IITM Journal of Management and IT

  • Year: 2016
  • Volume: 7
  • Issue: 1

Vulnerabilities of Data Storage Security in Big Data

  • Author:
  • Govind Murari Upadhyay, Harsh Arora
  • Total Page Count: 5
  • DOI:
  • Page Number: 37 to 41

Department of Information Technology, Institute of Innovation in Technology & Management, New Delhi, India

Abstract

In the era of big data, the massive amount of data needs to be managed, organized and secure over the network for all users. Vulnerabilities and threats make the data insecure and unreliable. In order to keep this bulk of data secure and safe, some security mechanism related to same need to be implemented. Confidentiality and privacy in big data must be maintained. Authentication and data integrity are other related parameters of big data security. Various challenges, issues and problems arise when available data gets interrupted by third party intruders. The intruders can be from external and internal environment from an organizational point of view. These individuals access, view, edit the sensitive data by unauthorized means. There should be some counter measures and access control methods, algorithms and the corresponding techniques like Map Reducer, Data Filtrations methods, Various encryption methods and finally we cannot ignore the best technique “Hadoop” which is used to handle, manage, organize and secure the big data specifically. Hence, monitoring and detection of attacks and prevention of threats to be implemented altogether. Although huge amount of data is present yet the available data must be focused according to cyber security point of view. There should be no compromise with big data storage, security, integrity and reliability. Big data available should be valid and secured using security mechanism and data controlled techniques.

Keywords

Big data, vulnerabilities, filtration, data security, Hadoop, Map Reducer, Intruders, Encryption, threats