Professional Documents
Culture Documents
A Seminar Report
Submitted by
Diksha Tripathi
(Roll no. 2015024150)
MCA-IInd Yr
Under the Guidance of Mr. R.K. Dwivedi
(Assistant Professor)
3. Reason Analysis
5. Network Security
6. Conclusion
7. References
1.Introduction
The development of the current big data is still faced with many problems
especially security and privacy protection.
A number of actual cases show that personal privacy will be exposed even after
harmless data being collected.
Currently many organizations realize the big data security issues and actively take
actions on big data information security problems.
2.Threats of Big Data Security
Data Acquisition
Storage of Data
Data Mining
2.1.Data Acquisition
Big data not only means the huge amounts of data, but also means more complex
The centralized storage of these data increases the risk of data leakage.
2.2.Storage of Data
Viruses and malicious software code hidden in large data is hard to find
Failure to properly handle big data will cause great violations to users' privacy.
Its effects should not be underestimated and simply using information security
Data Provider : The user who owns some data that are desired by the data mining
task.
Data collector : The user who collects data from data providers then publish the data
Data Miner : The user who performs the data mining tasks on the data.
Decision Maker : The user who makes decisions based on the data mining results in
Fig: Data distribution: (a) centralized data (b) Horizontally partitioned data
(c) Vertically partitioned data
3.Reason Analysis
Lack of world recognized laws and regulations for data security and privacy
protection.
The cloud infrastructure has not a uniform and reliable authentication, which
Individual User
Internet Enterprise
The core and basic techniques to provide privacy protection are still in developing
period.
Current edge anonymity schemes are mainly based on adding and deleting of the
edges.
There are problems in such methods that noises randomly added are exiguity, and
protections to anonymous edges are insufficient.
To solve such issues are making network free from them and turning network into
Symmetrical encryption, public key encryption are available to encrypt data and
quickly.
This incorporation of unstructured data and multiple disparate data sets into a
security.
data removing.
There is an urgent need of improved solutions concerning the users to control the