Abstract
Step by step there comes another innovation, gadgets and techniques which offer ascent to the fast development of information. Presently today, information is immensely expanding inside each ten minutes and it is difficult to oversee it and it offers ascend to the term Big data. This paper depicts the enormous information and its difficulties alongside the advancements required to deal with huge data. This moreover portrays the conventional methodologies which were utilized before, to manage information their impediments and how it is being overseen by the new approach Hadoop. It additionally portrays the working of Hadoop along with its pros cons and security on huge data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Roger Schell: Security—A Big Question for Big Data. In: 2013 IEEE International Conference on Big Data. https://doi.org/10.1109/bigdata.2013.6691547
Michael, K., Miller, K.W.: Big Data: New Opportunities and New Challenges. Published by the IEEE Computer Society 0018-9162/13/$31.00 © 2013 IEEE
Ji, C., Li, Y., Qiu, W., Awada, U., Li, K.: December. Big data processing in cloud computing environments. In: 2012 12th International Symposium on Pervasive Systems, Algorithms and Networks (ISPAN), pp. 17–23. IEEE (2012)
Muhtaroglu, F.C.P., Demir, S., Obali, M., Girgin, C.: Business model canvas perspective on big dataapplications. In: 2013 IEEE International Conference on Big Data, Silicon Valley, CA, 6–9 Oct 2013, pp. 32–37
Kaur, K., Kaur, I., Kaur, N., Tanisha, Gurmeen, Deepi: Big data management: characteristics, challenges and solutions. Int. J. Comput. Sci. Technol. JCST 7(4) (2016). ISSN 0976-8491, ISSN 2229-4333 (Print)
Tankard, C.: Big data security. Netw. Secur. 2012(7), 5–8 (2012)
Mahajan, P., Gaba, G., Chauhan, N.S.: Big data security. IITM J. Manag. IT 7(1), 89–94 (2016)
Bhosale, H.S., Gadekar, D.P.: A Review on Big Data and Hadoop, JSPM’s Imperial College of Engineering & Research, Wagholi, Pune
Shirudkar et al.: A review on—big data: challenges, security & privacy issues. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 5(3), 1100–1109 (2015)
Shirudkar, K., Motwani, D.: Big-data security, department of computer engineering VIT, Mumbai, India. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 5(3) (2015)
Inukollu1, V.N., Arsi, S., Ravuri, S.R.: Security Issues Associated with Big Data in Cloud Computing. (IJNSA) 6(3), (2014)
Zhao, Y., Wu, J.: Dache: a data aware caching for big-data applications using the Map Reduce framework. In: 2013 Proceedings IEEE INFOCOM, Turin, 14–19 Apr 2013, pp. 35–39
Lu, J., Senellart, P., Lin, C., Du, X., Wang, S., Chen, X.: Optimal top-k generation of attribute combinations based on ranked lists. In: Proceedings of the 2012 International Conference on Management of Data. 2012, pp. 409–420
Aggarwal, C.C., Wang, H.: Managing and Mining Graph Data. Springer Publishing Company, Incorporated (2010)
Patel, A.B., Birla, M., Nair, U.: Addressing big data problem using hadoop and map reduce. In: 2012 Nirma University International Conference on Engineering (NUiCONE), 6 Dec 2012
Chen, J., Chen, Y., Du, X., Li, C., Lu, J., Zhao, S., Zhou, X.: Big data challenge: a data management perspective. In: Key Laboratory of Data Engineering and Knowledge Engineering. School of Information, Renmin University of China, Beijing, China
Ahmed, E.S.A., Saeed, R.A.: A survey of big data cloud computing security. Int. J. Comput. Sci. Softw. Eng. (IJCSSE), 3(1), 78–85 (2014)
Muhtaroglu, F.C.P., Demir, S., Obali, M., Girgin, C.: Business model canvas perspective on big dataapplications. In: Big Data, 2013 IEEE International Conference, Silicon Valley, CA, 6–9 Oct 2013, pp. 32–37
Big Data Working Group: Big Data Analytics for Security Intelligence, Sept 2013
Big Data Meets Big Data Analytics Three Key Technologies for Extracting Real-Time Business Value from the Big Data That Threatens to Overwhelm Traditional Computing Architectures (white paper)
Singh, R., Ali, K.A.: Challenges and security issues in big data analysis. Int. J. Innov. Res. Sci. Eng. Technol. 5, (1) (2016)
Security and privacy in the era of big data arenci/nationalconsortiumfordatascience white paper
http://www.sas.com/en_us/insights/big-data/what-is-big-data.html
http://www.sas.com/en_us/insights/big-data/what-is-big-data.html
Shilpa, M.K.: A Review on Big Data and Methodology. LPU, Phagwara, India
Labrinidis, A., Jagadish, H.V.: Challenges and opportunities with big data. Proc. VLDB Endowment 5(12), 2032–2033 (2012)
https://www.Big Data Analytics Tools Overview & Benefits _ Qubole.htm
https://safenet.gemalto.com/data-encryption/big-data-security-solutions/
Marko Grobelnikmarko.grobelnik@ijs.siJozef Stefan Institute Ljubljana, SloveniaStavanger, May 8th 2012
An Oracle White Paper June 2013 Oracle: Big Data for the Enterprise
http://www.darkreading.com/monitoring/a-case-study-in-security-big-dataanalys/232602339
Security issues associated with big data in cloud computing, (IJNSA), vol.6, no.3, may 2014))
http://searchsecurity.techtarget.com/feature/Comparing-the-top-big-data-security-analytics-tools
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Kaur, K., Bharti, V. (2019). A Survey on Big Data—Its Challenges and Solution from Vendors. In: Mittal, M., Balas, V., Goyal, L., Kumar, R. (eds) Big Data Processing Using Spark in Cloud. Studies in Big Data, vol 43 . Springer, Singapore. https://doi.org/10.1007/978-981-13-0550-4_1
Download citation
DOI: https://doi.org/10.1007/978-981-13-0550-4_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0549-8
Online ISBN: 978-981-13-0550-4
eBook Packages: EngineeringEngineering (R0)