{"title":"五十六大数据V的特点和克服安全和隐私挑战的建议策略(BD2)","authors":"Abouelela Abdou Hussein","doi":"10.4236/jis.2020.114019","DOIUrl":null,"url":null,"abstract":"The amount of data that is traveling across the internet today, including \nvery large and complex set of raw facts that are not only large, but also, \ncomplex, noisy, heterogeneous, and longitudinal data as well. Companies, \ninstitutions, healthcare system, mobile application capturing devices and \nsensors, traffic management, banking, retail, education etc., use piles of data \nwhich are further used for creating reports in order to ensure continuity \nregarding the services that they have to offer. Recently, Big data is one of \nthe most important topics in IT industry. Managing Big data needs new \ntechniques because traditional security and privacy mechanisms are inadequate \nand unable to manage complex distributed computing for different types of data. \nNew types of data have different and new challenges also. A lot of researches \ntreat with big data challenges starting from Doug Laney’s landmark paper, during the previous two \ndecades; the big challenge is how to operate a huge volume of data that has to \nbe securely delivered through the internet and reach its destination intact. \nThe present paper highlights important concepts of Fifty-six Big Data V’s \ncharacteristics. This paper also highlights the security and privacy Challenges \nthat Big Data faces and solving this problem by proposed technological \nsolutions that help us avoiding these challenging problems.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2020-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Fifty-Six Big Data V’s Characteristics and Proposed Strategies to Overcome Security and Privacy Challenges (BD2)\",\"authors\":\"Abouelela Abdou Hussein\",\"doi\":\"10.4236/jis.2020.114019\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The amount of data that is traveling across the internet today, including \\nvery large and complex set of raw facts that are not only large, but also, \\ncomplex, noisy, heterogeneous, and longitudinal data as well. Companies, \\ninstitutions, healthcare system, mobile application capturing devices and \\nsensors, traffic management, banking, retail, education etc., use piles of data \\nwhich are further used for creating reports in order to ensure continuity \\nregarding the services that they have to offer. Recently, Big data is one of \\nthe most important topics in IT industry. Managing Big data needs new \\ntechniques because traditional security and privacy mechanisms are inadequate \\nand unable to manage complex distributed computing for different types of data. \\nNew types of data have different and new challenges also. A lot of researches \\ntreat with big data challenges starting from Doug Laney’s landmark paper, during the previous two \\ndecades; the big challenge is how to operate a huge volume of data that has to \\nbe securely delivered through the internet and reach its destination intact. \\nThe present paper highlights important concepts of Fifty-six Big Data V’s \\ncharacteristics. This paper also highlights the security and privacy Challenges \\nthat Big Data faces and solving this problem by proposed technological \\nsolutions that help us avoiding these challenging problems.\",\"PeriodicalId\":57259,\"journal\":{\"name\":\"信息安全(英文)\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-08-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"信息安全(英文)\",\"FirstCategoryId\":\"1093\",\"ListUrlMain\":\"https://doi.org/10.4236/jis.2020.114019\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"信息安全(英文)","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.4236/jis.2020.114019","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Fifty-Six Big Data V’s Characteristics and Proposed Strategies to Overcome Security and Privacy Challenges (BD2)
The amount of data that is traveling across the internet today, including
very large and complex set of raw facts that are not only large, but also,
complex, noisy, heterogeneous, and longitudinal data as well. Companies,
institutions, healthcare system, mobile application capturing devices and
sensors, traffic management, banking, retail, education etc., use piles of data
which are further used for creating reports in order to ensure continuity
regarding the services that they have to offer. Recently, Big data is one of
the most important topics in IT industry. Managing Big data needs new
techniques because traditional security and privacy mechanisms are inadequate
and unable to manage complex distributed computing for different types of data.
New types of data have different and new challenges also. A lot of researches
treat with big data challenges starting from Doug Laney’s landmark paper, during the previous two
decades; the big challenge is how to operate a huge volume of data that has to
be securely delivered through the internet and reach its destination intact.
The present paper highlights important concepts of Fifty-six Big Data V’s
characteristics. This paper also highlights the security and privacy Challenges
that Big Data faces and solving this problem by proposed technological
solutions that help us avoiding these challenging problems.