The critical role played by big data management in effectively addressing the security and overall privacy concerns through correlation analysis
dc.contributor.author | Ahamad, Shahanawaj | en_US |
dc.contributor.author | Roshan, Amit | en_US |
dc.contributor.author | Lourens, Melanie Elizabeth | en_US |
dc.contributor.author | Shekher, Vineet | en_US |
dc.contributor.author | Joshi, Kapil | en_US |
dc.contributor.author | Alanya-Beltran, Joel | en_US |
dc.date.accessioned | 2022-08-26T12:44:27Z | |
dc.date.available | 2022-08-26T12:44:27Z | |
dc.date.issued | 2022-04-28 | |
dc.date.updated | 2022-08-24T10:00:29Z | |
dc.description.abstract | Due to the widespread application of big data in a wide range of fields, there has been a significant rise in a diverse range of data assets, and numerous data analysis technologies, such as standardized data mining or quantitative analytical techniques, are speeding up the constant enlargement of the big data industry. The fact that information from several different resources has a life cycle from acquisition to disposal is a key property of big data, as is the fact that new information may be obtained via analysis, combining, and exploitation of existing data. Yet, information security & dependability challenges arise at every stage of the life cycle, rendering the protection of individually identifying data a vital goal throughout the whole process. It is possible to evaluate user behavior using different big data analytics techniques, and the collection of this information results in the violation of personal privacy. This study analyses dangers and security challenges that arise during the administration of large amounts of data by verifying the existing standards produced by international standardization bodies and doing an analysis of relevant research. | en_US |
dc.format.extent | 5 p. | en_US |
dc.identifier.citation | Ahamad, S., et al. 2022. The critical role played by big data management in effectively addressing the security and overall privacy concerns through correlation analysis. 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). Presented at: 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). : 130-134. doi:10.1109/icacite53722.2022.9823900 | en_US |
dc.identifier.doi | 10.1109/icacite53722.2022.9823900 | |
dc.identifier.isbn | 9781665437899 | |
dc.identifier.uri | https://hdl.handle.net/10321/4196 | |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.conference | 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) | en_US |
dc.subject | Big data | en_US |
dc.subject | Security | en_US |
dc.subject | Privacy | en_US |
dc.subject | Information | en_US |
dc.subject | Management | en_US |
dc.subject | Analytical | en_US |
dc.subject | Internet of Things (IOT) | en_US |
dc.subject | Application | en_US |
dc.title | The critical role played by big data management in effectively addressing the security and overall privacy concerns through correlation analysis | en_US |
dc.type | Conference | en_US |