Kas yra viršuje Didelis Duomenų saugumas & Privatumas iššūkiai?

"Didelis duomenys" iš tikrųjų susideda iš milžiniški duomenų, surinktų apie kiekvieno asmens Žemėje ir jų apylinkėse. Tokie duomenys renkami įvairios organizacijos, įmonių ir vyriausybės, taip pat. Duomenų sukurtas labai didelis ir tai tikimasi, kad net dviviečiai kas dvejus metus. Tai reiškia, kad, jeigu bendra duomenis, gautus 2012 yra 2500 exabytes, tada bendra duomenis, gautus 2020 bus apie 40,000 exabytes! Tokie duomenys renkami, naudojamas įvairiais būdais gerinti klientų aptarnavimo paslaugas. bet, didžiulis kiekis duomenų, generuojamų pristato daug naujų problemų duomenų mokslininkų, ypač atsižvelgiant į privatumą.

So, Cloud saugumo aljansas, ne pelno siekianti organizacija, kuri skatina saugus debesų kompiuterijos praktika, looked around to find out the major security and privacy challenges that big data faces.

How do these problems arise?

Only the vast amounts of data themselves are not the cause of privacy and security issues. The continuous streaming of data, large cloud-based data storage methods, large-scale migration of data from one cloud storage to another, the different kinds of data formats and different types of sources all have their own loopholes and problems.

Big data collection is not a very new thing, as it has been collected for many decades. However, the major difference is that earlier, only large organisations could collect data due to the huge expenses included, but now nearly every organisation can collect data easily and use it for different purposes. The cheap new cloud-based data collection techniques, along with the powerful data processing software frameworks like Hadoop, are enabling them to easily mine and process big data. As a result, daug su saugumu pavojaus iššūkiai atvyko su didelio masto integracijai didelių duomenų ir debesis pagrįstas duomenų saugojimo.

Šios dienos saugumo prietaikos yra skirtos užtikrinti mažų ir vidutinio dydžio duomenų, taip, jie negali apsaugoti tokius didelius kiekius duomenų. Also, jie yra suprojektuoti pagal statinio duomenys, todėl jie negali dirbti dinamišką duomenis arba. Standartinis anomalijos aptikimą paieška negalėtų veiksmingai padengti visus duomenis. Also, the continuously streaming data needs security all the time while streaming.

The ten biggest big data security and privacy challenges

To make a list of the top ten big data security and privacy challenges, the CSA (Cloud Security Alliance) Big Data research working group found out about these challenges.

Securing transaction logs and data

Often, the transaction logs and other such sensitive data are stored in storage medium have multiple tiers. But this is not enough. The companies also have to safeguard these storage against unauthorized access and also have to ensure that they are available at all times.

Securing calculations and other processes done in distributed frameworks

This actually refers to the security of the computational and processing elements of a distributed framework like the MapReduce function of Hadoop. Two main issues are the security of “mappers” breaking the data down and data sanitization capabilities.

Validation and filtering of end-point inputs

Endpoints are a major part of any big data collection. They provide input data for storage, processing and other important works. So, it is necessary to ensure that only authentic endpoints are in use. Every network should be free from malicious endpoints.

Providing security and monitoring data in real time

It is best that all the security checks and monitoring should occur in real time, or at least in nearly real time. Unfortunately, most of the traditional platforms are unable to do this due to the large amounts of data generated.

Securing communications and encryption of access control methods

An easy method to secure data is to secure the storage platform of that data. However, the application which secures the data storage platform is often pretty vulnerable themselves. So, the access methods need to be strongly encrypted.

Provenance of data

The origin of the data is very important is it allows classifying the data. The origin can be accurately found out by proper authentication, validation and by granting the access controls.

Granular access control

A powerful authentication method and Mandatory Access Control is the main requirement for the grained access of big data stores by NoSQL databases or Hadoop Distributed File System.

Granular auditing

Regular auditing is also very necessary along with continuous monitoring of the data. Correct analysis of the various kinds of logs created can be very beneficial and this information can be used to detect all kinds of attacks and spying.

Scalability and privacy of data analytics and mining

Big Data analytics can be very problematic in the sense that a small data leak or platform loophole can result in a big loss of data.

Securing different kinds of non-relational data sources

NoSQL and other such types of data stores have many loopholes which create many security issues. These loopholes include the lack of ability to encrypt data when it is being streamed or stored, during the tagging or logging of data or during classification into different groups.

Išvada

As every advanced concept have some loopholes. Big data also has some in the form of privacy and security issues. Big data can be secured only by securing all of the components of it. As big data is huge in size, many powerful solutions must be introduced in order to secure every part of the infrastructure involved. Duomenų saugyklos turi būti pritvirtinti už tai, kad jame nėra jokių jame nuotėkis. Also, realaus laiko apsauga turi būti įjungtas pradinio duomenų rinkimo metu. Visa tai užtikrina, kad vartotojas privatumo palaikoma.

 

Tagged on:
============================================= ============================================== Buy best TechAlpine Books on Amazon
============================================== ---------------------------------------------------------------- electrician ct chestnutelectric
error

Enjoy this blog? Please spread the word :)

Follow by Email
LinkedIn
LinkedIn
Share