JISR on Computing (Dec 2013)

Security Visualization on Big Data

  • Waqar Ahmed,
  • Uzair Hashmi

DOI
https://doi.org/10.31645/2013.11.2.6
Journal volume & issue
Vol. 11, no. 2

Abstract

Read online

IN 2012 2.5 QB OF DATA (18 ZEROS AFTER 1) WAS GENERATED WORLDWIDE KNOW SO FAR. EVERY DAY DATA CREATION SIZE IS BECOMING BIG-TO-BIGGER THAN WAS SEEN BY EVERYONE SINCE THE BEGINNING OF HUMANKIND. BRIEF DATA GENERATION HISTORY IN CATEGORICAL FASHION IS AS FOLLOWS: • 5 Petabytes: Data flowing through Walmart’s transactional databases. • Consumers spend $272,000 on Web shopping /day. • Apple receives around 47,000 app downloads /minute. On Facebook, Brands receive more than 34,000 “likes” /minute. • 8 billion Email messages per day • On Twitter 340 million tweets per day • On Facebook 684,000 bits of content per day • 3,125 new photos uploaded on Flicker per minute. As data size increased so are security threats, which comprise unauthorized modification/ alteration of big data. Conducting security visualization manually on such a large-scale data is beyond compression. Therefore, we need some automated easy to use, time saving technique that can give comprehensive results, which can help to track the integrity of big data.

Keywords