Abstract

Lately, the world confronts day by day the birth of typically big data in various fields such as health, telecom, electronic sales, communication, service provision, industry, e-learning and e-commerce. This emergence was a brick and a major reason behind the realization of immense changes in the processes of manipulation and processing of data as the system of storage, processing, analysis and visualization of data. From an application point of view, the manipulation of such data requires the implication of certain numbers of usage standards such as those related to security, credibility and optimization of data. However, it seems so difficult to ensure the security of massive and gigantic data coming from a variety of sources, and especially in real time, because there is an almost total absence of methodologies ensuring the processing and protection of a volume of data automatically. In fact, our work takes stock of a new process allowing the secure handling of big data. This is about getting more out of machine learning, security patterns and decision trees. More specifically, our approach aims to design machines able of securing large data in real time while making them learn from a mapping of security patterns (learning data). This training will allow machines to develop in terms of security, which will allow them to improve their intelligence related to the detection of anomalies caused in the data during the data exploitation operation.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.