Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "112cd7e0-8b26-4821-9a38-bf4c5bee71c9"}, "_deposit": {"id": "5018", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "5018"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/5018", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Security of Real-time Big Data Analytics Pipeline", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "In today’s world, real-time data or streaming data can be conceived as a continuous and changing sequence ofdata that continuously arrive at a system to store or process. Big Data is also one of the hottest research topics in big datacomputing and it requires different approaches: techniques, tools and architecture. Big data security also faces the need toeffectively enforce security policies to protect sensitive data. Trying to satisfy this need, we proposed the secure big datapipeline architecture for the scalability and security. Throughout our work, we emphasize about the security of message. Weuse Apache Kafka and Apache Storm for real time streaming pipeline and also use sticky policies and encryption/decryptionalgorithm for security."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "scalable"}, {"interim": "durable"}, {"interim": "fault-tolerant"}, {"interim": "publish-subscribe messaging"}, {"interim": "aggregation"}, {"interim": "replication"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-16"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "IJAECS2017.pdf", "filesize": [{"value": "332 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 332000.0, "url": {"url": "https://meral.edu.mm/record/5018/files/IJAECS2017.pdf"}, "version_id": "02853883-22b0-4e1b-ae6e-f9c95ed8e987"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "International Journal of Advances in Electronics and Computer Science (IJAECS)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Thein, Khin Me Me"}, {"subitem_authors_fullname": "Nyunt, Thi Thi Soe"}, {"subitem_authors_fullname": "Aye, Kyar Nyo"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2017-02"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "2393-2835"}, "item_title": "Security of Real-time Big Data Analytics Pipeline", "item_type_id": "21", "owner": "1", "path": ["1597824175385"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000005018", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-16"}, "publish_date": "2019-07-16", "publish_status": "0", "recid": "5018", "relation": {}, "relation_version_is_last": true, "title": ["Security of Real-time Big Data Analytics Pipeline"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Faculty of Computer Science

Security of Real-time Big Data Analytics Pipeline

http://hdl.handle.net/20.500.12678/0000005018
http://hdl.handle.net/20.500.12678/0000005018
77cfeea2-6a0b-4c88-b883-25d0ee9f4602
112cd7e0-8b26-4821-9a38-bf4c5bee71c9
None
Preview
Name / File License Actions
IJAECS2017.pdf IJAECS2017.pdf (332 Kb)
Publication type
Article
Upload type
Publication
Title
Title Security of Real-time Big Data Analytics Pipeline
Language en
Publication date 2017-02
Authors
Thein, Khin Me Me
Nyunt, Thi Thi Soe
Aye, Kyar Nyo
Description
In today’s world, real-time data or streaming data can be conceived as a continuous and changing sequence ofdata that continuously arrive at a system to store or process. Big Data is also one of the hottest research topics in big datacomputing and it requires different approaches: techniques, tools and architecture. Big data security also faces the need toeffectively enforce security policies to protect sensitive data. Trying to satisfy this need, we proposed the secure big datapipeline architecture for the scalability and security. Throughout our work, we emphasize about the security of message. Weuse Apache Kafka and Apache Storm for real time streaming pipeline and also use sticky policies and encryption/decryptionalgorithm for security.
Keywords
scalable, durable, fault-tolerant, publish-subscribe messaging, aggregation, replication
Identifier 2393-2835
Journal articles
International Journal of Advances in Electronics and Computer Science (IJAECS)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:38:45.132800
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL