BD4201 Big Data Security Syllabus:

BD4201 Big Data Security Syllabus – Anna University PG Syllabus Regulation 2021

COURSE OBJECTIVES:

 To understand the mathematical foundations of security principles
 To appreciate the different aspects of encryption techniques
 To understand the role played by authentication in security
 To understand the security concerns of big-data.

UNIT I SYMMETRIC TECHNIQUES

Probability and Information Theory – Algebraic foundations – Number theory – Substitution Ciphers – Transposition Ciphers – Classical Ciphers – DES – AES – Confidentiality Modes of Operation

UNIT II ASYMMETRIC TECHNIQUES

Diffie-Hellman Key Exchange protocol – Discrete logarithm problem – RSA cryptosystems & cryptanalysis – ElGamal cryptosystem – Elliptic curve architecture and cryptography – Data Integrity techniques.

UNIT III AUTHENTICATION

Authentication requirements – Authentication functions – Message authentication codes – Hash functions – Security of hash functions and MACS – MD5 Message Digest algorithm – Secure hash algorithm.

UNIT IV SECURITY ANALYTICS I

Introduction to Security Analytics – Techniques in Analytics – Analysis in everyday life –Challenges in Intrusion and Incident Identification – Analysis of Log file – Simulation and Security Process.

UNIT V SECURITY ANALYTICS II

Access Analytics – Security Analysis with Text Mining – Security Intelligence – Security Breaches.

TOTAL: 45 PERIODS

COURSE OUTCOMES:

After the completion of this course, students will be able to
CO1: Design algorithms in a secure manner for Big data applications
CO2: Use available security practices in big-data analytics.
CO3: Understand Mathematical foundations of security principles and different aspects of encryption techniques.
CO4: Explain the role played by authentication in security.
CO5: Analyze and find solutions for Security concerns of big-data.

REFERENCES

1. William Stallings, “Cryptography and Network security: Principles and Practices”, Pearson/PHI, 7th Edition, 2017.
2. Behrouz A. Forouzan, Debdeeep Mukhopadhyay “Cryptography and Network Security”, Tata McGraw Hill Education, 3rd Edition, 2015.
3. Douglas R. Stinson ,“Cryptography Theory and Practice ”, Chapman & Hall/CRC, 3rd Edition, 2021.
4. Mark Talabis, Robert McPherson, I Miyamoto and Jason Martin, “Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data”,Syngress Media, U.S.,2014

WEB REFERENCES:

1. http://www.smartercomputingblog.com/category/big-data/
2. https://www.rd-alliance.org/group/big-data-ig-data-security-and-trust-wg/wiki/big-datasecurity-issues-challenges-tech-concerns

ONLINE RESOURCES:
1. https://www.tutorialspoint.com/big_data_tutorials.htm
2. https://www.simplilearn.com/tutorials/big-data-tutorial