Verification and validation techniques for streaming big data analytics in internet of things environment
With an exponential growth of raw data generated from different sensors, actuators, and mobile devices, data analytics is becoming a challenging issue keeping in view of the heterogeneity of the data generated. The traditional database systems are not able to handle this huge amount of data. Current...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2019-05-01
|
Series: | IET Networks |
Subjects: | |
Online Access: | https://doi.org/10.1049/iet-net.2018.5187 |
id |
doaj-ee29f9d2b5354b75b6db7e2293a9fd30 |
---|---|
record_format |
Article |
spelling |
doaj-ee29f9d2b5354b75b6db7e2293a9fd302021-08-26T05:55:38ZengWileyIET Networks2047-49542047-49622019-05-018315516310.1049/iet-net.2018.5187Verification and validation techniques for streaming big data analytics in internet of things environmentAparna Kumari0Sudeep Tanwar1Sudhanshu Tyagi2Neeraj Kumar3Department of Computer Science and EngineeringInstitute of Technology, Nirma UniversityAhmedabadGujaratIndiaDepartment of Computer Science and EngineeringInstitute of Technology, Nirma UniversityAhmedabadGujaratIndiaDepartment of Electronics and Communication EngineeringThapar Institute of Engineering and TechnologyDeemed UniversityPatialaPbIndiaDepartment of Computer Science and EngineeringThapar Institute of Engineering and TechnologyDeemed UniversityPatialaPbIndiaWith an exponential growth of raw data generated from different sensors, actuators, and mobile devices, data analytics is becoming a challenging issue keeping in view of the heterogeneity of the data generated. The traditional database systems are not able to handle this huge amount of data. Current research and development are mainly focused on the analytics of this big data generated from different devices and overlook the difficulty of its secure streaming. In this study, the authors analyse and provide an overview on how to handle secure streaming data generated from different devices. It includes the major threats and risks, introduced during big data processing in Internet of things environment. Moreover, they analyse the existing security approaches and highlight emerging challenges required to process the heterogeneous big data in a secure manner for IoT applications, such as denial of service, malware, and phishing. The architectural details and security approaches required in each phase of big data processing life‐cycle are explored in detail. Finally, various research challenges along with a case study are discussed and analysed.https://doi.org/10.1049/iet-net.2018.5187Internet of Things environmentverification techniquesphishingmalwaredenial of serviceIoT applications |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Aparna Kumari Sudeep Tanwar Sudhanshu Tyagi Neeraj Kumar |
spellingShingle |
Aparna Kumari Sudeep Tanwar Sudhanshu Tyagi Neeraj Kumar Verification and validation techniques for streaming big data analytics in internet of things environment IET Networks Internet of Things environment verification techniques phishing malware denial of service IoT applications |
author_facet |
Aparna Kumari Sudeep Tanwar Sudhanshu Tyagi Neeraj Kumar |
author_sort |
Aparna Kumari |
title |
Verification and validation techniques for streaming big data analytics in internet of things environment |
title_short |
Verification and validation techniques for streaming big data analytics in internet of things environment |
title_full |
Verification and validation techniques for streaming big data analytics in internet of things environment |
title_fullStr |
Verification and validation techniques for streaming big data analytics in internet of things environment |
title_full_unstemmed |
Verification and validation techniques for streaming big data analytics in internet of things environment |
title_sort |
verification and validation techniques for streaming big data analytics in internet of things environment |
publisher |
Wiley |
series |
IET Networks |
issn |
2047-4954 2047-4962 |
publishDate |
2019-05-01 |
description |
With an exponential growth of raw data generated from different sensors, actuators, and mobile devices, data analytics is becoming a challenging issue keeping in view of the heterogeneity of the data generated. The traditional database systems are not able to handle this huge amount of data. Current research and development are mainly focused on the analytics of this big data generated from different devices and overlook the difficulty of its secure streaming. In this study, the authors analyse and provide an overview on how to handle secure streaming data generated from different devices. It includes the major threats and risks, introduced during big data processing in Internet of things environment. Moreover, they analyse the existing security approaches and highlight emerging challenges required to process the heterogeneous big data in a secure manner for IoT applications, such as denial of service, malware, and phishing. The architectural details and security approaches required in each phase of big data processing life‐cycle are explored in detail. Finally, various research challenges along with a case study are discussed and analysed. |
topic |
Internet of Things environment verification techniques phishing malware denial of service IoT applications |
url |
https://doi.org/10.1049/iet-net.2018.5187 |
work_keys_str_mv |
AT aparnakumari verificationandvalidationtechniquesforstreamingbigdataanalyticsininternetofthingsenvironment AT sudeeptanwar verificationandvalidationtechniquesforstreamingbigdataanalyticsininternetofthingsenvironment AT sudhanshutyagi verificationandvalidationtechniquesforstreamingbigdataanalyticsininternetofthingsenvironment AT neerajkumar verificationandvalidationtechniquesforstreamingbigdataanalyticsininternetofthingsenvironment |
_version_ |
1721196058104561664 |