IJISC
  • Indexed in

  • Latest News

    July 1, 2024
    Volume 13, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 27, 2023
    Volume 12, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 28, 2023
    Volume 12, Issue 1 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • Demystifying Secure Graph Database for Analytics of Big Data


    Author(s): MARWAHA, Hitesh; SHARMA, Anurag

    Quick view | Full article | Citations | Views: 308


    Author(s) keywords: , , , ,


    Reference keywords: , ,


    Abstract:

    Smart cities are the emerging paradigm to improve living standards. Smart cities exploit numerous technologies to provide good health, better transportation facilities, education, and uninterrupted power and water supply that lead to higher levels of comfort. For practical implementations of these kinds of projects, huge amounts of data will initially be required and an ample amount of data will be generated thereafter the implementation of the project. In the present digital world, the biggest challenge that organizations are facing is the analysis of such a large amount of data. Direct analysis and exploitation is pivotal key factor of the data for accomplishment in numerous business and service domains, as well as the smart city domain. In this paper special focus is given to those applications of big data that support smart cities along with the advantages of including big data applications for smart cities and need of secure graph database that can be used to analyze the large data. In addition to it is also concluded that graph analytics can easily regulate the connections between many different data points of the smart city data: even those that at first do not appear to be connected.



    References:

    [1]. https://dzone.com/articles/how-big-data-has-the-biggest-impact-in-smart-citie
    [2]. Kumar, A., & Parkas, A. (2014). Role of big data and analytics in smart cities. Int J Sci Res (IJSR), 6(14), 12-23.
    [3]. McAfee, Andrew, et al. "Big data: the management revolution." Harvard business review 90.10 (2012): 60-68.
    [4]. https://dustinstout.com/social-media-statistics/
    [5]. Marwaha, Hitesh, and Rajeshwar Singh. "A comprehensive review of cloud computing simulators." J. Inf. Sci. Comput. Technol 4.1 (2015): 281-286.
    [6]. https://towardsdatascience.com/why-big-data-bf0d65933782
    [7]. Hou, Qixuan, Meng Han, and Zhipeng Cai. "Survey on data analysis in social media: A practical application aspect." Big Data Mining and Analytics 3.4 (2020): 259-279.
    [8]. Zikopoulos, Paul, and Chris Eaton. Understanding big data: Analytics for enterprise class hadoop and streaming data. McGraw-Hill Osborne Media, 2011.
    [9]. Anuradha, J. "A brief introduction on Big Data 5Vs characteristics and Hadoop technology." Procedia computer science 48 (2015): 319-324.
    [10]. Geczy, Peter. "Big data characteristics." The Macrotheme Review 3.6 (2014): 94-104.
    [11]. Gandomi, Amir, and Murtaza Haider. "Beyond the hype: Big data concepts, methods, and analytics." International journal of information management 35.2 (2015): 137-144.
    [12]. B. Cheng, S. Longo, F. Cirillo, M. Bauer and E. Kovacs, "Building a Big Data Platform for Smart Cities: Experience and Lessons from Santander," 2015 IEEE International Congress on Big Data, New York, NY, 2015, pp. 592-599, DOI: 10.1109/BigDataCongress.2015.91.
    [13]. Rathore, M. Mazhar, et al. "Real-time secure communication for Smart City in high-speed Big Data environment." Future Generation Computer Systems 83 (2018): 638-652.
    [14]. Lavalle, Ana, et al. "Improving Sustainability of Smart Cities through Visualization Techniques for Big Data from IoT Devices." Sustainability 12.14 (2020): 5595.
    [15]. Nisar, M. Usman, Arash Fard, and John A. Miller. "Techniques for graph analytics on big data." 2013 IEEE International Congress on Big Data. IEEE, 2013.
    [16]. Cuzzocrea, Alfredo, and Il-Yeol Song. "Big graph analytics: The state of the art and future research agenda." Proceedings of the 17th International Workshop on Data Warehousing and OLAP. 2014.
    [17]. Pal, Debajyoti, Tuul Triyason, and Praisan Padungweang. "Big data in smart-cities: Current research and challenges." Indonesian Journal of Electrical Engineering and Informatics (IJEEI) 6.4 (2018): 351-360.
    [18]. https://www.xenonstack.com/insights/graph-databases-big-data/
    [19]. Qi, Lei, and Jing Guo. "Development of smart city community service integrated management platform." International Journal of Distributed Sensor Networks 15.6 (2019): 1550147719851975.
    [20]. https://neo4j.com/blog/data-modeling-basics/
    [21]. Vukotic, Aleksa, et al. Neo4j in action. Manning Publications Co., 2014.
    [22]. https://allegrograph.com/articles/dataconomy-article-how-to-keep-graph-databases-both-flexible-and-secure/
    [23]. https://neo4j.com/docs/cypher-manual/current/administration/security/subgraph/



    Additional Information

    Article Title: Demystifying Secure Graph Database for Analytics of Big Data
    Author(s): MARWAHA, Hitesh; SHARMA, Anurag
    Date of Publication: 2021-06-29
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2021.01.01
    Issue: Volume 10, Issue 1, Year 2021
    Section: Advances in Information Security Research
    Page Range: 11-17 (7 pages)



    Copyright ©2012-2024
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.