skip to main content
10.1145/2743065.2743121acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicarcsetConference Proceedingsconference-collections
research-article

Big Data Scalability, Methods and its Implications: A Survey of Current Practice

Published:06 March 2015Publication History

ABSTRACT

In the recent years; with the rise in usage of the devices that could connect itself to the network and could share data, there is a steady increase in the number of applications that are being introduced for providing various services to the users who rely on the devices that are being connected on the network to use the application. The biggest issue that these applications will face is how these applications will have to handle the data that is being generated by its users and also how these applications will provide the security to the data. For any application it is important to provide the security to the data of its users. Some of the major applications will involve high privacy data of the users which providing security will play a vital role and any compromise in the security [7] aspects of the applications will lead to enormous loss. The second issue that the application must focus upon is the scalability. There are two important key points why the scalability [8] is important. One, when the applications is being created it is the services that is being more focused upon rather than the count of the users that could use so providing a scalable system that could incorporate as many users as the users rise [9] is important for the application. Second, the hardware and the software configuration for the system will not be more focused upon during the development of the system, even though the hardware and the software configuration would be focused upon it is to be seen than they are satisfied for the services [10] the application provide. So providing a scalable system that can adapt the change of the hardware and of the software as they are being upgraded is an important element [11] in any part of the applications.

References

  1. Hai Jiang, Feng Shen, Su Chen, Kuan-Ching Li, Young-Sik Jeong, "A secure and scalable storage system for aggregate data in IoT", Future Generation Computer Systems (2014)Google ScholarGoogle Scholar
  2. Xuyun Zhang, Chang Liu, Surya Nepal, Chi Yang, Wanchun Dou, Jinjun Chen,"a hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud", Journal of Computer and System Sciences-80 (2014) 1008–1020.Google ScholarGoogle ScholarCross RefCross Ref
  3. Mauro Andreolini, Michele Colajanni, Marcello Pietri, Stefania Tosi, "Adaptive, scalable and reliable monitoring of big data on clouds", Parallel Distributed Computing (2014).Google ScholarGoogle Scholar
  4. Issac Triguero, Daniel Peralta, Jaume Bacardit, Salvador Garcia, Francisco Herrera, "MRPR: A MapReduce solution for prototype reduction in big data classification", neurocomputing 150 (2015) 331–345.Google ScholarGoogle Scholar
  5. Ze Deng, Yangyang Hu, Mao Zhu, Ziaohui Huang, Bo Du, "A scalable and fast OPTICS for clustering trajectory big data", Cluster Computing DOI10.1007/s10586-014-0413-9 (2014)Google ScholarGoogle Scholar
  6. Hwanjo Yu, Jiong Yang, Jiawei Han, Xiaolei Li, "Making SVMs scalable to large data sets using hierarchial cluster indexing", Data Mining and knowledge Discovery (2005) Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Lengdong Wu, Liyan Yuan, Jiahuai You, "Survey of large scale data management systems for big data applications", Journal of computer science and technology 30(1) (2015).Google ScholarGoogle Scholar
  8. Andre Schumacher, Luca Pireddu, Matti Niemenmaa, Aleksi Kallio, Eija Korpelainen, Gianluigi Zanetti, Keijo Heljanko, "SeqPig: simple and scalable scripting for large sequencing data sets in Hadoop", Bioinformatics applications note vol.30 no. 1 (2014)Google ScholarGoogle Scholar
  9. A Su Chen, Yi Chen, Hai Jiang, Laurence T. Yang, Kuan-Ching Li, A secure distributed file system based on revised Blakley's secret sharing scheme, in:Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, 2012 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Aaram Yun, Chunhui Shi, Yongdae Kim, On protecting integrity and confidentiality of cryptographic file system for outsourced storage, in:Proceedings of the ACM Workshop on Cloud Computing Security, 2009.C. Wang, K. Schwan, V. Talwar, G. Eisenhauer, L. Hu, M. Wolf, A flexible architecture integrating monitoring and analytics for managing large-scale data centers, in: Proceedings of the 8th ACM International Conference on Autonomic Computing, New York, USA, 2011, pp. 141–150. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Z. Xu, R. Zhang, R. Kotagiri, U. Parampalli, An adaptive algorithm for online time series segmentation with error bound guarantee, in: Proceedings of the 15th International Conference on Extending Database Technology, Berlin, Germany, 2012, pp. 192–203. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Pietri, S. Tosi, M. Andreolini, A. Balboni, Monitoring large cloud-based systems, in: Proceedings of 4th International Conference on Cloud Computing and Services Science, CLOSER, Barcelona, Spain, 2014.Google ScholarGoogle Scholar
  13. M. Pietri, S. Tosi, M. Andreolini, M. Colajanni, Real-time adaptive algorithm for resource monitoring, in: Proceedings of 9th International Conference on Network and Service Management, CNSM, Zurich, Switzerland, 2013.Google ScholarGoogle Scholar
  14. S. Böhm, C. Engelmann, S.L. Scott, Aggregation of real-time system monitoring data for analyzing large-scale parallel and distributed computing environments, in: Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, HPCC, 2010, Melbourne, Aus-tralia, 2010, pp. 72–78 Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Ankerst, M., Breunig, M.M., Kriegel, H.P., Sander, J.: Optics: ordering points to identify the clustering structure. In: ACM SIG-MOD international conference on management of data, pp. 49–60 (1999) Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Birant, D., Kut, A.: St-dbscan: an algorithm for clustering spatial temporal data. Data Knowl. Eng. 60, 208–221 (2007) Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Böhm, C., Noll, R., Plant, C., Wackersreuther, B.: Density-basedclustering using graphics processors. In: ACM international con-ference on information and knowledge management, pp. 661–670(2009) Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Camargo, S.J., Robertson, A.W., Gaffney, C.J., Smyth, P., Ghil, M.:Cluster analysis of typhoon tracks. Part ii: large-scale circulationand enso. J. Clim. 20, 3654–3676 (2007)Google ScholarGoogle ScholarCross RefCross Ref
  19. Chawla, S., Zheng, Y., Hu, J.: Inferring the root cause in road trafficanomalies. In: International conference on data mining, pp. 141–150 (2012) Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Chen, D., Li, X., Wang, L., Khan, S., Wang, J., Zeng, K., Cai, C.:Fast and scalable multi-way analysis of massive neural data. IEEETrans. Comput. 63 (2014).Google ScholarGoogle Scholar
  21. Chen, L., Özsu, M.T., Oria, V.: Robust and fast similarity search for moving object trajectories. In: ACM SIGMOD international conference on management of data, pp. 491–502(2005) Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Chen, D., Wang, L., Zomaya, A.Y., Dou, M., Chen, J., Deng, Z., Hariri, S.: Parallel simulation of complex evacuation scenarios with adaptive agent models. IEEE Trans. Parallel Distrib. Syst. 25 (2014)Google ScholarGoogle Scholar
  23. Chen, D., Li, X., Cui, D., Wang, L., Lu, D.: Global synchronization measurement of multivariate neural signals with massively paral- lel nonlinear interdependence analysis. IEEE Trans. Neural Syst. Rehabil. Eng. 22, 33–43 (2014)Google ScholarGoogle ScholarCross RefCross Ref
  24. Chudova, D., Gaffney, S., Mjolsness, E., Smyth, P.: Translation- invariant mixture models for curve clustering. In: ACM SIGKDD international conference on knowledge discovery and data mining, pp. 79–88 (2003) Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Top open source tools for the big Data, (Last Accessed on November 6, 2014)Google ScholarGoogle Scholar
  26. C. Aggarwal, N. Ashish, A. Sheth, The Internet of Things: a survey from the data-centric perspective, in: Managing and Mining Sensor Data, Springer, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  27. J. Sathish Kumar, Dhiren R. Patel, A survey on Internet of Things: security and privacy issues, Int. J. Comput. Appl. 90 (11) (2014).Google ScholarGoogle Scholar
  28. Mark W. Storer, Kevin M. Greenan, Ethan L. Miller, Kaladhar Voruganti, POTSHARDS: secure long-term storage without encryption, in: Proceedings of USENIX Annual Technical Conference, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Adi Shamir, How to share a secret, Commun. ACM (1979). Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. J.L. Gonzalez, Ricardo Marcelín-Jiménez, Phoenix: fault-tolerant distributed Web storage based on URLs, J. Convergence (2011).Google ScholarGoogle Scholar
  31. G.R. Blakley, Safeguarding cryptographic keys, in: Proceedings of International Workshop on Managing Requirements Knowledge, 1979, pp. 313–317.Google ScholarGoogle ScholarCross RefCross Ref
  32. William Stallings, Crytography and Network Security: Principles and Practices, fourth ed., Pearson Education, Inc., 2006.Google ScholarGoogle Scholar
  33. M. Polte, J. Simsa, G. Gibson, Comparing performance of solid state devices and mechanical disks, in: Proceedings of Workshop on Petascale Data Storage, 2008.Google ScholarGoogle Scholar
  34. M. Stonebreaker, Gerhard A. Schloss, DistributedRAID—new multiple copy algorithm, in: Proceedings of the Sixth International Conference on Data Engineering. 1990, pp. 430. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Amudhavel, J, Vengattaraman, T, Basha, M.S.S, Dhavachelvan, P, "Effective Maintenance of Replica in Distributed Network Environment Using DST", International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom) 2010, vol, no, pp.252, 254, 16–17 Oct. 2010, doi: 10.1109/ARTCom.2010.97. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Raju, R, Amudhavel, J, Pavithra, M, Anuja, S, Abinaya, B, "A heuristic fault tolerant MapReduce framework for minimizing makespan in Hybrid Cloud Environment", International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE) 2014, vol, no, pp.1, 4, 6–8 March 2014, doi: 10.1109/ICGCCEE.2014.6922462.Google ScholarGoogle ScholarCross RefCross Ref
  37. Raju, R, Amudhavel, J, Kannan, N, Monisha, M, "A bio inspired Energy-Aware Multi objective Chiropteran Algorithm (EAMOCA) for hybrid cloud computing environment", International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE) 2014, vol, no, pp.1, 5, 6–8 March 2014, doi: 10.1109/ICGCCEE.2014.6922463.Google ScholarGoogle Scholar
  38. Raju, R, Amudhavel, J, Kannan, N, Monisha, M, "Interpretation and evaluation of various hybrid energy aware technologies in cloud computing environment — A detailed survey", International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE) 2014, vol, no, pp.1, 3, 6–8 March 2014, doi: 10.1109/ICGCCEE.2014.6922432.Google ScholarGoogle ScholarCross RefCross Ref
  39. P. Dhavachelvan, G.V. Uma (2005), "Complexity Measures For Software Systems: Towards Multi-Agent Based Software Testing Proceedings - 2005 International Conference on Intelligent Sensing and Information Processing, ICISIP'05 2005, Art. no. 1529476, pp. 359–364.Google ScholarGoogle Scholar
  40. P. Dhavachelvan, G.V. Uma (2005), "Multi-agent based integrated Framework for Intra-Class Testing of Object-Oriented Software", International Journal on Applied Soft Computing, Elsevier, Vol-5, No.2, pp. 205 222. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. P. Dhavachelvan, G.V. Uma (2004), "Reliability Enhancement in Software Testing: An Agent-Based Approach for Complex Systems", 7th ICIT 2004, Springer Verlag - Lecture Notes in Computer Science (LNCS), Vol. 3356, pp. 282–291. ISSN: 0302-9743. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. D. Chandramohan, T. Vengattaraman and P. Dhavachelvan, "Data Privacy Breach Prevention Framework for the Cloud Service", John Wiley: Security Comm. Networks. DOI:10.1002/sec.1054. ISSN: 1939-0122.(2014).Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. D. Chandramohan, T. Vengattaraman, P. Dhavachelvan, R. Baskaran, V.S.K. Venkatachalapathy, "Fewss- Framework to Evaluate the Service Suitability and Privacy in a Distributed Web service Environment", Int. J. Model. Simul. Sci. Comput. Vol.5, No.1 (2014)1350016, DOI: 10.1142/S1793962313500165, pp.1–37. ISSN: 1793-9615.(2014).Google ScholarGoogle ScholarCross RefCross Ref
  44. Murugaiyan. S.R, D. Chandramohan, T. Vengattaraman and P. Dhavachelvan, "A Generic Privacy Breach Preventing Methodology for Cloud Service", International Journal of Grid and High Performance Computing-IGI Global. Vol. 6 Iss.3, pp. 56–88, DOI: 10.4018/ijghpc.2014070104. ISSN:1938-0259.(2014). Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. N. Moganarangan, D. Chandramohan, T. Vengattaraman and P. Dhavachelvan, "An Agent Based Model for Service Composition in Pervasive Computing: Web Service Computing Approach", International Journal of Applied Engineering Research, Volume 9, Number 11, pp.1643–1653. ISSN: 0973-4562. (2014).Google ScholarGoogle Scholar

Index Terms

  1. Big Data Scalability, Methods and its Implications: A Survey of Current Practice

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICARCSET '15: Proceedings of the 2015 International Conference on Advanced Research in Computer Science Engineering & Technology (ICARCSET 2015)
      March 2015
      349 pages
      ISBN:9781450334419
      DOI:10.1145/2743065
      • General Chair:
      • S. A. Khadar,
      • Program Chair:
      • R. Nanarayan T.

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 6 March 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      ICARCSET '15 Paper Acceptance Rate62of369submissions,17%Overall Acceptance Rate62of369submissions,17%
    • Article Metrics

      • Downloads (Last 12 months)4
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader