Various Challenges in Security and Privacy

Added on -2019-09-25

| 8 pages
| 2089 words
| 161 views

Trusted by 2+ million users,
1000+ happy students everyday

Showing pages 1 to 3 of 8 pages

Running Head: PRIVACY AND SECURITY ISSUES IN BIG DATAINFORMATION SECURITY[Document subtitle]
PRIVACY AND SECURITY ISSUES IN BIG DATA1Executive SummaryBig data can be defined as the considerable amount of data which demands technologies and methods in order to get the value from the process of analysis. Because of the large size of data, it has become very difficult to extract the value by using the traditional techniques. The big data has various challenges in security and privacy because of its properties such as value, velocity, volume, etc. The organizations have started using big data, so it is very important to be aware of various challenges and issues of big data and the application of relevant technologies in order to face the challenges. The usage of big data analytics helps the organizations to extract large data as there are fewer chances of manipulation of data and big data helps the organization to get a competitive edge over the competition in the industry. The information has been collected from the various research papers in order to know the challenges and problems related to privacy and security associated with big data. The researchershave also discussed the relevant technologies and its applications which help in overcoming the problems and challenges.
PRIVACY AND SECURITY ISSUES IN BIG DATA2ContentsIntroduction......................................................................................................................................3Challenges and Problems.................................................................................................................4Relevant Technologies.....................................................................................................................4Application of Technologies............................................................................................................5Conclusion.......................................................................................................................................6REFERENCES................................................................................................................................7

Found this document preview useful?

You are reading a preview
Upload your documents to download
or
Become a Desklib member to get accesss

Students who viewed this