Importance of Security in Big Data Log Files on Cloud
Madan Mohan1, Aadarsh Malviya2, Anuranjan Mishra3
1Madan Mohan*, Ph.D. Scholar, Department of Computer Science and Engineering, Noida International University, Greater Noida (U.P), India.
2Anuranjan Mishra, Professor & Dean, GNIOT, Greater Noida (U.P), India.
3Aadarsh Malviya, Assistant Professor, Department of Computer Science and Engineering, Noida International University, Greater Noida (U.P), India.
Manuscript received on September 10, 2021. | Revised Manuscript received on September 16, 2021. | Manuscript published on October 30, 2021.. | PP: 51-54 | Volume-11 Issue-1, October 2021. | Retrieval Number: 100.1/ijeat.A31381011121 | DOI: 10.35940/ijeat.A3138.1011121
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Today cloud computing is a very popular technology, and many people use this technology in many ways. it’s important to have it safe. This technology was primarily used to keep data safer and safer in the cloud, so in this article we suggest a security framework for large data logs in the cloud. There are many and many risks that threaten the integrity of this information in the great information. Therefore, in line with the development of technology, the level of security has also increased significantly over the years. Various technology techniques access several online activities, such as interaction with different internet sites and services, making the web more accessible to their plug-ins. As a result, these activities have created a global platform for malicious activities to add these devices that expose large data logs harmful attacks. Sky system is an online platform that requires proper security integration. In addition, the current state of online security threatens high data in the cloud, which has affected the performance and service model.
Keywords: Log File, Security, Big data, Dataset, Data analysis, Malicious, Technology, Security, Big data, Dataset, Cloud.
Scope of the Article: Big Data Security