Fifty-Six Big Data V’s Characteristics and Proposed Strategies to Overcome Security and Privacy Challenges (BD2)

Abouelela Abdou Hussein
{"title":"Fifty-Six Big Data V’s Characteristics and Proposed Strategies to Overcome Security and Privacy Challenges (BD2)","authors":"Abouelela Abdou Hussein","doi":"10.4236/jis.2020.114019","DOIUrl":null,"url":null,"abstract":"The amount of data that is traveling across the internet today, including \nvery large and complex set of raw facts that are not only large, but also, \ncomplex, noisy, heterogeneous, and longitudinal data as well. Companies, \ninstitutions, healthcare system, mobile application capturing devices and \nsensors, traffic management, banking, retail, education etc., use piles of data \nwhich are further used for creating reports in order to ensure continuity \nregarding the services that they have to offer. Recently, Big data is one of \nthe most important topics in IT industry. Managing Big data needs new \ntechniques because traditional security and privacy mechanisms are inadequate \nand unable to manage complex distributed computing for different types of data. \nNew types of data have different and new challenges also. A lot of researches \ntreat with big data challenges starting from Doug Laney’s landmark paper, during the previous two \ndecades; the big challenge is how to operate a huge volume of data that has to \nbe securely delivered through the internet and reach its destination intact. \nThe present paper highlights important concepts of Fifty-six Big Data V’s \ncharacteristics. This paper also highlights the security and privacy Challenges \nthat Big Data faces and solving this problem by proposed technological \nsolutions that help us avoiding these challenging problems.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2020-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"信息安全(英文)","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.4236/jis.2020.114019","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

The amount of data that is traveling across the internet today, including very large and complex set of raw facts that are not only large, but also, complex, noisy, heterogeneous, and longitudinal data as well. Companies, institutions, healthcare system, mobile application capturing devices and sensors, traffic management, banking, retail, education etc., use piles of data which are further used for creating reports in order to ensure continuity regarding the services that they have to offer. Recently, Big data is one of the most important topics in IT industry. Managing Big data needs new techniques because traditional security and privacy mechanisms are inadequate and unable to manage complex distributed computing for different types of data. New types of data have different and new challenges also. A lot of researches treat with big data challenges starting from Doug Laney’s landmark paper, during the previous two decades; the big challenge is how to operate a huge volume of data that has to be securely delivered through the internet and reach its destination intact. The present paper highlights important concepts of Fifty-six Big Data V’s characteristics. This paper also highlights the security and privacy Challenges that Big Data faces and solving this problem by proposed technological solutions that help us avoiding these challenging problems.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
五十六大数据V的特点和克服安全和隐私挑战的建议策略(BD2)
今天在互联网上传播的数据量,包括一组非常庞大和复杂的原始事实,这些事实不仅庞大,而且复杂、嘈杂、异构和纵向数据。公司、机构、医疗保健系统、移动应用程序捕获设备和传感器、交通管理、银行、零售、教育等都会使用大量数据,这些数据将进一步用于创建报告,以确保其必须提供的服务的连续性。最近,大数据是IT行业最重要的话题之一。管理大数据需要新技术,因为传统的安全和隐私机制不足,无法管理不同类型数据的复杂分布式计算。新型数据也有不同的新挑战。在过去的二十年里,从Doug Laney的里程碑式论文开始,许多研究都在处理大数据挑战;最大的挑战是如何操作大量数据,这些数据必须通过互联网安全传输并完好无损地到达目的地。本文着重介绍了五十六大数据V的重要概念和特点。本文还强调了大数据面临的安全和隐私挑战,并通过提出的技术解决方案来解决这一问题,帮助我们避免这些具有挑战性的问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
211
期刊最新文献
Secure Web Application Technologies Implementation through Hardening Security Headers Using Automated Threat Modelling Techniques Research and Practice on High Availability Scheme of Unified Identity Authentication System Based on CAS in Colleges and Universities Learning with Errors Public Key Cryptosystem with Its Security User Station Security Protection Method Based on Random Domain Name Detection and Active Defense Towards a New Model for the Production of Civil Status Records Using Blockchain
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1