Chapter 5 - Big Data Implementation Part 3 (Security)
Chapter 5 - Big Data Implementation Part 3 (Security)
IMPLEMENTATION
BIG DATA SECURITY
Introduction
The analysis of Big data depends on the structure of the data, which
includes structured data, semi-structured data and unstructured
data.
However, regardless of the structure of Big data has volume
characteristics. Hence, in data analysis, the biggest challenge is the
scalability of Big data
In recent decades, researchers paid more and more attentions to
processor performance and accelerate analysis algorithms.
ANALYTICS
For the former, CPU (central processing unit) is embedded with more
and more cores, which lead to the progress in processor parallel
computing. For the later, it is important to develop online and multi-
resolution analysis methods for all machine learning technologies. These
2 aspects determine the long-term development and success of Big data.
For Big data analysis, data encryption is an effective way to protect
privacy. However, the huge amount of data increases the security load.
Moreover, distributed storage of Big data also increases the risk in data
analysis process.
Specifically, for real-time Big data applications, such as social networks,
intelligent transportation, navigation, stock analysis, and so on, the
requirement of timeliness for data stream analysis is a greater challenge
to encryption methods and security protection.
SOCIAL MEDIA
0
5
Intrusion
Detection &
Prevention
Big Data Security
Technologies
Encryption