inevitable part in everyday life.

You might also like