MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "112cd7e0-8b26-4821-9a38-bf4c5bee71c9"}, "_deposit": {"id": "5018", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "5018"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/5018", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Security of Real-time Big Data Analytics Pipeline", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "In today’s world, real-time data or streaming data can be conceived as a continuous and changing sequence ofdata that continuously arrive at a system to store or process. Big Data is also one of the hottest research topics in big datacomputing and it requires different approaches: techniques, tools and architecture. Big data security also faces the need toeffectively enforce security policies to protect sensitive data. Trying to satisfy this need, we proposed the secure big datapipeline architecture for the scalability and security. Throughout our work, we emphasize about the security of message. Weuse Apache Kafka and Apache Storm for real time streaming pipeline and also use sticky policies and encryption/decryptionalgorithm for security."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "scalable"}, {"interim": "durable"}, {"interim": "fault-tolerant"}, {"interim": "publish-subscribe messaging"}, {"interim": "aggregation"}, {"interim": "replication"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-16"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "IJAECS2017.pdf", "filesize": [{"value": "332 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 332000.0, "url": {"url": "https://meral.edu.mm/record/5018/files/IJAECS2017.pdf"}, "version_id": "02853883-22b0-4e1b-ae6e-f9c95ed8e987"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "International Journal of Advances in Electronics and Computer Science (IJAECS)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Thein, Khin Me Me"}, {"subitem_authors_fullname": "Nyunt, Thi Thi Soe"}, {"subitem_authors_fullname": "Aye, Kyar Nyo"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2017-02"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "2393-2835"}, "item_title": "Security of Real-time Big Data Analytics Pipeline", "item_type_id": "21", "owner": "1", "path": ["1597824175385"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000005018", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-16"}, "publish_date": "2019-07-16", "publish_status": "0", "recid": "5018", "relation": {}, "relation_version_is_last": true, "title": ["Security of Real-time Big Data Analytics Pipeline"], "weko_shared_id": -1}
Security of Real-time Big Data Analytics Pipeline
http://hdl.handle.net/20.500.12678/0000005018
http://hdl.handle.net/20.500.12678/000000501877cfeea2-6a0b-4c88-b883-25d0ee9f4602
112cd7e0-8b26-4821-9a38-bf4c5bee71c9
Name / File | License | Actions |
---|---|---|
IJAECS2017.pdf (332 Kb)
|
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Security of Real-time Big Data Analytics Pipeline | |||||
Language | en | |||||
Publication date | 2017-02 | |||||
Authors | ||||||
Thein, Khin Me Me | ||||||
Nyunt, Thi Thi Soe | ||||||
Aye, Kyar Nyo | ||||||
Description | ||||||
In today’s world, real-time data or streaming data can be conceived as a continuous and changing sequence ofdata that continuously arrive at a system to store or process. Big Data is also one of the hottest research topics in big datacomputing and it requires different approaches: techniques, tools and architecture. Big data security also faces the need toeffectively enforce security policies to protect sensitive data. Trying to satisfy this need, we proposed the secure big datapipeline architecture for the scalability and security. Throughout our work, we emphasize about the security of message. Weuse Apache Kafka and Apache Storm for real time streaming pipeline and also use sticky policies and encryption/decryptionalgorithm for security. | ||||||
Keywords | ||||||
scalable, durable, fault-tolerant, publish-subscribe messaging, aggregation, replication | ||||||
Identifier | 2393-2835 | |||||
Journal articles | ||||||
International Journal of Advances in Electronics and Computer Science (IJAECS) | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |