Abstract
The publication and dispersal of crude information are urgent components in business, scholarly, and restorative applications. With an expanding number of open stages, for example, informal communities and cell phones from which information might be gathered; the volume of such information have likewise expanded after some time progressed toward becoming as Big Data. The traditional model of Big Data does not specify any level for capturing the sensitivity of data both structured and combined. It additionally needs to incorporate the notion of privacy and security where the risk of exposing personal information is probabilistically minimized. This paper introduced security and privacy layer between HDFS and MR Layer (MapReduce) known as new proposed Secured MapReduce (SMR) Layer and this model is known as SMR model. The core benefit of this work is to promote data sharing for knowledge mining. This model creates a privacy and security guarantee and data utility for data miners. In this model, running time, CPU usage, Memory usage, and Information loss are less as compared to traditional approaches.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Abbreviations
- SMR Layer:
-
Secured MapReduce Layer
- MR:
-
MapReduce
- KVP:
-
Key-Value Pairs
- HDFS:
-
Hadoop Distributed File System
- API:
-
Application Programming Interface
References
Jain, P., Gyanchandani, M., Khare, N.: Big data privacy: a technological perspective and review. J. Big Data 3 (2016). ISSN 2196-1115
Mehmood, A., Natgunanathan, I., Xiang, Y., Hua, G., Guo, S.: Protection of big data privacy. IEEE Access 4, 1821–1834 (2016). https://doi.org/10.1109/access.2016.2558446
Big Data Top Challenge 2016. https://downloads.cloudsecurityalliance.org/initiatives/bdwg/BigDataTopTenv1.pdf
Big Data Submits. https://theinnovationenterprise.com/summits/big-data-innovation-mumbai/eventactivities=5546
The intersection of privacy and security data privacy day event 2012. https://concurringopinions.com/archives/2012/01/the-intersection-of-privacy-and-security-data-privacy-day-event-at-gw-law-school.html
Savas, O., Deng, J.: Book Titled Big Data Analytics in Cybersecurity. CRC Press, Taylor Francis Group
Sagiroglu, S., Sinanc, D.: Big data: a review. J. Big Data 20–24 (2013)
Chavan, V., Phursule, R.N.: Survey paper on big data. Int. J. Comput. Sci. Inf. Technol. 5(6) (2014)
Groves, P., Kayyali, B., Knott, D., Kuiken, S.V.: The Big Data Revolution in Healthcare. McKinsey & Company, New York (2013)
Lin, J.: MapReduce is good enough the control project. IEEE Comput. 32 (2013)
Patel, A.B., Birla, M., Nair, U.: Addressing big data problem using Hadoop and Map Reduce. In: Nirma University International Conference on Engineering in Proceedings (2012)
Acampora, G., et al.: Data analytics for pervasive health. In: Healthcare Data Analytics (2015). ISSN 533-576
Kulkarni, A.P., Khandelwal, M.: Survey on Hadoop and introduction to YARN. Int. J. Emerg. Technol. Adv. Eng. 4(5) (2014). www.ijetae.com. ISSN 2250-2459
Yu, E., Deng, S.: Understanding software ecosystems: a strategic modeling approach. In: Proceedings of the Workshop on Software Ecosystems 2011, IWSECO-2011, pp. 6–16 (2011)
Shim, K: MapReduce algorithms for big data analysis. In: DNIS. LNCS, pp. 44–48 (2013)
Arora, S., Goel, M.: Survey paper on scheduling in Hadoop. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4(5) (2014)
Evfimievski, S.: Randomization techniques for privacy preserving association rule mining. In: SIGKDD Exploration, vol. 4, no. 2 (2002)
Roy, I., Ramadan, H.E., Setty, T.V., Kilzer, A., Shmatikov, V., Witchel, E.: Airavat: security and privacy for MapReduce. In: Castro, M. (eds.) Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, pp. 297–312. USENIX Association, San Jose (2010)
Tripathy, K., Mitra, A.: An algorithm to achieve k-anonymity and l-diversity anonymization in social networks. In: Proceedings of Fourth International Conference on Computational Aspects of Social Networks (CA-SoN), Sao Carlos, pp. 126–131 (2012)
Mohammadian, E., Noferesti, M., Jalili, R.: FAST: fast anonymization of big data streams. In: Proceedings of the 2014 International Conference on Big Data Science and Computing, p. 23 (2014)
Terzi, D.S., Terzi, R., Sagiroglu, S.: A survey on security and privacy issues in big data. In: Proceedings of ICITST 2015, London, UK, Dec 2015
Derbeko, P., et al.: Security and privacy aspects in MapReduce on clouds: a survey. Comput. Sci. Rev. 20, 1932–128 (2016)
Kacha, L., Zitouni, A.: An overview on data security in cloud computing. In: CoMeSySo: Cybernetics Approaches in Intelligent Systems, pp. 250–261. Springer (2017)
Ilavarasi, K., Sathiyabhama, B.: An evolutionary feature set decomposition based anonymization for classification workloads: privacy preserving data mining. J. Cluster Comput. (2017)
ApacheHDFS. http://hadoop.apache.org/hdfs
Sweeney, L.: K-anonymity: a model for protecting privacy. Int J Uncertain Fuzz. 10(5), 55770 (2002)
Zakerdah, H., Aggarwal, C.C., Barker, K.: Privacy-Preserving Big Data Publishing. ACM, La Jolla (2015)
Morey, T., Forbath, T., Schoop, A.: Customer data: designing for transparency and trust. Harv. Bus. Rev. 93–95 (2015)
Friedman, A., Wolff, R., Schuster, A.: Providing k-anonymity in data mining. Int. J. Very Large Data Bases 17(4), 789–804 (2008)
Fung, B., et al.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. (CSUR) 42–44 (2010)
Cevher, V., Becker, S., Schmidt, M.: Convex optimization for big data: scalable, randomized, and parallel algorithms for big data analytics. IEEE Signal Process. Mag. 31(5), 32–43 (2014)
Kuo, M.H., Sahama, T., Kushniruk, A.W., Borycki, E.M., Grunwell, D.K.: Health big data analytics: current perspectives, challenges and potential solutions. Int. J. Big Data Intell. 1(1/2), 114–126 (2014)
Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4) (2010)
Jain, P., Pathak, N., Tapashetti, P., Umesh, A.S.: Privacy-preserving processing of data decision tree based on sample selection and singular value decomposition. In: 2013 9th International Conference on Information Assurance and Security (IAS), Gammarth, pp. 91–95 (2013)
Jain, P., Gyanchandani, M., Khare, N.: Privacy and security concerns in healthcare big data: an innovative prescriptive. J. Inf. Assur. Secur. 12(1), 18–30 (2017)
Ko, S.Y, Jeon, K., Morales, R.: The HybrEx model for confidentiality and privacy in cloud computing. In: 3rd USENIX Workshop on Hot Topics in Cloud Computing, HotCloud’11, Portland (2011)
Tweepy Dataset Online. https://marcobonzanini.com/2015/03/02/mining-twitter-data-with-python-part-1/
First Things First—Highmark Makes Healthcare-Fraud Prevention Top Priority with SAS (2006)
Apache Hive. http://hive.apache.org
Borthakur, D., Sarma, J.S., Gray, J., Muthukkaruppan, K., Spiegelberg, N., Kuang, H., Krangana Than, D.M.S., Menon, A., Rash, S., Schmidt, R., Amitanand, A.: Apache Hadoop Goes Realtime at Facebook ACM SIGMOD, Athens, Greece (2011). 978-1-4503-0661-4/11/06
Mrigank, M., Akashdeep, K., Snehasish, D., Kumar, N.: Analysis of Big Data Using Apache Hadoop and Map Reduce, vol. 4, no. 5 (2014)
Ghinita, G., Karras, P., Kalnis, P., Mamoulis, N.: Fast data anonymization with low information loss. In: Proceedings of International Conference on Very Large Data Bases (VLDB), pp. 758–769 (2007)
Yin, C., Zhang, S., Xi, J., Wang, J.: An improved anonymity model for big data security based on clustering algorithm. In: Combined Special Issues on Security and privacy in social networks (NSS2015) and 18th IEEE International Conference on Computational Science and Engineering (CSE2015), vol. 29, Issue 7, 10 Apr 2017
Acknowledgements
We acknowledge the support of Madhya Pradesh Council of India. We are also thankful to Dr. Rajesh Wadhvani and Dr.Sri Khetwat Saritha for providing high configuration system facilities form their respective laboratory Information retrieval lab and Machine Learning lab of MANIT Bhopal.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Jain, P., Gyanchandani, M., Khare, N. (2019). Big Data Security and Privacy: New Proposed Model of Big Data with Secured MR Layer. In: Chaki, R., Cortesi, A., Saeed, K., Chaki, N. (eds) Advanced Computing and Systems for Security. Advances in Intelligent Systems and Computing, vol 883. Springer, Singapore. https://doi.org/10.1007/978-981-13-3702-4_3
Download citation
DOI: https://doi.org/10.1007/978-981-13-3702-4_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-3701-7
Online ISBN: 978-981-13-3702-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)