Skip to main content

Data Analytic Techniques with Hardware-Based Encryption for High-Profile Dataset

  • Conference paper
  • First Online:
Emerging Technologies in Data Mining and Information Security

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 813))

  • 1139 Accesses

Abstract

Data analytics is the science of extracting patterns, trends, and actionable information from large sets of data. The growing nature of data in from different servers with in consistent data formats like structured, semi-structured and unstructured data. Traditional IT infrastructure is simply not able to meet the demands of this new “Data Analytics” landscape. For these reasons, many enterprises are turning to the Hadoop (open source projects) as a potential solution to this unmet commercial need. As the amount of data especially unstructured data collected by organizations and enterprises explodes, Hadoop is emerging rapidly as one of the primary options for storing and performing operations on that data. The secondary problem for data analytics is security, this rapid increase in usage of Internet, drastic change in acceptance of people using social media applications that allow users to create contents freely and amplify the already huge web volume. In today’s businesses, there are few things to keep in mind while beginning big data and analytics innovation projects. The need of secured data analytics tool is mandatory for the business world. So, in the proposed model, major intention of work is to develop the two-pass security-enabled data analytics tool. This work concentrates on two different ends of current business worlds need namely attribute-based analytical report generation and better security model for clients. This proposed work for Key generation and data analytics is the process of generating keys is used to encrypt and decrypt whatever data need to be analyzed. The work is to develop the two-pass security-enabled data analytics tool. The software and hardware keys are programmed and embedded in the kit. When the user inserts the software and hardware key, the unique key will be generated in 1024 bit key size. This will provide high level of authentication for the data to be analyzed. The data analytics part is performed with attribute-based constraints enabled data extraction. This model is given better performance than the existing data analytical tools in both security and sensitive report generation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abad, F., Saeed, A., Hamidi, H.: An architecture for security and protection of big data. Int. J. Eng. Trans. A: Basics 30(10), 1479–1486 (2017)

    Google Scholar 

  2. Maluf, D.A., Bell, G.D., Knight, C., Tran, P., La, T., Lin, J., McDermott, B., Pell, B.: “NASA-XDB-IPG: ExtensibleDatabase—Information Grid” Global Grid Forum8 (2003)

    Google Scholar 

  3. Kaisler, S., Armour, F., Espinosa, J.A.: Introduction to big data: challenges, opportunities, and realities minitrack. In: 47th Hawaii International Conference on 2014, pp. 728–728 (2014)

    Google Scholar 

  4. Doan, A.H., Naughton, J.F., Baid, A., Chai, X., Chen, F., Chen, T., Chu, E., DeRose, P., Gao, B., Gokhale, C., Huang, J., Shen, W., Vuong, B.-Q.: The Case for a Structured Approach to Managing Unstructured Data”

    Google Scholar 

  5. Iwashita, M., Nishimatsu, K., Shimogawa, S.: Semantic analysis method for unstructured data in telecom services. In: IEEE13. IEEE 13th International Conference on Data Mining Workshops, pp. 789–795. https://doi.org/10.1109/icdmw.2008.79

  6. Ohlhorst, F.: Big Data Analytics: Turning Big Data into Big Money. Wiley, USA (2012)

    Book  Google Scholar 

  7. Gärtner, M., Rauber, A., Berger, H.: Bridging structured and unstructured data via hybrid semantic search and interactive ontology-enhanced query formulation. Knowl. Inf. Syst. 1–32 (2013). https://doi.org/10.1007/s10115-013-0678-y

  8. Diakopoulos, N., Naaman, M., Kivran-Swaine, F.: Diamonds in the rough: social media visual analytics for journalistic inquiry. In: Proceedings of IEEE Conference on Visual Analytics Science and Technology, pp. 115–122 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Sharmila Begum .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharmila Begum, M., George, A. (2019). Data Analytic Techniques with Hardware-Based Encryption for High-Profile Dataset. In: Abraham, A., Dutta, P., Mandal, J., Bhattacharya, A., Dutta, S. (eds) Emerging Technologies in Data Mining and Information Security. Advances in Intelligent Systems and Computing, vol 813. Springer, Singapore. https://doi.org/10.1007/978-981-13-1498-8_2

Download citation

Publish with us

Policies and ethics