Verification and validation techniques for streaming big data analytics in internet of things environment

With an exponential growth of raw data generated from different sensors, actuators, and mobile devices, data analytics is becoming a challenging issue keeping in view of the heterogeneity of the data generated. The traditional database systems are not able to handle this huge amount of data. Current...

Full description

Bibliographic Details
Main Authors: Aparna Kumari, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar
Format: Article
Language:English
Published: Wiley 2019-05-01
Series:IET Networks
Subjects:
Online Access:https://doi.org/10.1049/iet-net.2018.5187
id doaj-ee29f9d2b5354b75b6db7e2293a9fd30
record_format Article
spelling doaj-ee29f9d2b5354b75b6db7e2293a9fd302021-08-26T05:55:38ZengWileyIET Networks2047-49542047-49622019-05-018315516310.1049/iet-net.2018.5187Verification and validation techniques for streaming big data analytics in internet of things environmentAparna Kumari0Sudeep Tanwar1Sudhanshu Tyagi2Neeraj Kumar3Department of Computer Science and EngineeringInstitute of Technology, Nirma UniversityAhmedabadGujaratIndiaDepartment of Computer Science and EngineeringInstitute of Technology, Nirma UniversityAhmedabadGujaratIndiaDepartment of Electronics and Communication EngineeringThapar Institute of Engineering and TechnologyDeemed UniversityPatialaPbIndiaDepartment of Computer Science and EngineeringThapar Institute of Engineering and TechnologyDeemed UniversityPatialaPbIndiaWith an exponential growth of raw data generated from different sensors, actuators, and mobile devices, data analytics is becoming a challenging issue keeping in view of the heterogeneity of the data generated. The traditional database systems are not able to handle this huge amount of data. Current research and development are mainly focused on the analytics of this big data generated from different devices and overlook the difficulty of its secure streaming. In this study, the authors analyse and provide an overview on how to handle secure streaming data generated from different devices. It includes the major threats and risks, introduced during big data processing in Internet of things environment. Moreover, they analyse the existing security approaches and highlight emerging challenges required to process the heterogeneous big data in a secure manner for IoT applications, such as denial of service, malware, and phishing. The architectural details and security approaches required in each phase of big data processing life‐cycle are explored in detail. Finally, various research challenges along with a case study are discussed and analysed.https://doi.org/10.1049/iet-net.2018.5187Internet of Things environmentverification techniquesphishingmalwaredenial of serviceIoT applications
collection DOAJ
language English
format Article
sources DOAJ
author Aparna Kumari
Sudeep Tanwar
Sudhanshu Tyagi
Neeraj Kumar
spellingShingle Aparna Kumari
Sudeep Tanwar
Sudhanshu Tyagi
Neeraj Kumar
Verification and validation techniques for streaming big data analytics in internet of things environment
IET Networks
Internet of Things environment
verification techniques
phishing
malware
denial of service
IoT applications
author_facet Aparna Kumari
Sudeep Tanwar
Sudhanshu Tyagi
Neeraj Kumar
author_sort Aparna Kumari
title Verification and validation techniques for streaming big data analytics in internet of things environment
title_short Verification and validation techniques for streaming big data analytics in internet of things environment
title_full Verification and validation techniques for streaming big data analytics in internet of things environment
title_fullStr Verification and validation techniques for streaming big data analytics in internet of things environment
title_full_unstemmed Verification and validation techniques for streaming big data analytics in internet of things environment
title_sort verification and validation techniques for streaming big data analytics in internet of things environment
publisher Wiley
series IET Networks
issn 2047-4954
2047-4962
publishDate 2019-05-01
description With an exponential growth of raw data generated from different sensors, actuators, and mobile devices, data analytics is becoming a challenging issue keeping in view of the heterogeneity of the data generated. The traditional database systems are not able to handle this huge amount of data. Current research and development are mainly focused on the analytics of this big data generated from different devices and overlook the difficulty of its secure streaming. In this study, the authors analyse and provide an overview on how to handle secure streaming data generated from different devices. It includes the major threats and risks, introduced during big data processing in Internet of things environment. Moreover, they analyse the existing security approaches and highlight emerging challenges required to process the heterogeneous big data in a secure manner for IoT applications, such as denial of service, malware, and phishing. The architectural details and security approaches required in each phase of big data processing life‐cycle are explored in detail. Finally, various research challenges along with a case study are discussed and analysed.
topic Internet of Things environment
verification techniques
phishing
malware
denial of service
IoT applications
url https://doi.org/10.1049/iet-net.2018.5187
work_keys_str_mv AT aparnakumari verificationandvalidationtechniquesforstreamingbigdataanalyticsininternetofthingsenvironment
AT sudeeptanwar verificationandvalidationtechniquesforstreamingbigdataanalyticsininternetofthingsenvironment
AT sudhanshutyagi verificationandvalidationtechniquesforstreamingbigdataanalyticsininternetofthingsenvironment
AT neerajkumar verificationandvalidationtechniquesforstreamingbigdataanalyticsininternetofthingsenvironment
_version_ 1721196058104561664