Abstract
Data analytics is the science of extracting patterns, trends, and actionable information from large sets of data. The growing nature of data in from different servers with in consistent data formats like structured, semi-structured and unstructured data. Traditional IT infrastructure is simply not able to meet the demands of this new “Data Analytics” landscape. For these reasons, many enterprises are turning to the Hadoop (open source projects) as a potential solution to this unmet commercial need. As the amount of data especially unstructured data collected by organizations and enterprises explodes, Hadoop is emerging rapidly as one of the primary options for storing and performing operations on that data. The secondary problem for data analytics is security, this rapid increase in usage of Internet, drastic change in acceptance of people using social media applications that allow users to create contents freely and amplify the already huge web volume. In today’s businesses, there are few things to keep in mind while beginning big data and analytics innovation projects. The need of secured data analytics tool is mandatory for the business world. So, in the proposed model, major intention of work is to develop the two-pass security-enabled data analytics tool. This work concentrates on two different ends of current business worlds need namely attribute-based analytical report generation and better security model for clients. This proposed work for Key generation and data analytics is the process of generating keys is used to encrypt and decrypt whatever data need to be analyzed. The work is to develop the two-pass security-enabled data analytics tool. The software and hardware keys are programmed and embedded in the kit. When the user inserts the software and hardware key, the unique key will be generated in 1024 bit key size. This will provide high level of authentication for the data to be analyzed. The data analytics part is performed with attribute-based constraints enabled data extraction. This model is given better performance than the existing data analytical tools in both security and sensitive report generation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abad, F., Saeed, A., Hamidi, H.: An architecture for security and protection of big data. Int. J. Eng. Trans. A: Basics 30(10), 1479–1486 (2017)
Maluf, D.A., Bell, G.D., Knight, C., Tran, P., La, T., Lin, J., McDermott, B., Pell, B.: “NASA-XDB-IPG: ExtensibleDatabase—Information Grid” Global Grid Forum8 (2003)
Kaisler, S., Armour, F., Espinosa, J.A.: Introduction to big data: challenges, opportunities, and realities minitrack. In: 47th Hawaii International Conference on 2014, pp. 728–728 (2014)
Doan, A.H., Naughton, J.F., Baid, A., Chai, X., Chen, F., Chen, T., Chu, E., DeRose, P., Gao, B., Gokhale, C., Huang, J., Shen, W., Vuong, B.-Q.: The Case for a Structured Approach to Managing Unstructured Data”
Iwashita, M., Nishimatsu, K., Shimogawa, S.: Semantic analysis method for unstructured data in telecom services. In: IEEE13. IEEE 13th International Conference on Data Mining Workshops, pp. 789–795. https://doi.org/10.1109/icdmw.2008.79
Ohlhorst, F.: Big Data Analytics: Turning Big Data into Big Money. Wiley, USA (2012)
Gärtner, M., Rauber, A., Berger, H.: Bridging structured and unstructured data via hybrid semantic search and interactive ontology-enhanced query formulation. Knowl. Inf. Syst. 1–32 (2013). https://doi.org/10.1007/s10115-013-0678-y
Diakopoulos, N., Naaman, M., Kivran-Swaine, F.: Diamonds in the rough: social media visual analytics for journalistic inquiry. In: Proceedings of IEEE Conference on Visual Analytics Science and Technology, pp. 115–122 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharmila Begum, M., George, A. (2019). Data Analytic Techniques with Hardware-Based Encryption for High-Profile Dataset. In: Abraham, A., Dutta, P., Mandal, J., Bhattacharya, A., Dutta, S. (eds) Emerging Technologies in Data Mining and Information Security. Advances in Intelligent Systems and Computing, vol 813. Springer, Singapore. https://doi.org/10.1007/978-981-13-1498-8_2
Download citation
DOI: https://doi.org/10.1007/978-981-13-1498-8_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1497-1
Online ISBN: 978-981-13-1498-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)