International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014

Big Data Ethics - In Terms of Transparency and Security

Jitender Sharma, Nitin Pandey

In the recent times; Big Data is the most concerned term in the trending technology. Big data is a set of large data which is complex to manage; to capture; to analyze; to store; etc. it is managed by many industries as well as various academic groups. Nowadays; we can store Terabyte or Zeta byte of data but the challenge is how to store the data in our own hand. By giving all the access or maintenance to someone else is it really worth able or not If the data goes to wrong hand; we dont know what do to; how it will be done because day-by-day big data is becoming bigger. So; there is a need to adopt more transparency & security measures. Most challenging phase of big data is security and transparency. Security and transparency can be measured in 3 parameters those are 3Vs of big data. [3] Velocity Volume variety These three factors include a lot of variables such as Cloud computing infrastructure Format of data Streaming of data Security mechanism The main objective of writing this paper is to summarize the measurements taken for the security and transparency of big data and examine the big data in term of ethics.

Keywords: Big data, transparency, security, intrusion deception, Data locker, security breach

Edition: Volume 3 Issue 6, June 2014

Pages: 535 - 537


How to Cite this Article?

Jitender Sharma, Nitin Pandey, "Big Data Ethics - In Terms of Transparency and Security", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014106, Volume 3 Issue 6, June 2014, 535 - 537

32 PDF Views | 24 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Big data'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1598 - 1602

Information Acquisition Utilizing Parallel Rough Set and MapReduce from Big Information

Sachin Jadhav, Shubhangi Suryawanshi

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2435 - 2438

A Scalable Approach for Scheduled Data Anonymization Using MapReduce on Cloud

Surumi K S, Joyal Ulahannan

Share this article

Case Studies, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1486 - 1492

An Outlook on India?s Healthcare System with a Medical Case Study and Review on Big Data and its Importance in Healthcare

Saikrishna Depuru, Dr. R. Raj Kumar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1603 - 1607

Provisioning of Compression and Secure Management Services for Healthcare Data in Cloud Computing

Suhasini Kalki, Jayashree Agarkhed

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1290 - 1293

A Review on Need of MapReduce in Big Data Application

Sushant Shirish Nagavkar, Ashishkumar

Share this article



Similar Articles with Keyword 'transparency'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1362 - 1366

Net Neutrality-A Concept of Open Internet

Depavath Harinath

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 560 - 563

Survey of Cheating Prevention Techniques in Visual Cryptography

Smita Patil, Jyoti Rao

Share this article

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1838 - 1840

Development of Social Application to Enhance NGO and Society Collaboration

Kunal Pardeshi, Tejal Shigwan, Rohit Kulkarni, Asmita Bhogade, Karan Mashal, Kaushal Komawar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 535 - 537

Big Data Ethics - In Terms of Transparency and Security

Jitender Sharma, Nitin Pandey

Share this article



Similar Articles with Keyword 'security'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this article



Similar Articles with Keyword 'security breach'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 535 - 537

Big Data Ethics - In Terms of Transparency and Security

Jitender Sharma, Nitin Pandey

Share this article

Research Paper, Computer Science & Engineering, Sudan, Volume 4 Issue 4, April 2015

Pages: 742 - 748

Assembly Classifier Approach to Analyze Intrusion Detection Dataset in Networks by Using Data Mining Techniques

Ayad Mohammed Mahyoub Ghaleb, Samani A. Talab

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 403 - 408

Online Detection of Malicious Transactions from Database System

Dhanashree Parchand, Harmeet Kaur Khanuja

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1759 - 1762

Integrated Approach to Detect Vulnerabilities in Source Code

Monica Catherine S, Geogen George

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 808 - 813

Design and Development of an Advanced Database System with Multitenant Architecture, Advanced Security Transparent Data Encryption & Data Redaction

Mohammed Waheeduddin Hussain, Prof. P. Premchand, Dr. G. Manoj Someswar

Share this article
Top