ABSTRACT
In the recent years; with the rise in usage of the devices that could connect itself to the network and could share data, there is a steady increase in the number of applications that are being introduced for providing various services to the users who rely on the devices that are being connected on the network to use the application. The biggest issue that these applications will face is how these applications will have to handle the data that is being generated by its users and also how these applications will provide the security to the data. For any application it is important to provide the security to the data of its users. Some of the major applications will involve high privacy data of the users which providing security will play a vital role and any compromise in the security [7] aspects of the applications will lead to enormous loss. The second issue that the application must focus upon is the scalability. There are two important key points why the scalability [8] is important. One, when the applications is being created it is the services that is being more focused upon rather than the count of the users that could use so providing a scalable system that could incorporate as many users as the users rise [9] is important for the application. Second, the hardware and the software configuration for the system will not be more focused upon during the development of the system, even though the hardware and the software configuration would be focused upon it is to be seen than they are satisfied for the services [10] the application provide. So providing a scalable system that can adapt the change of the hardware and of the software as they are being upgraded is an important element [11] in any part of the applications.
- Hai Jiang, Feng Shen, Su Chen, Kuan-Ching Li, Young-Sik Jeong, "A secure and scalable storage system for aggregate data in IoT", Future Generation Computer Systems (2014)Google Scholar
- Xuyun Zhang, Chang Liu, Surya Nepal, Chi Yang, Wanchun Dou, Jinjun Chen,"a hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud", Journal of Computer and System Sciences-80 (2014) 1008–1020.Google ScholarCross Ref
- Mauro Andreolini, Michele Colajanni, Marcello Pietri, Stefania Tosi, "Adaptive, scalable and reliable monitoring of big data on clouds", Parallel Distributed Computing (2014).Google Scholar
- Issac Triguero, Daniel Peralta, Jaume Bacardit, Salvador Garcia, Francisco Herrera, "MRPR: A MapReduce solution for prototype reduction in big data classification", neurocomputing 150 (2015) 331–345.Google Scholar
- Ze Deng, Yangyang Hu, Mao Zhu, Ziaohui Huang, Bo Du, "A scalable and fast OPTICS for clustering trajectory big data", Cluster Computing DOI10.1007/s10586-014-0413-9 (2014)Google Scholar
- Hwanjo Yu, Jiong Yang, Jiawei Han, Xiaolei Li, "Making SVMs scalable to large data sets using hierarchial cluster indexing", Data Mining and knowledge Discovery (2005) Google ScholarDigital Library
- Lengdong Wu, Liyan Yuan, Jiahuai You, "Survey of large scale data management systems for big data applications", Journal of computer science and technology 30(1) (2015).Google Scholar
- Andre Schumacher, Luca Pireddu, Matti Niemenmaa, Aleksi Kallio, Eija Korpelainen, Gianluigi Zanetti, Keijo Heljanko, "SeqPig: simple and scalable scripting for large sequencing data sets in Hadoop", Bioinformatics applications note vol.30 no. 1 (2014)Google Scholar
- A Su Chen, Yi Chen, Hai Jiang, Laurence T. Yang, Kuan-Ching Li, A secure distributed file system based on revised Blakley's secret sharing scheme, in:Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, 2012 Google ScholarDigital Library
- Aaram Yun, Chunhui Shi, Yongdae Kim, On protecting integrity and confidentiality of cryptographic file system for outsourced storage, in:Proceedings of the ACM Workshop on Cloud Computing Security, 2009.C. Wang, K. Schwan, V. Talwar, G. Eisenhauer, L. Hu, M. Wolf, A flexible architecture integrating monitoring and analytics for managing large-scale data centers, in: Proceedings of the 8th ACM International Conference on Autonomic Computing, New York, USA, 2011, pp. 141–150. Google ScholarDigital Library
- Z. Xu, R. Zhang, R. Kotagiri, U. Parampalli, An adaptive algorithm for online time series segmentation with error bound guarantee, in: Proceedings of the 15th International Conference on Extending Database Technology, Berlin, Germany, 2012, pp. 192–203. Google ScholarDigital Library
- M. Pietri, S. Tosi, M. Andreolini, A. Balboni, Monitoring large cloud-based systems, in: Proceedings of 4th International Conference on Cloud Computing and Services Science, CLOSER, Barcelona, Spain, 2014.Google Scholar
- M. Pietri, S. Tosi, M. Andreolini, M. Colajanni, Real-time adaptive algorithm for resource monitoring, in: Proceedings of 9th International Conference on Network and Service Management, CNSM, Zurich, Switzerland, 2013.Google Scholar
- S. Böhm, C. Engelmann, S.L. Scott, Aggregation of real-time system monitoring data for analyzing large-scale parallel and distributed computing environments, in: Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, HPCC, 2010, Melbourne, Aus-tralia, 2010, pp. 72–78 Google ScholarDigital Library
- Ankerst, M., Breunig, M.M., Kriegel, H.P., Sander, J.: Optics: ordering points to identify the clustering structure. In: ACM SIG-MOD international conference on management of data, pp. 49–60 (1999) Google ScholarDigital Library
- Birant, D., Kut, A.: St-dbscan: an algorithm for clustering spatial temporal data. Data Knowl. Eng. 60, 208–221 (2007) Google ScholarDigital Library
- Böhm, C., Noll, R., Plant, C., Wackersreuther, B.: Density-basedclustering using graphics processors. In: ACM international con-ference on information and knowledge management, pp. 661–670(2009) Google ScholarDigital Library
- Camargo, S.J., Robertson, A.W., Gaffney, C.J., Smyth, P., Ghil, M.:Cluster analysis of typhoon tracks. Part ii: large-scale circulationand enso. J. Clim. 20, 3654–3676 (2007)Google ScholarCross Ref
- Chawla, S., Zheng, Y., Hu, J.: Inferring the root cause in road trafficanomalies. In: International conference on data mining, pp. 141–150 (2012) Google ScholarDigital Library
- Chen, D., Li, X., Wang, L., Khan, S., Wang, J., Zeng, K., Cai, C.:Fast and scalable multi-way analysis of massive neural data. IEEETrans. Comput. 63 (2014).Google Scholar
- Chen, L., Özsu, M.T., Oria, V.: Robust and fast similarity search for moving object trajectories. In: ACM SIGMOD international conference on management of data, pp. 491–502(2005) Google ScholarDigital Library
- Chen, D., Wang, L., Zomaya, A.Y., Dou, M., Chen, J., Deng, Z., Hariri, S.: Parallel simulation of complex evacuation scenarios with adaptive agent models. IEEE Trans. Parallel Distrib. Syst. 25 (2014)Google Scholar
- Chen, D., Li, X., Cui, D., Wang, L., Lu, D.: Global synchronization measurement of multivariate neural signals with massively paral- lel nonlinear interdependence analysis. IEEE Trans. Neural Syst. Rehabil. Eng. 22, 33–43 (2014)Google ScholarCross Ref
- Chudova, D., Gaffney, S., Mjolsness, E., Smyth, P.: Translation- invariant mixture models for curve clustering. In: ACM SIGKDD international conference on knowledge discovery and data mining, pp. 79–88 (2003) Google ScholarDigital Library
- Top open source tools for the big Data, (Last Accessed on November 6, 2014)Google Scholar
- C. Aggarwal, N. Ashish, A. Sheth, The Internet of Things: a survey from the data-centric perspective, in: Managing and Mining Sensor Data, Springer, 2013.Google ScholarCross Ref
- J. Sathish Kumar, Dhiren R. Patel, A survey on Internet of Things: security and privacy issues, Int. J. Comput. Appl. 90 (11) (2014).Google Scholar
- Mark W. Storer, Kevin M. Greenan, Ethan L. Miller, Kaladhar Voruganti, POTSHARDS: secure long-term storage without encryption, in: Proceedings of USENIX Annual Technical Conference, 2007. Google ScholarDigital Library
- Adi Shamir, How to share a secret, Commun. ACM (1979). Google ScholarDigital Library
- J.L. Gonzalez, Ricardo Marcelín-Jiménez, Phoenix: fault-tolerant distributed Web storage based on URLs, J. Convergence (2011).Google Scholar
- G.R. Blakley, Safeguarding cryptographic keys, in: Proceedings of International Workshop on Managing Requirements Knowledge, 1979, pp. 313–317.Google ScholarCross Ref
- William Stallings, Crytography and Network Security: Principles and Practices, fourth ed., Pearson Education, Inc., 2006.Google Scholar
- M. Polte, J. Simsa, G. Gibson, Comparing performance of solid state devices and mechanical disks, in: Proceedings of Workshop on Petascale Data Storage, 2008.Google Scholar
- M. Stonebreaker, Gerhard A. Schloss, DistributedRAID—new multiple copy algorithm, in: Proceedings of the Sixth International Conference on Data Engineering. 1990, pp. 430. Google ScholarDigital Library
- Amudhavel, J, Vengattaraman, T, Basha, M.S.S, Dhavachelvan, P, "Effective Maintenance of Replica in Distributed Network Environment Using DST", International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom) 2010, vol, no, pp.252, 254, 16–17 Oct. 2010, doi: 10.1109/ARTCom.2010.97. Google ScholarDigital Library
- Raju, R, Amudhavel, J, Pavithra, M, Anuja, S, Abinaya, B, "A heuristic fault tolerant MapReduce framework for minimizing makespan in Hybrid Cloud Environment", International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE) 2014, vol, no, pp.1, 4, 6–8 March 2014, doi: 10.1109/ICGCCEE.2014.6922462.Google ScholarCross Ref
- Raju, R, Amudhavel, J, Kannan, N, Monisha, M, "A bio inspired Energy-Aware Multi objective Chiropteran Algorithm (EAMOCA) for hybrid cloud computing environment", International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE) 2014, vol, no, pp.1, 5, 6–8 March 2014, doi: 10.1109/ICGCCEE.2014.6922463.Google Scholar
- Raju, R, Amudhavel, J, Kannan, N, Monisha, M, "Interpretation and evaluation of various hybrid energy aware technologies in cloud computing environment — A detailed survey", International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE) 2014, vol, no, pp.1, 3, 6–8 March 2014, doi: 10.1109/ICGCCEE.2014.6922432.Google ScholarCross Ref
- P. Dhavachelvan, G.V. Uma (2005), "Complexity Measures For Software Systems: Towards Multi-Agent Based Software Testing Proceedings - 2005 International Conference on Intelligent Sensing and Information Processing, ICISIP'05 2005, Art. no. 1529476, pp. 359–364.Google Scholar
- P. Dhavachelvan, G.V. Uma (2005), "Multi-agent based integrated Framework for Intra-Class Testing of Object-Oriented Software", International Journal on Applied Soft Computing, Elsevier, Vol-5, No.2, pp. 205 222. Google ScholarDigital Library
- P. Dhavachelvan, G.V. Uma (2004), "Reliability Enhancement in Software Testing: An Agent-Based Approach for Complex Systems", 7th ICIT 2004, Springer Verlag - Lecture Notes in Computer Science (LNCS), Vol. 3356, pp. 282–291. ISSN: 0302-9743. Google ScholarDigital Library
- D. Chandramohan, T. Vengattaraman and P. Dhavachelvan, "Data Privacy Breach Prevention Framework for the Cloud Service", John Wiley: Security Comm. Networks. DOI:10.1002/sec.1054. ISSN: 1939-0122.(2014).Google ScholarDigital Library
- D. Chandramohan, T. Vengattaraman, P. Dhavachelvan, R. Baskaran, V.S.K. Venkatachalapathy, "Fewss- Framework to Evaluate the Service Suitability and Privacy in a Distributed Web service Environment", Int. J. Model. Simul. Sci. Comput. Vol.5, No.1 (2014)1350016, DOI: 10.1142/S1793962313500165, pp.1–37. ISSN: 1793-9615.(2014).Google ScholarCross Ref
- Murugaiyan. S.R, D. Chandramohan, T. Vengattaraman and P. Dhavachelvan, "A Generic Privacy Breach Preventing Methodology for Cloud Service", International Journal of Grid and High Performance Computing-IGI Global. Vol. 6 Iss.3, pp. 56–88, DOI: 10.4018/ijghpc.2014070104. ISSN:1938-0259.(2014). Google ScholarDigital Library
- N. Moganarangan, D. Chandramohan, T. Vengattaraman and P. Dhavachelvan, "An Agent Based Model for Service Composition in Pervasive Computing: Web Service Computing Approach", International Journal of Applied Engineering Research, Volume 9, Number 11, pp.1643–1653. ISSN: 0973-4562. (2014).Google Scholar
Index Terms
- Big Data Scalability, Methods and its Implications: A Survey of Current Practice
Recommendations
Big data scalability based on Spark Machine Learning Libraries
ICBDR '19: Proceedings of the 3rd International Conference on Big Data ResearchThe paper introduces the challenge of scalability in machine learning algorithms suitable for massive datasets. Today, big data has relevant applications in the industry due to improvements in the system performance and by turning information into ...
Accelerating Big Data Analytics Using FPGAs
FCCM '15: Proceedings of the 2015 IEEE 23rd Annual International Symposium on Field-Programmable Custom Computing MachinesEmerging big data analytics applications require a significant amount of server computational power. As chips are hitting power limits, computing systems are moving away from general-purpose designs and toward greater specialization. Hardware ...
On the scalability of Big Data Cyber Security Analytics systems
AbstractBig Data Cyber Security Analytics (BDCA) systems use big data technologies (e.g., Apache Spark) to collect, store, and analyse a large volume of security event data for detecting cyber-attacks. The volume of digital data ...
Highlights- A study on the scalability of Big Data Cybersecurity Analytics (BDCA) systems in cloud environment.
Comments