It appears you don't have support to open PDFs in this web browser. To view this file, Open with your PDF reader
Abstract
Recent technological development such as social network, cloud computing, and data analytics make possible to collect large amount of data. Data security and privacy are critical aspects of concern. However , there are issues in securing and protecting this data.Big data is like a two edged sword, as it bring convenience of handling the huge amount of data along with it creates certain risks for the analysts. It is believed in the process of data collection , storage, manipulation, presentation, the data leak- age can exists as unavoidable ghost. The big data architecture being distributive in nature, undergo portioning , replication and distribution of this data on thousands ofdata processing nodes for the distribution of this .How to make the data security andprivacy more significantly strong and to stop the data leakage in the stages of the dif-ferent algorithm has become a essential goal and most important research challengefor researchers and academicians. This paper discusses and review the issues and thekey factors what is to be taken in account while undergoing development of securedbig data solutions. It can increase the performance of impact and resultant solutions for these crisis. The traditional methods of privacy cannot be that much successful inproviding solution to this arising situation._
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer