A Security Applicable with Deep Learning Algorithm for Big Data Analysis


  • Ramdas Vankdothu
  • Mohd Abdul Hameed


Big data is a field that discusses ways to investigate, regularly extract information, or differently deal with data sets that are excessively large or difficult to be dispensed with traditional data-processing utilization software. The analysis of big data is the critical challenge to be discussed among all research results because it presents more critical business value in any analytics ecosystem. Classification is a mechanism that designs data are allowing economic and efficient completion of precious analysis. So, there is a need for choosing suitable features for preparing the classifier. That is feasible by combining a Feature Selection process with a classification pattern. So, this analysis work initiates a hybrid method defined HCFS-Hierarchical learning for recognizing relevant Feature Subsets compared to the target class and yielded to the classifier representation to improve the performance. The Privacy need is revealed by the integrity characteristic of the big data. The development of science has encouraged every individual to the protection and utilize big data for analyses of the industry, consumer, medical, bank account, etc. obtained privacy break or interruption in most cases. Also, the data appropriated for big data analytics include limited, or copyright retained data, and there endures data secrecy break or interference. So, there is an essential need to protect privacy with specific principles for safeguarding the fine-tuned private data of every individual from interruption for analytics.

In this survey, we examine how Deep Learningcan be applied to discuss some critical problems in large data analyzes, including the extraction of complex models of large amounts of data, moral indexing, data tagging, rapid data recovery. The extension of the investigation study shows the necessity for feature extraction before classification. Feature selection determines a feature subset from existent feature set associated with the target class, while feature extraction obtains new features from a previous feature set. It improves the performance of classification by preparing the classifier with suitable features. Furthermore, Feature Extraction is similarly employed for the enrichment of the organization performance by implementing new features compared to the target class for practice capable of the classifier. Most of the research work based on previous Deep Learning algorithms like Autoencoders (AEs), Convolutional Neural Networks (CNNs), and Recurrent Neural Networks (RNN) are the main approaches implemented. However, there are still have a problem in their complexity, Privacy, and also time-consuming in the current approach to solve and end this issue, this work inducts a schema described Enhanced Local N-ary Ternary Patterns (ELNTP) with MDBN (Modified Deep Belief Network) for multiple big data image set classification and provide security for big data analytics. The ELNTP acts by changing the previous LNTP by modification in the assortment of pixel states for identification and MDBN operates through adjustment of parameters in the DBN approach on activation function selection and weight updating process. The ELNTP and MDBN provide excellent performance in big data heterogeneous image set classification than the previous methods. This investigation work examines the result of privacy in the feature selection method because privacy is compulsory when a user distributes a sample feature for the determination of appropriate characteristics from the databank and vice versa. Further, the addition of secrecy-provided mechanism should not pretend the classification performance. Qualitative evaluation of all the proposed classification methods and Security-preserving mechanism has been created with classification accuracy and operating time, sequentially. Statistical analysis of accuracy assessments and computational time represents that the proposed schemes provide compromising results over previous methods.