Professional Documents
Culture Documents
Big Data: (Data Security and Integrity)
Big Data: (Data Security and Integrity)
Volume: Not just in the form of text data, but also in the
form of videos, music and large image files. Data is
stored in terms of Terabytes and even Petabytes in following parameters, or a combination of them, or even
different companies. We need to re-evaluate the all of them together.
architecture and applications built to handle the data
Big Data originated new issues related not only to the
provided by big data analytics.
volume or the variety of the data, but also to data security
and privacy. It is recorded that of all the data in recorded
human history, 90 percent has been created in the last few
Velocity: Data is streaming in at unimaginable speed and
years. In 2003, 5 exabytes of data were created by
must be dealt with in a timely manner. RFID tags, sensors
humans, and this amount of information is, at present,
and smart metering are driving the need to deal with tons
created within two days. We are living in the era of Big
of data in near-real time. Reacting fastly enough to deal
Data, Big Data not only increases the scale of the
with data velocity is a challenge for most organizations.
challenges related to privacy and security as they are
addressed in traditional security management, but also
create new ones that need to be approached in a new way
Variety: It refers to the ever increasing different forms of no stats of increasing data is going down. Furthermore,
data that can come in the form of texts, images, voices this data is mostly unstructured, signifying that traditional
and geospatial data, computer generated simulations. The systems are not capable of analyzing it. The division of
variety of data can be characterized along several Big Data security into four principal topics has been used
dimensions. Some of these are: by the International Organization for Standardization in
order to create a security standard for security in Big
Data.
Structural variety: It refers to the difference in
the representation of the data. Satellite images of
wildfires from NASA are very different from
tweets sent out by people seeing the spread of
fire.
Media Variety: Media variety refers to the
medium in which the data gets delivered. For
example: The audio of a speech and the
transcript of a speech represent the same
information in various media.
Semantic variety: It comes from different
assumptions of conditions on the data. Like
conducting 2 income surveys on two different
groups of people and not being able to compare
or combine them without knowing more about
the populations themselves.
Access control at each level- Fourier Series (FS): A series proposed by the French
mathematician Fourier about the year 1807. The series
Access control is about two core things: restricting user
involves the sines and cosines of whole multiples of a
access and granting user access. For setting up granular
varying angle and is usually written in the form:
access controls, we can consider some points-
y = H0 + A1sin x + A2sin 2x + A3sin 3x + … B1cos x +
Normalize mutable elements and de-normalize
B2cos 2x + B3cos 3x + …. (1)
immutable elements.
Encryption:
It is the method of locking encryption using
cryptography.
Decryption:
Process of unlockimg encrypted data using cryptographic
technique.
Fourier_Masking_Encryption _Algorithm (FMEA)
printf("Message data = %lf", msg); Step 6: to get decrypted data we would find square root
of r and we would get decrypt data.
// Encryption c = (msg ^ e) % n
double c = pow(msg, e); Say in the given case since unit digit is 1 we would
c = fmod(c, n); subtract 80p = 720 from s as r = 9001 - 720 = 8281
printf("\nEncrypted data = %lf", c);
So r = 8281 whose square root will give 91.
// Decryption m = (c ^ d) % n
double m = pow(c, d); Advantages
m = fmod(m, n);
Since p will be indistinguishable by looking at encrypted
printf("\nOriginal Message Sent = %lf", m);
number so it will be safe for encrypting valuable
return 0; information.
}
Any information which have more and more digits would
be more secure for instance the aadhar card has 12 digits
OUR NEW ENCRYPTION TECHNIQUE so the square of this 12 digit number would be more.
Following encryption technique is arithmetic formula Also a particular number other than unit’s place number
based technique which will be useful in encrypting large could be used as public key.
digit passwords effectively and characters too. This could
be understood by taking a simple example let us take for It could be combined with RSA to make it more tough to
ease that we want to encrypt a number say 91 decrypt the term k used there we could first encrypt the
data according to this formula and then can use in the
Step 1: for encryption we would consider unit digit formula for encrypted data then after decrypting and
which is 1 here now the unit digit be q and the rest digit finding c it would be further simplified accordingly.
be p here q = 1 and p = 9.
It could be used in multi encryption technique having
Step 2: now we will make q a two digit number by independent key.
adding 0 to the tenth’s place so q = 01
REFERENCES
Step 3: now we will use the given formula p2 + p
1. Security Issues associated with big data in cloud
Here data will be 81 + 9 = 90 computing by Venkata Narasimha Inukollu, Sailaja Arsi
and Srinivasa Rao Ravuri.
Step 4: now we will square q and add it to the unit’s and
tenth’s place then our encrypted data will become 9001. 2. Information Security in Big Data by Lei XU ,
Let encrypted data be s so s = 9001. This will be our Chunxiao Jiang , Jian Wang Jian Yuan and Yong Ren
encrypted data note that if q2 is itself a two digit integer
then we will suppose we take q = 04 then q2 = 16 not 016 3 .Use of Digital Signature with Diffie Hellman Key
we will only consider one’s and tenth’s place Exchange and AES Encryption Algorithm to Enhance
Data in Cloud Computing by Prashant Rewagad and
Step 5: to decrypt the data we would first compare the Yogita Pawar
unit’s digit to the integers from 0-9 and will perform the
operation as stated in following table
4.The rise of Big Data on cloud computing by Ibrahim
Abaker Targio Hashem, Ibrar Yaqoob Sameer Ullah
Khan ,Abdullah Gani.
Date: Monday, October 08, 2018
Statistics: 1082 words Plagiarized / 3886 Total
words
Remarks: Medium Plagiarism Detected - Your
Document needs Selective Improvement.
--------------------------------------------------
-----------------------------------------
Plagiarism Checker X
Originality Report
Similarity Found: 08%