<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security and Privacy Archives - Artificial Intelligence</title>
	<atom:link href="https://www.aiuniverse.xyz/tag/security-and-privacy/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.aiuniverse.xyz/tag/security-and-privacy/</link>
	<description>Exploring the universe of Intelligence</description>
	<lastBuildDate>Sat, 29 Jul 2017 10:21:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>10 CHALLENGES TO BIG DATA SECURITY AND PRIVACY</title>
		<link>https://www.aiuniverse.xyz/10-challenges-to-big-data-security-and-privacy/</link>
					<comments>https://www.aiuniverse.xyz/10-challenges-to-big-data-security-and-privacy/#comments</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Sat, 29 Jul 2017 10:21:54 +0000</pubDate>
				<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Big data]]></category>
		<category><![CDATA[Big Data Security]]></category>
		<category><![CDATA[CHALLENGES]]></category>
		<category><![CDATA[data mining]]></category>
		<category><![CDATA[Security and Privacy]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=364</guid>

					<description><![CDATA[<p>Source &#8211; dataconomy.com Big Data could not be described just in terms of its size. However, to generate a basic understanding, Big Data are datasets which can’t be <a class="read-more-link" href="https://www.aiuniverse.xyz/10-challenges-to-big-data-security-and-privacy/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/10-challenges-to-big-data-security-and-privacy/">10 CHALLENGES TO BIG DATA SECURITY AND PRIVACY</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Source &#8211; <strong>dataconomy.com</strong></p>
<p>Big Data could not be described just in terms of its size. However, to generate a basic understanding, Big Data are datasets which can’t be processed in conventional database ways to their size. This kind of data accumulation helps improve customer care service in many ways. However, such huge amounts of data can also bring forth many privacy issues, making Big Data Security a prime concern for any organization. Working in the field of data security and privacy, many organizations are acknowledging these threats and taking measures to prevent them.</p>
<h4><b>WHY BIG DATA SECURITY ISSUES ARE SURFACING</b></h4>
<p>Big data is nothing new to large organizations, however, it’s also becoming popular among smaller and medium sized firms due to cost reduction and provided ease to manage data.</p>
<p>Cloud-based storage has facilitated data mining and collection. However, this big data and cloud storage integration has caused a challenge to privacy and security threats.</p>
<p>The reason for such breaches may also be that security applications that are designed to store certain amounts of data cannot the big volumes of data that the aforementioned datasets have. Also, these security technologies are inefficient to manage dynamic data and can control static data only. Therefore, just a regular security check can not detect security patches for continuous streaming data. For this purpose, you need full-time privacy while data streaming and big data analysis.</p>
<h4><b>PROTECTING TRANSACTION LOGS AND DATA</b></h4>
<p>Data stored in a storage medium, such as transaction logs and other sensitive information, may have varying levels, but that’s not enough. For instance, the transfer of data between these levels gives the IT manager insight over the data which is being moved. Data size being continuously increased, the scalability and availability makes auto-tiering necessary for big data storage management. Yet, new challenges are being posed to big data storage as the auto-tiering method doesn’t keep track of data storage location.</p>
<h4><b>VALIDATION AND FILTRATION OF END-POINT INPUTS</b></h4>
<p>End-point devices are the main factors for maintaining big data. Storage, processing and other necessary tasks are performed with the help of input data, which is provided by end-points. Therefore, an organization should make sure to use an authentic and legitimate end-point devices.</p>
<h4><b>SECURING DISTRIBUTED FRAMEWORK CALCULATIONS AND OTHER PROCESSES</b></h4>
<p>Computational security and other digital assets in a distributed framework like MapReduce function of Hadoop, mostly lack security protections. The two main preventions for it are securing the mappers and protecting the data in the presence of an unauthorized mapper.</p>
<h4><b>SECURING AND PROTECTING DATA IN REAL TIME</b></h4>
<p>Due to large amounts of data generation, most  organizations are unable to maintain regular checks. However, it is most beneficial to perform security checks and observation in real time or almost in  real time.</p>
<h4><b>PROTECTING ACCESS CONTROL METHOD COMMUNICATION AND ENCRYPTION  </b></h4>
<p>A secured data storage device is an intelligent step in order to protect the data. Yet, because most often data storage devices are vulnerable, it is necessary to encrypt the access control methods as well.</p>
<h4><b>DATA PROVENANCE</b></h4>
<p>To classify data, it is necessary to be aware of its origin In order to determine the data origin accurately, authentication, validation and access control could be gained.</p>
<h4><b>GRANULAR AUDITING</b></h4>
<p>Analyzing different kinds of logs could be advantageous and this information could be helpful in recognizing any kind of cyber attack or malicious activity. Therefore, regular auditing can be beneficial.</p>
<h4><b>GRANULAR ACCESS CONTROL</b></h4>
<p>Granular access control of big data stores by NoSQL databases or the Hadoop Distributed File System requires a strong authentication process and mandatory access control.</p>
<h4><b>PRIVACY PROTECTION FOR NON-RATIONAL DATA STORES</b></h4>
<p>Data stores such as NoSQL have many security vulnerabilities, which cause privacy threats. A prominent security flaw is that it is unable to encrypt data during the tagging or logging of data or while distributing it into different groups, when it is streamed or collected.</p>
<h4><b>CONCLUSION</b></h4>
<p>Organizations must ensure that all big data bases are immune to security threats and vulnerabilities. During data collection, all the necessary security protections such as real-time management should be fulfilled. Keeping in mind the huge size of big data, organizations should remember the fact that managing such data could be difficult and requires extraordinary efforts. However, taking all these steps would help maintain consumer privacy.</p>
<p>The post <a href="https://www.aiuniverse.xyz/10-challenges-to-big-data-security-and-privacy/">10 CHALLENGES TO BIG DATA SECURITY AND PRIVACY</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/10-challenges-to-big-data-security-and-privacy/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
			</item>
		<item>
		<title>Google is using deep learning and data analysis to curate the Play Store</title>
		<link>https://www.aiuniverse.xyz/google-is-using-deep-learning-and-data-analysis-to-curate-the-play-store/</link>
					<comments>https://www.aiuniverse.xyz/google-is-using-deep-learning-and-data-analysis-to-curate-the-play-store/#comments</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Thu, 13 Jul 2017 10:56:20 +0000</pubDate>
				<category><![CDATA[Deep Learning]]></category>
		<category><![CDATA[data analysis]]></category>
		<category><![CDATA[deep learning]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google Play]]></category>
		<category><![CDATA[Play Store]]></category>
		<category><![CDATA[Security and Privacy]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=5</guid>

					<description><![CDATA[<p>Source &#8211; androidcentral.com Google has released some details from the Security and Privacy team about how Google Play is being curated, and machine learning plays a big part. Google has <a class="read-more-link" href="https://www.aiuniverse.xyz/google-is-using-deep-learning-and-data-analysis-to-curate-the-play-store/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/google-is-using-deep-learning-and-data-analysis-to-curate-the-play-store/">Google is using deep learning and data analysis to curate the Play Store</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Source &#8211; <strong>androidcentral.com</strong></p>
<p>Google has released some details from the Security and Privacy team about how Google Play is being curated, and machine learning plays a big part.</p>
<p>Google has two basic goals for applications in the Play Store: safety and exposure. The Security and Privacy team wants to weed out apps with malware, but they&#8217;re also concerned about applications that ask for broad permissions that might not be needed. In turn, when good apps that follow good practices are found, the team wants them to be featured in the Play Store.</p>
<p>One of the ways they do this is by using what is called &#8220;peer groups&#8221;. Applications with similar capabilities are grouped together. Apps like Spotify and Pandora (for example) are different from each other, but they have the same basic functions and are designed to stream music to your Android using details from your account with each service. The same goes for Twitter and Facebook or apps like coloring books. When they do the same basic things, they get lumped together. This makes it easier to study what the apps are doing, how they are doing it, and if they should be doing it at all.</p>
<p>They are then analyzed to see what they request from your device when it comes to personal data. Ideally, every app in a peer group will request the same types of information and have a good reason to do so. But sometimes, one will be an outlier. Google gives the example of a coloring book app that requests fine location details through GPS. Other coloring book apps don&#8217;t do this, so one that does would be subject to further review by the Security and Privacy team.</p>
<p>There are too many apps in Google Play for humans to do this effectively, so Google has employed some machine learning techniques to automate much of the process. Deep learning algorithms study the language in the app, data about what the app does and how it does is analyzed by computer, and the peer groups themselves are built by these machines based on things like app metadata and text descriptions as well as metrics like user installs.</p>
<p>Google does plenty to keep malware from getting on your phone through Google Play, but this is also to educate developers about the complex (very) permission model Android uses. this is a pretty cool way to use computers that help users and developers, and it&#8217;s great that Google is willing to share some information about how it&#8217;s being done.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.aiuniverse.xyz/google-is-using-deep-learning-and-data-analysis-to-curate-the-play-store/">Google is using deep learning and data analysis to curate the Play Store</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/google-is-using-deep-learning-and-data-analysis-to-curate-the-play-store/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
	</channel>
</rss>
