blog




  • Essay / Large Data Collection: Secure Big Data - 1749

    IntroductionIn a dynamic global economy, businesses and organizations have begun to rely increasingly on statistics gathered from their customers' information and behaviors, internal processes and business operations with the aim of finding new growth opportunities. In order to find and determine this information, large, complex sets of data must be generated and analyzed by trained professionals. The compilation of this vast collection of data is known as “Big Data”. In recent years, businesses and organizations have increasingly used Big Data to find new ways to improve the decisions they make, uncover new opportunities, and improve overall performance. For example, big data can be leveraged to address challenges that arise when information is dispersed across several different systems that are not interconnected by a central system. By aggregating data across systems, big data can help improve decision-making capability. It can also complement data warehouse solutions by serving as a buffer to process new data for inclusion in the data warehouse or to remove rarely accessed or obsolete data. [Tech-Faq website, 2013] The big challenge in collecting all this data is finding solutions to convert it into usable information by identifying patterns and deviations from those patterns and many companies and organizations are working on this . Software developers and vendors are rising to this challenge, transforming big data management into a booming industry with major players in the private sector and open source communities. [Villanova University Official Website, 2013]Security in Big DataPeople create 2.5 quintillion bytes of data every day and almost 90% of the data in the world today has been created.... .. middle of paper ......eedings of the 4th International Symposium on Information, Computer and Communications Security. techterms website, “P2P”, [Internet] http http://www.techterms.com/definition/p2p [Accessed December 5, 2013] SearchCIO.com official website, “digital rights management [DRM]”, [Internet] http: //searchcio.techtarget.com/definition/digital-rights-management [Accessed December 5, 2013] David Cash, Alptekin Küpçü, Daniel Wichs [2013] Dynamic proofs of recoverability via Oblivious RAM, Advances in Cryptology – EUROCRYPT 2013. c. Chris Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia,[2012]Dynamic Provable Data Possession, Brown University, The 42nd IPP Symposium. Jinyuan Li, Maxwell Krohn, David Mazieres, Dennis Shasha, Secure Untrusted Data Repository [SUNDR], NYU Department of Computer Science, 6th Symposium on Operating Systems Design and Implementation.