A Review on Big Data- Storage Techniques and Its Challenges

Authors

  • Vidyashree H D  Department of Computer Science, College of Academy for technical and Management Excellence, Karnataka , Mysuru, India
  • Kavyashree E D  Department of Computer Science, College of Academy for technical and Management Excellence, Karnataka , Mysuru, India
  • Sowmya Shree P  Department of Computer Science, College of Academy for technical and Management Excellence, Karnataka , Mysuru, India

Keywords:

KEYWORDS: Big data, Hadoop, NoSQL, Hive, Sqoop, Salami attacks, Trust relationship attacks, Session hijacking attacks.

Abstract

Big data as the name indicates it is extremely large data sets collected from various sources like internet, camera, applications, and bank transactions and so on. RDBMS is not sufficient to store and process such large quantity of data. This paper introduces several storage and processing techniques to deal with the big data. Apache Hadoop, Microsoft HDInsight, NoSQL (Not Only SQL), Hive, Sqoop, PolyBase, Big data in EXCEL, Presto are some of the techniques to store and process big data. Storing and processing is the one issue of big data on the other hand privacy and security is the another issues of big data. In this paper we introduced challenges of big data security. Apart from these issues and challenges we also have some advantages of big data.

References

  1. Min Chen, Shiwen Mao, Yunhao Liu, Big Data: A Survey, Springer Science+Business media New York, 2014.
  2. S. Sudarsan, R. Jetley and S.Ramaswamy, "Security and Privacy of big data", Studies in Big Data, ,pp.121-136, 2015
  3. Types of Network Attacks against Confidentiality, Integrity and Availability, Omnisecu.com. Online].Available: http://www.omnisecu.com/ccna-security/types-of-network-attacks.php, 2017.
  4. R. Alguliyev and Y. Imamverdiyev, "Big Data: Big Promises for Information Security," IEEE 8th International Conference on Application of Information and Communication Technologies (AICT), Astana, 2014, pp. 1-4, 2014.
  5. Y. Gao, X. Fu, B. Luo, X. Du and M. Guizani, "Haddle: A Framework for Investigating Data Leakage Attacks in Hadoop," 2015 IEEE Global Communications Conference (GLOBECOM), San Diego, CA, pp. 1-6, 2015.
  6. SA" NS Institute? InfoSec? Reading? Room",Sans.org,2017.? Online]. Available: https://www.sans.org/reading-room/whitepapers/dlp/data- loss-prevention-32883. Accessed: 24- Jan- 2017].
  7. Y. Jeong and S. Shin, "An Efficient Authentication Scheme to Protect User Privacy in Seamless Big Data Services", Wireless Personal Communications, vol. 86, no. 1, pp. 7-19, 2015.
  8. Heni and F. Gargouri, "A Methodological Approach for Big Data Security: Application for NoSQL Data Stores", Neural Information Processing, pp. 685-692, 2015.
  9. https://www.newgenapps.com March 2018]
  10. http://bigdata-madesimple.com/top-big-data-tools-used-to-store-and-analyse-data, March 2018]
  11. https://hortonworks.com/apache/hadoopMarch 2018]
  12. https://msdn.microsoft.com/en-us/library/dn749853.aspx March 2018]
  13. https://sqoop.apache.org/docs/1.4.6/SqoopUserGuide.html March 2018]

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Vidyashree H D, Kavyashree E D, Sowmya Shree P, " A Review on Big Data- Storage Techniques and Its Challenges, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 5, pp.617-621, March-April-2018.