Sie sind auf Seite 1von 5

PAPER PRESENTATIOM BY STUDENTS OF SNSCT

2019

A Biometric approach to Secure Big Data


and Cyber security
Abhirami.S.S Kishore Kumar
CSE Department CSE Department
SNSCT SNSCT

Abstract— Biometrics is the science of establishing the size, the term is use to when concerning reference a bytes
identity of an individual based on the physical, chemical and Exabyte’s of data [1, 11]. The word Big data is being
or behavioral attributes of the person. The relevance of gradually more used approximately everywhere on the
biometrics in modern society has been reinforced by the planet. And it is not related to computers. It comes under
need for large-scale identity management systems whose a word called Information procedure, which is a
functionality relies on the accurate determination of an component of almost all other tools and fields of studies
individual's identity in the context of several different and businesses [13]. These data are generating from
applications. Recently a very popular technology and
concept is followed by many Social networking websites
online transactions, emails, videos, audios, picture, posts,
this is “Big Data”. A data which is not only large in search interrogation, medical records, social networking
volume but also in unstructured way is termed as big interface, and science applications. Depending on point
data. Security in big data is the main issue now a day. In of analysis, there are different descriptions for Big Data.
this paper we throw some light on how different bio- Big data includes huge data set beyond the capabilities of
metric technologies play an important role to maintain inherited database and management tool view from the
and provide security in bigdata. database side. Big data is also being recognized as a
trend and defined the new generation of technologies and
Keywords— Big Data, Biometric security system, architectures. Big Data is usually considered to new
Recognition methods, Identification, Facial technology for very large scale data beyond the recent
recognition, Fingerprint technology, Iris recognition, database capabilities [2,3].
palm recognition. The word Big Data is used almost
everywhere these days, its refers to a broad variety of
I. INTRODUCTION large data sets almost unattainable to manage &
procedure using conventional data management tools,
Big data is known as massive amount of data which due to their amount and also their complexity. Big
needs new technologies and architectures to compose Data can be noticed in the finance and business where
possible to extract value from it by imprison and enormous amount of stock substitute, online and onsite
analysis process. The sources of big data include data purchasing data runs during computerized systems
arising from transfer management from the special each day and are then detained and accumulated for
devices such as Smart phones [1, 3]. Big Data has record monitoring, customer performance and market
come in the picture because we are existing in an manners [9, 10,11].
association which creates increasing utilize of data
intensive technologies. Due to such massive size of  Threat and Vulnerability investigation in BigData
data it becomes very tough to execute valuable
 Architecture for protection and confidentiality in
analysis using the living conventional procedure. Big
BigData
data is a latest upcoming skill in the marketplace which
 Confidentiality and protection in Data Center
can bring substantial benefits to the business
Networks
organizations, it becomes required that different tests
and problems associated in fetching and adapting to  Application Level protection and confidentialityin
this knowledge are require to be understood. The Big Data
challenges include analysis, capture, duration, explore,  Attacks and Counter procedures in bigdata
sharing, storage, fetch, visualization, and privacy  Cross layer plan for Security and confidentiality in
infraction. Big data is the term that describes any Big Data
massive amount of structured, semi-structured and  Identity ManagementSystems
unstructured data. Big data doesn't mean to the  Intrusion recognition and acknowledgement inBig
Data
PAPER PRESENTATIOM BY STUDENTS OF SNSCT
2019
(c) Duplicate Account or Data: Existing or growing
 Security and confidentiality in difficultNetworks
in two corresponding parts. When recognizing
 Malware and virus recognition in BigData
documentation fields (e.g., employee name) are
 Biometric protection and forensics in BigData reduced from a data file previous to it is delivered to a
 Consistency and Accessibility in Bigdata user or an application program, a big number of
 Network confidentiality in bigdata duplicate documentations may beestablished
 Safety and confidentiality Theories in bigdata
 Safety measures, Privacy and confidence inCloud III. Characteristics of BIGDATA

II. RELATEDWORK Big Data requires a new step forward from traditional
data analysis, described through its three components
1. Improving Data analytic techniques: Collect all are variety, velocity and volume as exposed in Fig. 1.
data strain them out on definite limitations and use
them to take certain decisions [9].

 Natural Language processing techniques: Use


NL processing procedures on Big Data’s to find out
the recent sentimental trend and it can be used on
industry and economics etc.

 Big Data techniques and deployment platforms:


Conservative methods are inefficient to handle big
data.

 Better data mining procedures: Data mining is the


technique to capture data from various platforms.
Improved distributed crawling procedures and
algorithms are require for scrape data from several
platforms[11].
Fig. 1 .The variety, velocity, and volume of big data
 Algorithms for Data visualization: In order to (a) Volume: The impressive scale and increase of
envision the needed information from a pool of
data outstrips traditional store and analysis procedures.
random data, influential algorithms are critical for
At present the information subsisting is in Petabytes
accurateresult.
(1015) and is supposed to enhance to Zettabytes (1021)
in nearby prospect. Data size evaluates the amount of
2.1 Problem with BIG DATA data accessible to an association, which does not
essentially have to individual all of it as long as it can
(a) Account security from threat: Big data
access it [11]. We presently see the exponential
protection suffers from the utilization of a large variety
expansion in the data storage as the data is additional
of information security to protect databases against
than text data. We can discover data in the format of
concessions of their privacy, reliability and
videos, music’s and huge descriptions on our social
accessibility. It involves various types or categories of
media networks. It is very universal to have Terabytes
controls, such as technological, practical, and
and Pet bytes of the storage system for business. As
administrative.
the database grows the applications and architecture
built to support the data needs to be reconsidered quite
(b) Load balancing is a diverse conception: It
frequently. Sometimes the same data is reconsidered
contains distributing the queries sent to the servers so
with various approaches and even though the unique
the load can be uniformly distributed. It is typically
data is the similar the new establish intelligence
done at the application layer. Load balancing
generates explosion of the data. The big amount indeed
maintains various client connections through a single
represents Big Data [1,11].
Virtual IP (VIP) address that is distributed among all
nodes in a cluster. This is precious for balancing (b) Velocity: Velocity in Big data is a conception
innermost client requests across nodes, as well as which contracts with the velocity of the data coming
preventing node omission from clients in case of from different resources. This distinctive is notbeing
nodebreakdown.
PAPER PRESENTATIOM BY STUDENTS OF SNSCT
2019

bounded to the velocity of inward data but also facilities or computers [3].
velocity at which the data runs and aggregated. The
data expansion and social media detonation have
changed how we emerge at the data. However, news
channels and radios have changed how fast we accept
the news. Today, people respond on social media to
modernize them with the recent happening. On social
media sometimes a little second previous messages is
not something significances users. They often remove
old messages and give attention to latest updates. The
data faction is now approximately real time and the
modernize window has decreased to fractions of the
seconds. This elevated rate data represent Big Data
[1,12].

(c) Variety: Data variety is determine of the richness


of the data expression – content, images video, audio, Fig. 2 Finger print technology
etc. Data being generated is not of single category as it
not only includes of the conventional data but also the (b) Palm Recognition: Palm print recognition
semi structured data from dissimilar resources like essentially realizes many of the similar matching
Web Log Files, social media sites, e-mail, records[10]. features that have acceptable fingerprint identification
to be individual of the majority recognized and
IV. ROLE OF BIO-METRIC INAUTHENTICATION greatest depiction biometrics. Palm biometrics is
represented by the information presented in a
The term biometrics is derived from the Greek words resistance point notion. This information merges ridge
bio (life) and metrics (to evaluate).Automated run, ridge features, and ridge arrangement of the lift
biometric systems have only become accessible over section of the epidermis. The data characterized by
the last few decades, due to considerable advances in these resistance ridge notions allows a determination
the field of computer processing. Biometrics is that corresponding regions of resistance ridge
automated technique of recognizing a human being impressions either originated from the similar resource
based on a physiological or performance or could not have been prepared with the similar
characteristic. Biometric identification expertise relies resource. Because Palms have uniqueness and
upon the bodily characteristics of an entity, such as durability, they have been used for more a century as
fingerprints, model of the iris of the eye and face a dependence form of recognition. Palm recognition
pattern, in identifying an individual that is difficult to has been sluggish in becoming mechanized owed to
counterfeit[1,3]. some self controls in calculating capabilities and live
scan technologies[4].
(a) Fingerprint Technology: Fingerprint based
recognition is the oldest technique which has been
successfully utilized in various purposes. Each one is
known to have distinctive finger prints. Fingerprint is
ready of a sequence of points and lines on the surface
of the finger. The individuality of a fingerprint can be
established by the prototype of points and lines as well
as the finer points. Minutiae points are limited point
uniqueness that occurs at either a crease bifurcation or
a crest ending. The Biometric apparatus engages a
client insert his finger on a platen for the fingerprint
to be found out. The finer points are then extracted by
the vendor’s particular algorithm to make a pattern.
Fingerprint biometric technology have three major Fig. 3 Palm Recognition
application areas big scale Automated Finger Imaging
Systems (AFIS) for act enforcement uses, deception (c) Face Recognition: Face identification is
prevention in concession programs, and access biometric software applications that can recognize a
managefor particularcharacterinadigitalimagebyconsidering
PAPER PRESENTATIOM BY STUDENTS OF SNSCT
2019

and comparing samples. Facial recognition methods V. ADVANTAGE OF BIOMETRIC IN BIG


are commonly used for security reasons but are DATA
increasingly individual used in a multiplicity of
additional applications [2, 3]. Most recent facial  Biometric features cannot be conjectured or stolen,
identification systems work with numeric codes called biometric systems current a higher quantity of
face prints. Such systems classify 80 nodal points on a protection than typical verification techniques [3,8].
human face. Nodal points are end points used to  Varieties of biometric technology that creates
determine variable of a human face, such as the uniqueness authentication additional valuable are
duration or size of the nose, the intensity of the eye accessible worldwide like Fingerprint, Iris, and Facial
sockets and the structure of the cheekbones. These recognitionetc.
systems work by detaining data for nodal positions on  The technology is less time consuming, consistent,
a digital image of an individual’s face and storing the user friendly, complex to build, cost effective and
resulting data as a facegenerate. accesses unique recognition traits of characters
resulting in correct data generation and
substantiation.
 This procedure is a benefit for the users, as well as
for construction administrators because the problems
and costs correlated with missing, reissued or
temporarily issued tokens, cards, passwords can be
avoided thus saving some charges of the system
organization.
 Biometrics can be used to simplify the substantiation
procedure since the several passwords can be
substituted by a single biometricfeature.
 Biometric systems are simply scalable. Depending
on the protection level desired, more complicated
biometric characteristics could beused.
Fig. 4 Face Recognition  Biometrics is a quickly evolving procedure that is
being generally used in forensics, such as illegal
(d) Iris Scan: The iris is the colored circle of quality recognition and prison protection[5].
tissue that adjacent the pupil of the eye. Even doubles  It can be used to check unauthorized access to
have dissimilar iris patterns and everyone’s present ATMs, smart cards, desktop and computernetworks.
(left and right) iris is different. Iris scanning computes
the iris sample in the tinted part of the eye. Iris patterns VI. RECENT INNOVATION OFBIOMETRIC
are formed arbitrarily. This signifies no two iris
patterns are the similar; the iris pattern of one’s left eye  Border Control/Airports: Airport and Border
is dissimilar from the iris prototype of the right eye. Control Biometrics a type section of application for
Iris inspects can be utilized for equally identification biometric tools is at the border. Anyone who’s trip by
and verificationapplications. space can inform you protection checkpoints boundary
crossings are some of the mainly annoying spaces to
have to movethrough.

 Consumer/Residential Biometrics: Consumer and


Residential Biometrics current innovation in mobility
and connectivity have produced order for biometrics
in the residences and compartments of consumer.
Smartphone with fingerprint sensors, apps that allow
for face and voice identification, mobile phone
wallets, these are the increasing admired ways that
consumers approximately the globe are discovering
biometric in theirlife.

 Economical: Economical Biometrics It can’t be


overstated how much biometrics can advantage cost-
Fig. 5 Iris Scan effective transactions. With modernaccomplishments
PAPER PRESENTATIOM BY STUDENTS OF SNSCT
2019

of mobile and online payments defended by biometrics REFERENCES


it’s clear that the protection and expediency are [1] K. Bakshi, "Considerations for Big Data:
salutation by the end user when it arrives to purchasing Architecture and Approach", Aerospace Conference
excellent and those advantages are step by step making IEEE, Big Sky Montana, March2012.
their line of attack into the privileged threat world of [2] C.Eaton,D.Deroos,T.Deutsch,G.Lapisand
banking. P.C. Zikopoulos, Understanding Big Data: Analytics
for Enterprise Class Hadoop and Streaming Data,
 Fingerprint & Biometric Locks: Fingerprint McGraw-Hill Companies, 978-0-07-179053-6, 2012.
Biometric padlocks, if you have something worth [3]http://blog.m2sys.com/biometrichardware/advanta
defending why not provide it the star management? gesbiometric- identification-management-system.
Biometric corporal access organize solutions are [4] http://en.wikipedia.org/wiki/Biometrics.
stronger substantiation. Techniques whereas a key can [5]http://www.webopedia.com/TERM/B/biometrics.h
be vanished or stolen and used through an illegal tm
personality, your fingerprint is something exceptional [6]http://searchsecurity.techtarget.com/definition/bio
that only you have [3,13]. metrics.
[7] V. Borkar, M.J. Carey and C. Li, "Inside —Big
 Medical Biometrics: Biometrics in Medical Data Management¦: Ogres, Onions, or Parfaits?”
Biometrics brings protection and convenience EDBT/ICDT 2012 Joint Conference Berlin Germany,
wherever they’re deployed. In the field of medical this 2012.
is particularly true. Fitness documents are some of the [8] B.Gerhardt, K. Griffin and R. Klemann,
most valuable personal records out there and they need "Unlocking Value in the Fragmented World of Big
to be accurate[6]. Data Analytics", Cisco Internet Business Solutions
Group, June
 Logical Access Control: Logical access control is a 2012,http://www.cisco.com/web/about/ac79/doc
main region of application for biometric technology. s/sp/Information-Infomediaries.pdf.
Whether it’s securing the apps on your Smartphone, [9] Vailaya, "What’s All the Buzz Around-Big Data",
biometric logical access control resolutions can initiate IEEE Women in Engineering Magazine, December
you into the then invention of expediency at 2012, pp.24-31.
cyberprotections. [10] Bughin, J., Chui, M., Manyika, J.Clouds, Big
Data, and Smart Assets: Ten Tech-Enabled Business
 Time and Attendance: Time and Attendance Trends to Watch, McKinsey Quarterly, 2010,56.
Biometric technology brings effectiveness to the place [11] Bughin, J., Chui, M., Manyika, J.Clouds, Big
of work by keeping better tabs on the workers in a give Data, and Smart Assets Ten Tech-Enabled Business
workforce. Workers who build a living from the road Trends to Watch, McKinsey Quarterly 2010,56.
or at home require ways to prove that they have earned [12] C. Tankard, "Big Data Security", Network
theirpaychecks. Security Newsletter, Elsevier, ISSN 1353-4858, July
2012.
VII. CONCLUSION [13] R. Weiss and L.J. Zgorski, "Obama
Administration Unveils—Big Data Initiative:
In this paper we conclude that biometric plays an Announces $200 Million in new R&D Investments",
important role in security and privacy of database in Office of Science and Technology Policy Executive
big data. There are various applications and results of Office of the President, March2012.
biometrics tools used in safety measures systems. It
has several benefits which can progress our lives such
as improved protection and helpfulness, decreased
fraud and password administrator rates, ease of use and
create live more relaxed. Even though the biometrics
security system motionless has various concern such
as information confidentiality and physical privacy but
users cannot deny the fact that this new tools will
modify our lives for the enhanced. For a secure
mechanism, face recognition, iris scan, palm
recognition and fingerprint technology is more popular
technologies are adopted by many companies to
maintain and secure the userdata.

Das könnte Ihnen auch gefallen