{"created":"2020-09-01T15:38:41.372737+00:00","id":5018,"links":{},"metadata":{"_buckets":{"deposit":"112cd7e0-8b26-4821-9a38-bf4c5bee71c9"},"_deposit":{"id":"5018","owners":[],"pid":{"revision_id":0,"type":"recid","value":"5018"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/5018","sets":["1582963302567:1597824175385"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Security of Real-time Big Data Analytics Pipeline","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"In today’s world, real-time data or streaming data can be conceived as a continuous and changing sequence ofdata that continuously arrive at a system to store or process. Big Data is also one of the hottest research topics in big datacomputing and it requires different approaches: techniques, tools and architecture. Big data security also faces the need toeffectively enforce security policies to protect sensitive data. Trying to satisfy this need, we proposed the secure big datapipeline architecture for the scalability and security. Throughout our work, we emphasize about the security of message. Weuse Apache Kafka and Apache Storm for real time streaming pipeline and also use sticky policies and encryption/decryptionalgorithm for security."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"scalable"},{"interim":"durable"},{"interim":"fault-tolerant"},{"interim":"publish-subscribe messaging"},{"interim":"aggregation"},{"interim":"replication"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-16"}],"displaytype":"preview","filename":"IJAECS2017.pdf","filesize":[{"value":"332 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/5018/files/IJAECS2017.pdf"},"version_id":"02853883-22b0-4e1b-ae6e-f9c95ed8e987"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"International Journal of Advances in Electronics and Computer Science (IJAECS)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Thein, Khin Me Me"},{"subitem_authors_fullname":"Nyunt, Thi Thi Soe"},{"subitem_authors_fullname":"Aye, Kyar Nyo"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2017-02"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"2393-2835"},"item_title":"Security of Real-time Big Data Analytics Pipeline","item_type_id":"21","owner":"1","path":["1597824175385"],"publish_date":"2019-07-16","publish_status":"0","recid":"5018","relation_version_is_last":true,"title":["Security of Real-time Big Data Analytics Pipeline"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T02:45:46.442056+00:00"}