Infrastructure of Big Data

Added on - 25 Sep 2019

  • 10


  • 2975


  • 201


  • 0


Trusted by +2 million users,
assist thousands of students everyday
Showing pages 1 to 3 of 10 pages
Big Data Privacy
AbstractIn recent time big data become a future topic all over the world. As the volume of big data increasethe breach in privacy with people data and information are also increases. Big data always requirehigh computational and big storage power that make people use distributed systems to manage theirlarge amount of data. Distributed systems mainly consist of so many different parties whichincrease the risk of privacy among the users.As the amount of big data increase the breach in privacy with people data and information are alsoincreases. Big data always require high computational and big storage power that make people usedistributed systems to manage their large amount of data. Distributed systems mainly consist of somany different parties which increases the risk of privacy among the users.The main aim of this paper is to provide a complete overview of data preservation methods in bigdata and current challenges for previous mechanisms. In this paper, we are going to explain aboutthe infrastructure of big data and their data preservation mechanism in each stage of their life cycle.After that, we also going to discuss the future research and challenges related to privacypreservations in big data.Keywords:Big Data, Privacy & Security , Big Data Processing
IntroductionDue to the huge development in recent technology, the amount of data generated by a different typeof IoT devices and applications increases day by day at a very high rate. All the big amount of datagenerated from a different type of sources in a different format a high rate is a term as big data. Dueto its high generation rate, it becomes very hard to handle all those data using old systems andtraditional processes. Big data property mainly reflected by 3V’s, which define as volume, velocity,and variety. If big data can capture and manage in a timely manner then it will very beneficial forboth enterprise and user as well. It can help the business enterprise in the decision making theprocess by providing data analysis of big data.According to International Data Corporation, Big Data explain as “ a new generation technology orarchitecture which mainly design to extract the fine data according to requirements from a huge andwide variety of data by doing analysis.In the above figure volume mainly represent the generated amount of data, the rate at which data isgenerated through various IoT devices, here diverse nature of data is denoted as variety. Theenormous amount of data is responsible for the increase in a privacy breach. Most of the websitesand other social applications use our data to analyze day to day activities as well as browsinghistory to get commercial benefits. Privacy of user breached under the following conditions :a) When using personal data and information attached to outer datasets leads to a new fact about theuser. Maybe those new fact are important, secret and not supposed to know by others.b) Few times personal information mainly collected to add value in the business by knowing theircustomer personal information and habits.c) when important data and information not placed in a secure place then leakage of data occurduring processing and storage phase.In recent years Big Data plays a major role in the IT industry by introducing completely a newconcept as well as the enterprise system. The previous system is very old and a little bit expensiveas well as complex in implementation and use. To prevent this type of situation cloud-basedenterprise system is recently introduced to provide flexibility, scalability, and independence in theinfrastructure of IT. Due to lack of much research and literature, this area is still completely notexplored but nowadays it attracted high interest from the general user. This paper going to explainabout the challenges and advantages of cloud enterprise system as well as their potential to ease thedaily life of the user.
You’re reading a preview
Preview Documents

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Download This Document