Reference Hub1
Nature-Inspired Techniques for Data Security in Big Data

Nature-Inspired Techniques for Data Security in Big Data

S. R. Mani Sekhar, Siddesh G. M., Shaswat Anand, D. Laxmi
Copyright: © 2020 |Pages: 28
ISBN13: 9781522597421|ISBN10: 1522597425|ISBN13 Softcover: 9781522597438|EISBN13: 9781522597445
DOI: 10.4018/978-1-5225-9742-1.ch008
Cite Chapter Cite Chapter

MLA

Sekhar, S. R. Mani, et al. "Nature-Inspired Techniques for Data Security in Big Data." Security, Privacy, and Forensics Issues in Big Data, edited by Ramesh C. Joshi and Brij B. Gupta, IGI Global, 2020, pp. 189-216. https://doi.org/10.4018/978-1-5225-9742-1.ch008

APA

Sekhar, S. R., Siddesh G. M., Anand, S., & Laxmi, D. (2020). Nature-Inspired Techniques for Data Security in Big Data. In R. Joshi & B. Gupta (Eds.), Security, Privacy, and Forensics Issues in Big Data (pp. 189-216). IGI Global. https://doi.org/10.4018/978-1-5225-9742-1.ch008

Chicago

Sekhar, S. R. Mani, et al. "Nature-Inspired Techniques for Data Security in Big Data." In Security, Privacy, and Forensics Issues in Big Data, edited by Ramesh C. Joshi and Brij B. Gupta, 189-216. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-5225-9742-1.ch008

Export Reference

Mendeley
Favorite

Abstract

Inspired computing is based on biomimcry of natural occurrences. It is a discipline in which problems are solved using computer models which derive their abstractions from real-world living organisms and their social behavior. It is a branch of machine learning that is very closely related to artificial intelligence. This form of computing can be effectively used for data security, feature extraction, etc. It can easily be integrated with different areas such as big data, IoT, cloud computing, edge computing, and fog computing for data security. The chapter discusses some of the most popular biologically-inspired computation algorithms which can be used to create secured framework for data security in big data like ant colony optimization, artificial bee colony, bacterial foraging optimization to name a few. Explanation of these algorithms and scope of its application are given. Furthermore, case studies are presented to help the reader understand the application of these techniques for security in big data.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.