BD4201 Big Data Security Syllabus:
BD4201 Big Data Security Syllabus – Anna University PG Syllabus Regulation 2021
COURSE OBJECTIVES:
To understand the mathematical foundations of security principles
To appreciate the different aspects of encryption techniques
To understand the role played by authentication in security
To understand the security concerns of big-data.
UNIT I SYMMETRIC TECHNIQUES
Probability and Information Theory – Algebraic foundations – Number theory – Substitution Ciphers – Transposition Ciphers – Classical Ciphers – DES – AES – Confidentiality Modes of Operation
UNIT II ASYMMETRIC TECHNIQUES
Diffie-Hellman Key Exchange protocol – Discrete logarithm problem – RSA cryptosystems & cryptanalysis – ElGamal cryptosystem – Elliptic curve architecture and cryptography – Data Integrity techniques.
UNIT III AUTHENTICATION
Authentication requirements – Authentication functions – Message authentication codes – Hash functions – Security of hash functions and MACS – MD5 Message Digest algorithm – Secure hash algorithm.
UNIT IV SECURITY ANALYTICS I
Introduction to Security Analytics – Techniques in Analytics – Analysis in everyday life –Challenges in Intrusion and Incident Identification – Analysis of Log file – Simulation and Security Process.
UNIT V SECURITY ANALYTICS II
Access Analytics – Security Analysis with Text Mining – Security Intelligence – Security Breaches.
TOTAL: 45 PERIODS
COURSE OUTCOMES:
After the completion of this course, students will be able to
CO1: Design algorithms in a secure manner for Big data applications
CO2: Use available security practices in big-data analytics.
CO3: Understand Mathematical foundations of security principles and different aspects of encryption techniques.
CO4: Explain the role played by authentication in security.
CO5: Analyze and find solutions for Security concerns of big-data.
REFERENCES
1. William Stallings, “Cryptography and Network security: Principles and Practices”, Pearson/PHI, 7th Edition, 2017.
2. Behrouz A. Forouzan, Debdeeep Mukhopadhyay “Cryptography and Network Security”, Tata McGraw Hill Education, 3rd Edition, 2015.
3. Douglas R. Stinson ,“Cryptography Theory and Practice ”, Chapman & Hall/CRC, 3rd Edition, 2021.
4. Mark Talabis, Robert McPherson, I Miyamoto and Jason Martin, “Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data”,Syngress Media, U.S.,2014
WEB REFERENCES:
1. http://www.smartercomputingblog.com/category/big-data/
2. https://www.rd-alliance.org/group/big-data-ig-data-security-and-trust-wg/wiki/big-datasecurity-issues-challenges-tech-concerns
ONLINE RESOURCES:
1. https://www.tutorialspoint.com/big_data_tutorials.htm
2. https://www.simplilearn.com/tutorials/big-data-tutorial