Security and Privacy of Big Data in Various Applications

Size: px
Start display at page:

Download "Security and Privacy of Big Data in Various Applications"

Transcription

1 , pp Security and Privacy of Big Data in Various Applications Abeer M. AlMutairi 1, Rawan Abdullah Turdi AlBukhary Department of Information Technology Faculty of Computing & Information Technology 2 Department of Information Technology Faculty of Computing & Information Technology Information Security Research Group Department of Information Systems Faculty of Computing & Information Technology 1 Abstract 1 and Jayaprakash Kar Due to the increasing use of technology and all of its resources such as computers, the Internet, mobile phone and social networks, the amount of existing data is increasing as well. The resultant from this expansion is called Big Data. Nowadays big data is becoming an essential source of information that feed organizations and impact economies and international decisions by increasing operational efficiencies and improving performance and even the detection of international threat attack. The data contain private and sensitive information that need to be kept secure and safe. In this article, we have discussed the most important security issues of big data in various applications. Keywords: Threat, Cloud security, Structure data 1. Introduction The invention of computers and the Internet long time ago, resulted in a manageable amount of electronic data that was stored in different and basic storage utilities. Then and close to current time, social networks and mobile smart phones were introduced. Having those simplified the use of the Internet and made it reachable to almost everyone around. The use was increasing day by day and the amount of data was increasing respectively resulting in Big Data. Big Data refers to a massive amount of data that is rapidly increasing and changing. It is consisted of text, images, documents, audio, video and other file types. It is stored mostly on the clouds where it is an accessible place from anywhere and all the time through the Internet. Having this amount of data makes it possible for organization and businesses to process and analyze the data to develop, enhance, and maintain their business. For example, in health care, big data can be used in many aspects regarding helping patients, their doctors, the hospital, pharmacies, ambulance system and etc. According to [1], sensitive Data which regularly contain sensitive and private information important to the user. Then, Non-sensitive data which is not as important to the user as the other type and no harm if it is published processed or stored. Despite the several advantages that big data provides, there is one main issue arising from the situation which is security. How to achieve security to sensitive data? How to protect data form unauthorized or harming use? And how to keep user s privacy intact and not invaded? Recently the term Big Data has become a hot topic not just in IT industries, but also in academia, industry, and governments, where the continuous advancements in technologies and telecommunications lead to an exponential growth of data. A lot of definitions describe the concept of big data and differentiate it from the typical data in 2 ISSN: IJBDSI Copyright c 2015 SERSC

2 different ways depending on its volume, velocity, and value to organizations and enterprises. The Gartner Research Company defined big data as high-volume, highvelocity and high-variety information assets that demand cost-effective, innovative forms of information processing for enhanced insight and decision making [7]. Nowadays big data is becoming an essential source of information that feed organizations and impact economies and international decisions. Governments and organizations who are gaining and harnessing big data brought many advantages for their own such as [6]: Increasing operational efficiency and operating margins by taking advantage of detailed customer data [17]. Improving performance by collecting more accurate and detailed performance data. Targeting users based on their needs. Improving decision making and minimizing risks. Invention of new business area, services and products. Improving threat detection capabilities of governments. Although the existence of Big Data can avail organizations and enterprises, the highvolume and variety of data brought the needs to find mechanisms for processing and analyzing the data. Big data is composed of the following data format [7]. Structured data: Data in fixed fields like relational databases or data in spreadsheets. Unstructured data: Usually contain the most sensitive data like free form text (e.g., books, articles, body of messages), un-tagged audio, image and video data. Semi-structured data: Data that are unconventional are essential to fix fields, but contain various markers and tags to segregate data elements like XML or HTML tagged text. 2. Security Goals The most important security goals for big data are Privacy Authenticity, Integrity Access Control In this article we brief these security requirements of big data in various application including healthcare applications, social networks, government, e-commerce, finance and science. 3. Healthcare Applications Harsh et al. [3] have described the evolution of healthcare filing system and the use of the Electronic Healthcare Records that are mostly stored in the clouds. It also indicated the multiple possible procedures that could happen invading user s privacy and rights. The authors encourage researchers to enhance technologies to keep users data private and secure especially with increase of data volumes and the refusal of cloud hosting companies to grant centralized access of cloud management and providing it as a shared distributed one. David et al. [4] has briefed about the need for storing patient s records in order to analyze and use them to improve many e-health sectors. In addition, he 20 Copyright c 2015 SERSC

3 highlighted the need for keeping those records secure and safe when they re stored waiting to be processed. To investigate that, there was a simulation of three technical environments of storing those records. The first one was the Plain Text environment where no encryption is conducted on records. The second was the Microsoft Encryption using Microsoft built-in tools. And the third was the Advanced Encryption Standard (AES) in conjunction with the Bucket Index in DaaS. Results indicated that AES-DaaS is more efficient and scales better than MS Encryption. It also advised that encryption is made to certain sensitive attributes to not overwhelm the IT physical resources in achieves secrecy and privacy in big data. 4. Social Networks Social networks are one of the main resources that is producing big data which can be used in harming the user as much as it can be useful or even more. Author mentioned the areas or organizations that could use the data of users and analyze it [5]. For example, organizations for marketing purposes, governments for surveillance purposes and even insurance companies to raise premium fees. The paper mentioned the issues that could result from using the social network and focused on the ones resulting from locations. The author has suggested three models to increase the privacy awareness and invited researchers to test and apply those models. Hao et al. [1] discuss the growth of big data to social networks focusing on the media data. The article proposes a scheme of security that encrypts the data to achieve confidentiality in big data stored in any format. But before encryption, it adds a fingerprint in order to establish relationship between users. This fingerprint is what makes scheme special and what maks encryption suitable for social networks. Testing scheme results showed that it is secure, efficient and has low computation time. 5. Finance Banks are now dealing with big data just like other areas. [11 researchers proposes a system design that deals with big data of the banking system while keeping under consideration the complexity and the multiple requirements a banking system must have requirements in processing, privacy and safety and even in storage. [14] introduced a privacy approach for big data applications including the financial ones that focuses on the concept of Order Preserving Encryption (OPE) where some fields are encrypted according to its sensitivity. In addition to that, the approach is concerned with information shared between multiple organizations and for that, authors suggest having private information on private clouds where it is strictly treated and processed. 6. E-commerce E-commerce is another example of applications that produce big data and all security and privacy issues must be resolved before security breaches could spread. An approach is proposed to e-commerce data that is stored on the cloud [12]. The approach uses an enhanced k-means clustering algorithm along with encryption to provide securityand hash function for authenticity. The scheme is designed for cloud data that is stored on more than one machine. Researchers suggested a quality model for increasing the quality of B2C e-commerce websites focusing on four quality factors [13]. Those factors are privacy, security, content and design. The model is expected to use a small amount of data and thus is suitable for the increasing amount transactions and users accessing e- commerce websites. Authors suggest implementing the model to real working websites in their future work. Copyright c 2015 SERSC 21

4 7. Government Due to the enormous growth in technologies, many government attempts to transfer their functions and services into digital governments where government agencies and public sectors exchange a high volume of information between heterogeneous information to achieve authenticity, integrity, availability, non-repudiation, controllability and reliability, along with privacy which was the only focus on traditional government security. The author suggests that Chinese government must construct its e-government based on several principles and security mechanisms for protection, monitoring, and recovering. The author concludes that e-government information security systems needs mutual efforts and coordinated as well improving to cope with the importance of big data. Governments adopt methods for collecting, processing, and analyzing big data to observe people s online activities to detect any suspicious behavior and criminal activities in order to prevent, detect crimes, and protect national security. Randall et al. [16] raise the concern of people awareness of collecting and using their personal data by government and the possibility of losing their privacy. The author suggests to adopt a privacy preserving approach over government datasets. Jeong et al. [18] analyze the privacy invasion based on many kinds of accidents from 2003 to 2013 in South Korea in order to study policy issues for ICT security. The study shows that the privacy invasion have been increased to over 200 after 2011 in South Korea because of the difference of culture and technology of big data and the need to design security policies according to these differences. The author advises governments to establish an organization that is responsible for ICT policy and management to handle new big data era. 8. Telecommunication The evolution of networks and smart phone devices have increased the wealth of information in telecommunications industry and communication service providers where data is generated whenever a subscriber to these companies use the Internet which lead to ever growing flow of data, hence make them a source of big data. Now a day communication service providers are aware of their big data and how to use these data to provide a valuable information about their customer s behavior and lifestyle. However, the needs to provide a secure electronic communications services to the customers and preserve their privacy while they using the Internet or making calls are very challenging. Grkaynak et al. [19] says that the dynamic nature of electronic communication technologies and the security concerns and challenges regarding electronic communications in big data era, forces national and international authorities to find unified solutions to fight against these challenges. They evaluate various legal frameworks for electronic communications security in European regulators and wither it conformed to Turkish laws. The Authors argue that the Turkish legal framework for electronic communications security is not comprehensive enough to embrace future developments in the electronic communications. Martucci et al. [20] argue that using cloud computing solutions is essential for the telecommunication industry. However, cloud computing brings privacy and security challenges that need to be taken into account before integrate it with telecommunications providers. Authors list the requirements for privacy, security and trust related to the integration of the telecommunication industry and cloud computing services. 9. Science Science and all its branches is one of the most important areas affected by the evolution of big data and its consequences. In [8], an emphasis on the potential data-driven researches that are now possible because of the big data concept and the positively different outcomes that are expected to result due to the use larger amounts of data and 22 Copyright c 2015 SERSC

5 more sophisticated digital tools. Another paper [9], introduces the use of data mining on big data to improve all aspects of science and engineering fields. The authors propose a theorem called HACE which focuses on the newly advent of big data and the powerful computers needed to process such type. The theorem suggests a model of three tiers and focuses one of them for keeping data private and secure along with the useful processing. One more area of science that is a bit closer to the Information Technology field than previously mentioned areas which is software engineering. [10], authors represent a privacy extension to the standard UML approach where all privacy requirements are apparent to the software engineer without the need to go through details. The proposed extension is tried on with a single stake holder as well as two and more stake holders each having their own privacy specifications. 10. Conclusions In this article, we have discussed critical security issues of big data in health care applications such as social networks, finance, e-commerce, government, telecommunication and science. These applications store massive volumes of data. The high-volume, high-velocity, and high-verity nature of big data brought the needs to find mechanisms for securing the data from different kind of attack and disclosure [17]. Also, an organization must carefully adopt security policies and technique to protect the big data from different kind of attacks. References [1] W. Hao, Secure Sensitive Data Sharing on a Big Data Platform, Tsinghua Science and Technology, vol. 17, no. 1, (2015), pp [2] J. Kar Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network International Journal of Network Security, Taiwan, vol. 16, no. 1, (2014) January, pp [3] K Harsh and S. Ravi, Big Data Security and Privacy Issues in Healthcare, 2014, IEEE International Congress on Big Data, (2014) pp [4] S. David, S. Tony and G. Randike, Secured e-health data retrieval in DaaS and Big Data, 15th IEEE International Conference on e-health Netwotking, Applications and Services, (2013) pp [5] S. Matthew, S. Christian, H. Benjamin, and V. Gabriele, Big Data Privacy Issues in Public Social Media, Digital Ecosystems Technologies (DEST), 6th IEEE International Conference, (2012), pp [6] C. Tankard, Big data security, Network security, vol. 2012, pp. 5-8, R. Devakunchari, Handling big data with Hadoop toolkit In Information Communication 0and Embedded Systems (ICICES), 2014 International Conference on, (2014), pp [7] D. Jacob, Data-driven medicinal chemistry in the era of big data, Drug Discovery Today, vol. 19, no. 7, (2014), pp [8] W. Xindong, Z. Zingquan, W. Gong-Qing and D. Wei, Data Mining with Big Data, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, vol. 26, no. 1, (2014), pp [9] N. Dawn, B. Peter and A. Sohail, Engineering Privacy for Big Data Apps with the Unified Modeling Language, IEEE International Congress on Big Data, (2013). [10] A. Munar and E. Chiner, I. Sales A Big Data Financial Information Management Architecture for Global Banking, 2014 International Conference on Future Internet of Things and Cloud, (2014), pp [11] M. Deepti, K. Damandeep and A. Ashish, Secure Data Mining in Cloud using Homomorphism Encryption, Cloud Computing in Emerging Markets (CCEM),IEEE International Conference, (2014), pp [12] D. Radwan and K. Mumtaz, Business-to-Consumer E-Commerce Web Sites: Vulnerabilities, Threats and Quality Evaluation Model Electronics, Communications and Computer (CONIELECOMP), 20th International Conference, (2010) pp [13] A. Mohammad, P. Ashkan and C. Dan, Security of Applications Involving Multiple Organizations - Order Preserving Encryption in Hybrid Cloud Environments, IEEE 28th International Parallel & Distributed Processing Symposium Workshops, (2014), pp [14] D. Zhao On Several Major Issues of the Construction of Chinese E-government Information Security System, in Business Computing and Global Informatization (BCGIN), International Conference, (2011), pp [15] S. M. Randall, A. M. Ferrante, J. H. Boyd, J. K. Bauer, and J. B. Semmens, Privacy preserving record linkage on large real world datasets, Journal of biomedical informatics, vol. 50, (2014), pp Copyright c 2015 SERSC 23

6 [16] J.Kar and M. R. Mishra, Mitigate Threats and Security Metrics in Cloud Computing, MAGNT Research Report, vol. 3, no. 4, (2015), pp [17] H. Moon, H. S. Chou, S. H. Jeong, and J. Park, Policy Design Based on Risk at Big Data Era: Case Study of Privacy Invasion in South Korea, in Big Data (BigData Congress), 2014 IEEE International Congress on, (2014), pp [18] Grkaynak, I. Yilmaz, and N. P. Taskiran Protecting the communication: Data protection and security measures under telecommunications regulations in the digital age, Computer Law & Security Review, vol. 30, (2014), pp [19] L. A. Martucci, A. Zuccato, B. Smeets, S. M. Habib, T. Johansson, and N. Shahmehri Privacy, security and trust in cloud computing: The perspective of the telecommunication industry, in Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), th International 24 Copyright c 2015 SERSC

Data Refinery with Big Data Aspects

Data Refinery with Big Data Aspects International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 655-662 International Research Publications House http://www. irphouse.com /ijict.htm Data

More information

ISSN:2321-1156 International Journal of Innovative Research in Technology & Science(IJIRTS)

ISSN:2321-1156 International Journal of Innovative Research in Technology & Science(IJIRTS) Nguyễn Thị Thúy Hoài, College of technology _ Danang University Abstract The threading development of IT has been bringing more challenges for administrators to collect, store and analyze massive amounts

More information

Abstract. 1. Introduction

Abstract. 1. Introduction 보안공학연구논문지 Journal of Security Engineering Vol.12, No.2 (2015), pp.181-190 http://dx.doi.org/10.14257/jse.2015.04.07 Abstract E-health is the delivery of health information, for health professionals and

More information

Business Analytics In a Big Data World Ted Malone Solutions Architect Data Platform and Cloud Microsoft Federal

Business Analytics In a Big Data World Ted Malone Solutions Architect Data Platform and Cloud Microsoft Federal Business Analytics In a Big Data World Ted Malone Solutions Architect Data Platform and Cloud Microsoft Federal Information has gone from scarce to super-abundant. That brings huge new benefits. The Economist

More information

A New Era Of Analytic

A New Era Of Analytic Penang egovernment Seminar 2014 A New Era Of Analytic Megat Anuar Idris Head, Project Delivery, Business Analytics & Big Data Agenda Overview of Big Data Case Studies on Big Data Big Data Technology Readiness

More information

A Study on Secure Electronic Medical DB System in Hospital Environment

A Study on Secure Electronic Medical DB System in Hospital Environment A Study on Secure Electronic Medical DB System in Hospital Environment Yvette E. Gelogo 1 and Sungwon Park 2 * 1 Catholic University of Daegu, Daegu, Korea 2 Department of Nursing, Hannam University, 133

More information

Cloud-based Distribute Processing of User-Customized Mobile Interface in U-Sensor Network Environment

Cloud-based Distribute Processing of User-Customized Mobile Interface in U-Sensor Network Environment , pp.18-22 http://dx.doi.org/10.14257/astl.2013.42.05 Cloud-based Distribute Processing of User-Customized Mobile Interface in U-Sensor Network Environment Changhee Cho 1, Sanghyun Park 2, Jadhav Yogiraj

More information

Big Data Collection Study for Providing Efficient Information

Big Data Collection Study for Providing Efficient Information , pp. 41-50 http://dx.doi.org/10.14257/ijseia.2015.9.12.03 Big Data Collection Study for Providing Efficient Information Jun-soo Yun, Jin-tae Park, Hyun-seo Hwang and Il-young Moon Computer Science and

More information

Research on the Performance Optimization of Hadoop in Big Data Environment

Research on the Performance Optimization of Hadoop in Big Data Environment Vol.8, No.5 (015), pp.93-304 http://dx.doi.org/10.1457/idta.015.8.5.6 Research on the Performance Optimization of Hadoop in Big Data Environment Jia Min-Zheng Department of Information Engineering, Beiing

More information

Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era

Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era Sponsored by Oracle Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era Introduction About Survey Respondents The Internet of Things (IoT) and the rise of

More information

ENVIRONMENTAL PRESSURES DRIVING AN EVOLUTION IN FILE STORAGE

ENVIRONMENTAL PRESSURES DRIVING AN EVOLUTION IN FILE STORAGE ENVIRONMENTAL PRESSURES DRIVING AN EVOLUTION IN FILE STORAGE JEFF LUNDBERG MAY 23, 2012 WEBTECH EDUCATIONAL SERIES ENVIRONMENTAL PRESSURES DRIVING AN EVOLUTION IN FILE STORAGE IT organizations are under

More information

Demystifying Big Data Government Agencies & The Big Data Phenomenon

Demystifying Big Data Government Agencies & The Big Data Phenomenon Demystifying Big Data Government Agencies & The Big Data Phenomenon Today s Discussion If you only remember four things 1 Intensifying business challenges coupled with an explosion in data have pushed

More information

Cloud Computing in Medical Diagnosis for improving Health Care Environment

Cloud Computing in Medical Diagnosis for improving Health Care Environment Cloud Computing in Medical Diagnosis for improving Health Care Environment Dr.V.Jeyabalaraja 1,Dr.M.S.Josephine 2 1 Professor, Velammal Engineering College, 2 Professor, Dr.MGR University, jeyabalaraja@gmail.com,

More information

Journal of Electronic Banking Systems

Journal of Electronic Banking Systems Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative

More information

A Design of Mobile Convergence Architecture for U-healthcare

A Design of Mobile Convergence Architecture for U-healthcare , pp. 253-260 http://dx.doi.org/10.14257/ijseia.2015.9.1.22 A Design of Mobile Convergence Architecture for U-healthcare Regin Joy Conejar 1 and Haeng-Kon Kim 1* 1 School of Information Technology Catholic

More information

Middleware- Driven Mobile Applications

Middleware- Driven Mobile Applications Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary

More information

New Design Principles for Effective Knowledge Discovery from Big Data

New Design Principles for Effective Knowledge Discovery from Big Data New Design Principles for Effective Knowledge Discovery from Big Data Anjana Gosain USICT Guru Gobind Singh Indraprastha University Delhi, India Nikita Chugh USICT Guru Gobind Singh Indraprastha University

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

A Survey on Cloud Computing Architectures for Healthcare

A Survey on Cloud Computing Architectures for Healthcare A Survey on Cloud Computing Architectures for Healthcare Pragnya Balamurukesan Department of Computer Engineering Dwarkadas J.Sanghvi College of Engineering, Mumbai,India Dr. Narendra M. Shekokar Head,

More information

Big Data - Security and Privacy

Big Data - Security and Privacy Big Data - Security and Privacy Elisa Bertino CS Department, Cyber Center, and CERIAS Purdue University Cyber Center! Big Data EveryWhere! Lots of data is being collected, warehoused, and mined Web data,

More information

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Image

More information

IoT Analytics: Four Key Essentials and Four Target Industries

IoT Analytics: Four Key Essentials and Four Target Industries IoT Analytics: Four Key Essentials and Four Target Industries 1 Introduction Analysts and IT personnel across all industries seek technology to better engage and manage data generated by the Internet of

More information

Driving Business Value Through Big Data Analytics Creating Winners And Disruptors

Driving Business Value Through Big Data Analytics Creating Winners And Disruptors Driving Business Value Through Big Data Analytics Creating Winners And Disruptors Gokula Mishra Vice President of Business Analytics Product Group Copyright 2014 Oracle and/or its affiliates. All rights

More information

BIG DATA: CRYPTOGRAPHICALLY ENFORCED ACCESS CONTROL AND SECURE COMMUNICATION

BIG DATA: CRYPTOGRAPHICALLY ENFORCED ACCESS CONTROL AND SECURE COMMUNICATION BIG DATA: CRYPTOGRAPHICALLY ENFORCED ACCESS CONTROL AND SECURE COMMUNICATION 1 AKASH GUPTA, 2 ALOK SHUKLA, 3 S. VENKATESAN 1,2,3 Indian Institute of Information Technology, Allahabad Abstract The evolution

More information

Distributed Framework for Data Mining As a Service on Private Cloud

Distributed Framework for Data Mining As a Service on Private Cloud RESEARCH ARTICLE OPEN ACCESS Distributed Framework for Data Mining As a Service on Private Cloud Shraddha Masih *, Sanjay Tanwani** *Research Scholar & Associate Professor, School of Computer Science &

More information

locuz.com Big Data Services

locuz.com Big Data Services locuz.com Big Data Services Big Data At Locuz, we help the enterprise move from being a data-limited to a data-driven one, thereby enabling smarter, faster decisions that result in better business outcome.

More information

The 4 Pillars of Technosoft s Big Data Practice

The 4 Pillars of Technosoft s Big Data Practice beyond possible Big Use End-user applications Big Analytics Visualisation tools Big Analytical tools Big management systems The 4 Pillars of Technosoft s Big Practice Overview Businesses have long managed

More information

Policy-based Pre-Processing in Hadoop

Policy-based Pre-Processing in Hadoop Policy-based Pre-Processing in Hadoop Yi Cheng, Christian Schaefer Ericsson Research Stockholm, Sweden yi.cheng@ericsson.com, christian.schaefer@ericsson.com Abstract While big data analytics provides

More information

A Study on Security and Privacy in Big Data Processing

A Study on Security and Privacy in Big Data Processing A Study on Security and Privacy in Big Data Processing C.Yosepu P Srinivasulu Bathala Subbarayudu Assistant Professor, Dept of CSE, St.Martin's Engineering College, Hyderabad, India Assistant Professor,

More information

A Hurwitz white paper. Inventing the Future. Judith Hurwitz President and CEO. Sponsored by Hitachi

A Hurwitz white paper. Inventing the Future. Judith Hurwitz President and CEO. Sponsored by Hitachi Judith Hurwitz President and CEO Sponsored by Hitachi Introduction Only a few years ago, the greatest concern for businesses was being able to link traditional IT with the requirements of business units.

More information

POLICIES TO MITIGATE CYBER RISK

POLICIES TO MITIGATE CYBER RISK POLICIES TO MITIGATE CYBER RISK http://www.tutorialspoint.com/information_security_cyber_law/policies_to_mitigate_cyber_risk.htm Copyright tutorialspoint.com This chapter takes you through the various

More information

North Highland Data and Analytics. Data Governance Considerations for Big Data Analytics

North Highland Data and Analytics. Data Governance Considerations for Big Data Analytics North Highland and Analytics Governance Considerations for Big Analytics Agenda Traditional BI/Analytics vs. Big Analytics Types of Requiring Governance Key Considerations Information Framework Organizational

More information

Proposed Module for Gynecological Integration Preventive Measures in the Electronic Health in Republic of Macedonia

Proposed Module for Gynecological Integration Preventive Measures in the Electronic Health in Republic of Macedonia Vol.7, No.1 (2015), pp.81-92 http://dx.doi.org/10.14257/ijbsbt.2015.7.1.09 Proposed Module for Gynecological Integration Preventive Measures in the Electronic Health in Republic of Macedonia Edona Doko

More information

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.

More information

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America 1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:

More information

Big Data, Big Risk, Big Rewards. Hussein Syed

Big Data, Big Risk, Big Rewards. Hussein Syed Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data

More information

Session 4 Cloud computing for future ICT Knowledge platforms

Session 4 Cloud computing for future ICT Knowledge platforms ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 Session 4 Cloud computing for future ICT Knowledge platforms Olivier Le Grand, Senior Standardization

More information

Seminar: Security Metrics in Cloud Computing (20-00-0577-se)

Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions

More information

A Q&A with the Commissioner: Big Data and Privacy Health Research: Big Data, Health Research Yes! Personal Data No!

A Q&A with the Commissioner: Big Data and Privacy Health Research: Big Data, Health Research Yes! Personal Data No! A Q&A with the Commissioner: Big Data and Privacy Health Research: Big Data, Health Research Yes! Personal Data No! Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada THE AGE OF

More information

An Intelligent Approach for Data Fortification in Cloud Computing

An Intelligent Approach for Data Fortification in Cloud Computing An Intelligent Approach for Data Fortification in Cloud Computing Supriya Mandhare 1, Prof. A. K. Sen 2, Asso. Prof. Rajkumar Shende 3 1,3 Department of Computer Engineering, St. Francis Institute of Technology,

More information

White Paper Achieving HIPAA Compliance through Security Information Management. White Paper / HIPAA

White Paper Achieving HIPAA Compliance through Security Information Management. White Paper / HIPAA White Paper Achieving HIPAA Compliance through Security Information Management White Paper / HIPAA Contents Executive Summary... 1 Introduction: Brief Overview of HIPAA... 1 The HIPAA Challenge: Protecting

More information

Associate Prof. Dr. Victor Onomza Waziri

Associate Prof. Dr. Victor Onomza Waziri BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

Privacy Preserving Public Auditing for Data in Cloud Storage

Privacy Preserving Public Auditing for Data in Cloud Storage Privacy Preserving Public Auditing for Data in Cloud Storage M.Priya 1, E. Anitha 2, V.Murugalakshmi 3 M.E, Department of CSE, Karpagam University, Coimbatore, Tamilnadu, India 1, 3 M.E, Department of

More information

Information Security, PII and Big Data

Information Security, PII and Big Data ITU Workshop on ICT Security Standardization for Developing Countries (Geneva, Switzerland, 15-16 September 2014) Information Security, PII and Big Data Edward (Ted) Humphreys ISO/IEC JTC 1/SC 27 (WG1

More information

Secure Cloud Computing Concepts Supporting Big Data in Healthcare. Ryan D. Pehrson Director, Solutions & Architecture Integrated Data Storage, LLC

Secure Cloud Computing Concepts Supporting Big Data in Healthcare. Ryan D. Pehrson Director, Solutions & Architecture Integrated Data Storage, LLC Secure Cloud Computing Concepts Supporting Big Data in Healthcare Ryan D. Pehrson Director, Solutions & Architecture Integrated Data Storage, LLC Learning Objectives After this session, the learner should

More information

Associate Professor, Department of CSE, Shri Vishnu Engineering College for Women, Andhra Pradesh, India 2

Associate Professor, Department of CSE, Shri Vishnu Engineering College for Women, Andhra Pradesh, India 2 Volume 6, Issue 3, March 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue

More information

Security Analysis of Cloud Computing: A Survey

Security Analysis of Cloud Computing: A Survey Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now

More information

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes

More information

Interactive data analytics drive insights

Interactive data analytics drive insights Big data Interactive data analytics drive insights Daniel Davis/Invodo/S&P. Screen images courtesy of Landmark Software and Services By Armando Acosta and Joey Jablonski The Apache Hadoop Big data has

More information

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

Biometric Authentication Platform for a Safe, Secure, and Convenient Society 472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.

More information

Mobile Cloud Computing In Business

Mobile Cloud Computing In Business Mobile Cloud Computing In Business Nilam S. Desai Smt. Chandaben Mohanbhai Patel Institute of Computer Applications, Charotar University of Science and Technology, Changa, Gujarat, India ABSTRACT Cloud

More information

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin. www.itmr.ac.in

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin. www.itmr.ac.in 01 0110 0001 01101 WHITE PAPER ON Data Encryption Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 NEED FOR DATA ENCRYPTION... 3 DUE CARE... 3 REPUTATIONAL RISK... 3 REGULATORY

More information

Next Internet Evolution: Getting Big Data insights from the Internet of Things

Next Internet Evolution: Getting Big Data insights from the Internet of Things Next Internet Evolution: Getting Big Data insights from the Internet of Things Internet of things are fast becoming broadly accepted in the world of computing and they should be. Advances in Cloud computing,

More information

Indian Journal of Science The International Journal for Science ISSN 2319 7730 EISSN 2319 7749 2016 Discovery Publication. All Rights Reserved

Indian Journal of Science The International Journal for Science ISSN 2319 7730 EISSN 2319 7749 2016 Discovery Publication. All Rights Reserved Indian Journal of Science The International Journal for Science ISSN 2319 7730 EISSN 2319 7749 2016 Discovery Publication. All Rights Reserved Perspective Big Data Framework for Healthcare using Hadoop

More information

5 Keys to Unlocking the Big Data Analytics Puzzle. Anurag Tandon Director, Product Marketing March 26, 2014

5 Keys to Unlocking the Big Data Analytics Puzzle. Anurag Tandon Director, Product Marketing March 26, 2014 5 Keys to Unlocking the Big Data Analytics Puzzle Anurag Tandon Director, Product Marketing March 26, 2014 1 A Little About Us A global footprint. A proven innovator. A leader in enterprise analytics for

More information

International Journal of Advanced Engineering Research and Applications (IJAERA) ISSN: 2454-2377 Vol. 1, Issue 6, October 2015. Big Data and Hadoop

International Journal of Advanced Engineering Research and Applications (IJAERA) ISSN: 2454-2377 Vol. 1, Issue 6, October 2015. Big Data and Hadoop ISSN: 2454-2377, October 2015 Big Data and Hadoop Simmi Bagga 1 Satinder Kaur 2 1 Assistant Professor, Sant Hira Dass Kanya MahaVidyalaya, Kala Sanghian, Distt Kpt. INDIA E-mail: simmibagga12@gmail.com

More information

Ashish R. Jagdale, Kavita V. Sonawane, Shamsuddin S. Khan

Ashish R. Jagdale, Kavita V. Sonawane, Shamsuddin S. Khan International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1156 Data Mining and Data Pre-processing for Big Data Ashish R. Jagdale, Kavita V. Sonawane, Shamsuddin S. Khan

More information

86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014

86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014 86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014 Dual server-based secure data-storage system for cloud storage Woong Go ISAA Lab, Department of Information Security Engineering,

More information

Comparative study of security parameters by Cloud Providers

Comparative study of security parameters by Cloud Providers Comparative study of security parameters by Cloud Providers Manish Kumar Aery 1 Faculty of Computer Applications, Global Infotech Institute of IT & Management (LPUDE) aery.manish1@gmail.com, Sumit Gupta

More information

REAL-TIME OPERATIONAL INTELLIGENCE. Competitive advantage from unstructured, high-velocity log and machine Big Data

REAL-TIME OPERATIONAL INTELLIGENCE. Competitive advantage from unstructured, high-velocity log and machine Big Data REAL-TIME OPERATIONAL INTELLIGENCE Competitive advantage from unstructured, high-velocity log and machine Big Data 2 SQLstream: Our s-streaming products unlock the value of high-velocity unstructured log

More information

Big Data & Analytics. A boon under certain conditions. Dr. Christian Keller General Manager IBM Switzerland. 2014 IBM Corporation

Big Data & Analytics. A boon under certain conditions. Dr. Christian Keller General Manager IBM Switzerland. 2014 IBM Corporation Big Data & Analytics A boon under certain conditions Dr. Christian Keller General Manager IBM Switzerland Agenda IBM at a glance What is Big Data? 4Vs The IBM point of view BD&A Market Opportunities Challenges

More information

Industry Trends & Challenges in Oil & Gas

Industry Trends & Challenges in Oil & Gas Industry Trends & Challenges in Oil & Gas Abbas Mehrabian Principal Consultant, Strategist HP Information Management & Analytics HP Supports the Oil & Gas sector of tomorrow 2 Industry Trends & Challenges

More information

Your Data, Any Place, Any Time. Microsoft SQL Server 2008 provides a trusted, productive, and intelligent data platform that enables you to:

Your Data, Any Place, Any Time. Microsoft SQL Server 2008 provides a trusted, productive, and intelligent data platform that enables you to: Your Data, Any Place, Any Time. Microsoft SQL Server 2008 provides a trusted, productive, and intelligent data platform that enables you to: Run your most demanding mission-critical applications. Reduce

More information

A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services

A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services , pp.21-30 http://dx.doi.org/10.14257/ijsia.2013.7.6.03 A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services Changsoo Lee 1, Daewon Jung 2 and Keunwang Lee 3 1 Dept.

More information

Improving Data Processing Speed in Big Data Analytics Using. HDFS Method

Improving Data Processing Speed in Big Data Analytics Using. HDFS Method Improving Data Processing Speed in Big Data Analytics Using HDFS Method M.R.Sundarakumar Assistant Professor, Department Of Computer Science and Engineering, R.V College of Engineering, Bangalore, India

More information

Security Threats on National Defense ICT based on IoT

Security Threats on National Defense ICT based on IoT , pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,

More information

Operation and Maintenance Management Strategy of Cloud Computing Data Center

Operation and Maintenance Management Strategy of Cloud Computing Data Center , pp.5-9 http://dx.doi.org/10.14257/astl.2014.78.02 Operation and Maintenance Management Strategy of Cloud Computing Data Center Wei Bai 1, Wenli Geng 1 1 Computer and information engineering institute

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON BIG DATA SECURITY IN CLOUD COMPUTING MISS. ANKITA S. AMBADKAR 1, PROF.

More information

UPS battery remote monitoring system in cloud computing

UPS battery remote monitoring system in cloud computing , pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology

More information

Mobile Cloud Computing and Regulatory Issues

Mobile Cloud Computing and Regulatory Issues Mobile Cloud Computing and Regulatory Issues 1 Have you ever used Mobile Cloud Computing? 2 Mobile Processor Storage Network Power Sensors/gadgets Personal Small Small Constant Change! Limited Battery

More information

Development of a Service Robot System for a Remote Child Monitoring Platform

Development of a Service Robot System for a Remote Child Monitoring Platform , pp.153-162 http://dx.doi.org/10.14257/ijsh.2014.8.5.14 Development of a Service Robot System for a Remote Child Monitoring Platform Taewoo Han 1 and Yong-Ho Seo 2, * 1 Department of Game and Multimedia,

More information

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing

More information

Dept. of Financial Information Security

Dept. of Financial Information Security Dept. of Financial Information Security Department of Financial Information Security offers an excellent education and interdisciplinary cutting-edge research programs to train future leaders and innovators

More information

To Enhance The Security In Data Mining Using Integration Of Cryptograhic And Data Mining Algorithms

To Enhance The Security In Data Mining Using Integration Of Cryptograhic And Data Mining Algorithms IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 06 (June. 2014), V2 PP 34-38 www.iosrjen.org To Enhance The Security In Data Mining Using Integration Of Cryptograhic

More information

Sources: Summary Data is exploding in volume, variety and velocity timely

Sources: Summary Data is exploding in volume, variety and velocity timely 1 Sources: The Guardian, May 2010 IDC Digital Universe, 2010 IBM Institute for Business Value, 2009 IBM CIO Study 2010 TDWI: Next Generation Data Warehouse Platforms Q4 2009 Summary Data is exploding

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

IMPLEMENTATION OF HYBRID SOFTWARE ARCHITECTURE FRAMEWORK IN CLINICAL INFORMATION SYSTEM: A CASE STUDY OF A MALAYSIAN CLINIC

IMPLEMENTATION OF HYBRID SOFTWARE ARCHITECTURE FRAMEWORK IN CLINICAL INFORMATION SYSTEM: A CASE STUDY OF A MALAYSIAN CLINIC VOL. 1, NO. 2, NOVEMBER 215 ISSN 1819-668 26-215 Asian Research Publishing Network (ARPN). All rights reserved. IMPLEMENTATION OF HYBRID SOFTWARE ARCHITECTURE FRAMEWORK IN CLINICAL INFORMATION SYSTEM:

More information

The Next Wave of Data Management. Is Big Data The New Normal?

The Next Wave of Data Management. Is Big Data The New Normal? The Next Wave of Data Management Is Big Data The New Normal? Table of Contents Introduction 3 Separating Reality and Hype 3 Why Are Firms Making IT Investments In Big Data? 4 Trends In Data Management

More information

What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy

What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy Much higher Volumes. Processed with more Velocity. With much more Variety. Is Big Data so big? Big Data Smart Data Project HAVEn: Adaptive Intelligence

More information

Big Data in the Cloud for Education Institutions

Big Data in the Cloud for Education Institutions Big Data in the Cloud for Education Institutions Pradit Songsangyos 1 Rajamangala University of Technology Suvarnabhumi, Phranakhon Si Ayutthaya, Thailand 1 pradit.s@rmutsb.ac.th Prachyanun Nilsook 2 King

More information

A Study of Data Management Technology for Handling Big Data

A Study of Data Management Technology for Handling Big Data Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

IBM Enterprise Content Management Product Strategy

IBM Enterprise Content Management Product Strategy White Paper July 2007 IBM Information Management software IBM Enterprise Content Management Product Strategy 2 IBM Innovation Enterprise Content Management (ECM) IBM Investment in ECM IBM ECM Vision Contents

More information

A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan

A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan , pp.217-222 http://dx.doi.org/10.14257/ijbsbt.2015.7.3.23 A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan Muhammad Arif 1,2, Asad Khatak

More information

Models Supporting Development of Complex Information Systems in Healthcare. Case study: an Obstetrics-Gynecology Department

Models Supporting Development of Complex Information Systems in Healthcare. Case study: an Obstetrics-Gynecology Department en18 Original Article Models Supporting Development of Complex Information Systems in Healthcare. Case study: an Obstetrics-Gynecology Department Mihaela Crisan-Vida 1, Lăcrămioara Stoicu-Tivadar 1, Oana

More information

Research on Operation Management under the Environment of Cloud Computing Data Center

Research on Operation Management under the Environment of Cloud Computing Data Center , pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering

More information

Internet of Things (IoT): A vision, architectural elements, and future directions

Internet of Things (IoT): A vision, architectural elements, and future directions SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: wkaqhsk0@seoultech.ac.kr Table of contents Open challenges

More information

Your Data, Any Place, Any Time.

Your Data, Any Place, Any Time. Your Data, Any Place, Any Time. Microsoft SQL Server 2008 provides a trusted, productive, and intelligent data platform that enables you to: Run your most demanding mission-critical applications. Reduce

More information

Mobile Hybrid Cloud Computing Issues and Solutions

Mobile Hybrid Cloud Computing Issues and Solutions , pp.341-345 http://dx.doi.org/10.14257/astl.2013.29.72 Mobile Hybrid Cloud Computing Issues and Solutions Yvette E. Gelogo *1 and Haeng-Kon Kim 1 1 School of Information Technology, Catholic University

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A SURVEY ON BIG DATA ISSUES AMRINDER KAUR Assistant Professor, Department of Computer

More information

Analytics: The real-world use of big data

Analytics: The real-world use of big data Findings from the research collaboration of IBM Institute for Business Value and Saïd Business School, University of Oxford Analytics: The real-world use of big data How innovative enterprises extract

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014 RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer

More information

Deploying Big Data to the Cloud: Roadmap for Success

Deploying Big Data to the Cloud: Roadmap for Success Deploying Big Data to the Cloud: Roadmap for Success James Kobielus Chair, CSCC Big Data in the Cloud Working Group IBM Big Data Evangelist. IBM Data Magazine, Editor-in- Chief. IBM Senior Program Director,

More information

CYBER SECURITY: NAVIGATING THE THREAT LANDSCAPE

CYBER SECURITY: NAVIGATING THE THREAT LANDSCAPE CYBER SECURITY: NAVIGATING THE THREAT LANDSCAPE WHITE PAPER www.cibecs.com 2 Table of ontents 01 02 03 04 05 EXECUTIVE SUMMARY: CYBER SECURITY MANAGING YOUR ATTACK SURFACE DATA VULNERABILITY 1 THE ENDPOINT

More information

City Deploys Big Data BI Solution to Improve Lives and Create a Smart-City Template

City Deploys Big Data BI Solution to Improve Lives and Create a Smart-City Template City Deploys Big Data BI Solution to Improve Lives and Create a Smart-City Template Overview Customer: Customer Website: http://www.bcn.cat/en/ Country or Region: Spain Industry: Government Customer Profile

More information

The Cloud for Insights

The Cloud for Insights The Cloud for Insights A Guide for Small and Medium Business As the volume of data grows, businesses are using the power of the cloud to gather, analyze, and visualize data from internal and external sources

More information

Efficient Data Replication Scheme based on Hadoop Distributed File System

Efficient Data Replication Scheme based on Hadoop Distributed File System , pp. 177-186 http://dx.doi.org/10.14257/ijseia.2015.9.12.16 Efficient Data Replication Scheme based on Hadoop Distributed File System Jungha Lee 1, Jaehwa Chung 2 and Daewon Lee 3* 1 Division of Supercomputing,

More information

A Study of Key management Protocol for Secure Communication in Personal Cloud Environment

A Study of Key management Protocol for Secure Communication in Personal Cloud Environment , pp.51-58 http://dx.doi.org/10.14257/ijsia.2014.8.4.05 A Study of Key management Protocol for Secure Communication in Personal Cloud Environment ByungWook Jin 1 and Keun-Wang Lee 2,* 1 Dept. of Computer

More information

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College

More information

Big Data Explained. An introduction to Big Data Science.

Big Data Explained. An introduction to Big Data Science. Big Data Explained An introduction to Big Data Science. 1 Presentation Agenda What is Big Data Why learn Big Data Who is it for How to start learning Big Data When to learn it Objective and Benefits of

More information