Fundamentals of Working With Big Data in Databases
Fundamentals of Working With Big Data in Databases
Volume Trends
Eduard Shaikhulov, International Journal of Advanced 14, No.4, July - Science
in Computer Augustand
2025
Engineering, 14(4), July – August 2025, 190 - 193
International Journal of Advanced Trends in Computer Science and Engineering
Available Online at http://www.warse.org/IJATCSE/static/pdf/file/ijatcse021442025.pdf
https://doi.org/10.30534/ijatcse/2025/021442025
Received Date: June 20, 2025 Accepted Date: July 26, 2025 Published Date: August 06, 2025
190
Eduard Shaikhulov, International Journal of Advanced Trends in Computer Science and Engineering, 14(4), July – August 2025, 190 - 193
3. TECHNOLOGIES FOR BIG DATA Spark an architecture to work with huge volumes of data in
memory with no latency, granting computational performance
Big data necessitates the utilization of specialized to increase in real time.
technologies that can keep pace with such volume, velocity, NoSQL databases are specifically designed to handle
and variety challenges while processing and managing it [2]. unstructured and semi-structured data, which are often
The main enabling technologies in this respect are distributed unsuitable for traditional relational models [4]. MongoDB,
computing, NoSQL databases, and adapted relational DBMS. Cassandra, and Redis are among the most commonly used
Distributed computing is the backbone of big data processing NoSQL solutions. MongoDB is a document-oriented database
systems nowadays. Different platforms, such as Apache that stores data in JSON-like documents, allowing for efficient
Hadoop and Apache Spark, enable the allocation of handling of flexible structures (figure 3).
computational tasks across several nodes to manage large
amounts of data effectively [3]. Hadoop utilizes the
MapReduce framework, where a task is split into smaller
subtasks that are executed simultaneously and subsequently
merged to produce the final outcome (figure 1).
192
Eduard Shaikhulov, International Journal of Advanced Trends in Computer Science and Engineering, 14(4), July – August 2025, 190 - 193
Table 2: Methods for ensuring security and managing big data [8] The modern concept of database protection involves
Method Description Application encryption, access control, monitoring, and auditing in order
Authentication Mechanisms for Used in corporate to minimize risks related to data disclosure and unauthorized
and verifying user and cloud access. Big data management is to be provided in conformity
authorization identity and databases. with legal requirements and to ensure the fault tolerance of
restricting access systems. Future development will include enhancing data
rights. processing methodologies, integration of artificial intelligence
Data Encoding Applied for data tools, and further development of analytical and visualization
encryption information using protection in capabilities. These solutions let organizations unlock the
cryptographic storage and complete power of big data, thus making big data a prime asset
algorithms. transmission. in every sector.
Access control Restricting user Implemented
rights to view, through REFERENCES
modify, and delete role-based access 1. A. O. Adewusi, O. F. Asuzu. Business intelligence in the
data. control (RBAC, era of big data: a review of analytical tools and
ABAC). competitive advantage, Computer Science & IT
Monitoring Tracking user actions Used for Research Journal, Vol 5, no. 2, pp. 415-431, 2024.
and auditing and detecting identifying 2. A. Malikov. Digital transformation and its impact on
anomalies in system suspicious the structure and efficiency of modern business,
operations. activity. Annali d’Italia, no. 62, pp. 112-115, 2024.
Backup and Creating copies of Applied in 3. L. G. Ahmad. Spark, Hadoop, and Beyond: Exploring
recovery data for restoration in high-load and Distributed Frameworks for Metaheuristic
case of failure. critical systems. Optimization in Big Data Analytics. 2024.
Data masking Concealing parts of Used in testing 4. V. H. Olivera, G. Ruizhe, R. C. Huacarpuma, P. B. Silva,
information to and analytical A. M. Mariano, M. Holanda. Data modeling and
protect sensitive environments. NoSQL databases-a systematic mapping review, ACM
data. Computing Surveys (CSUR), Vol. 54, no. 6, pp. 1-26,
2021.
Big data security and its efficient management cannot be 5. B. El Idrissi, S. Baïna, A. Mamouny, M. Elmaallam.
ensured without considering information protection at all RDF/OWL storage and management in relational
levels, starting from user authentication to activity monitoring database management systems: A comparative study,
and data leak prevention. In this case, the consideration is not Journal of King Saud University-Computer and
limited to the technological aspects of security; the regulatory Information Sciences, Vol. 34, no. 9, pp. 7604-7620,
requirements around personal data processing, such as GDPR 2022.
(General Data Protection Regulation), CCPA (California 6. M. M. Rahman, I. Siful, Md Kamruzzaman, H. J. Zihad.
Consumer Privacy Act), and HIPAA (Health Insurance Advanced query optimization in SQL databases for
Portability and Accountability Act), should also be taken into real-time big data analytics, Academic Journal on
consideration. It is relevant that a data management system be Business Administration, Innovation & Sustainability,
adapted to the distributed storage architecture, ensuring fault Vol. 4, no. 3, pp. 1-14, 2024.
tolerance with minimal losses in the case of any failure. 7. L. Dinesh, K. G. Devi. An efficient hybrid optimization
of ETL process in data warehouse of cloud
6. CONCLUSION architecture, Journal of Cloud Computing, Vol. 13, no.
1, pp. 122024.
Big data and the related database technologies are instruments 8. A. Israfilov. Stages of development and
of the fundamental class of a modern digital world that ranges implementation of information security policies in
from real-time analyses to machine learning. Working with big organizations, Danish scientific journal, no. 90, pp.
data requires special architectures, such as implementations of 131-134, 2024.
distributed computing, NoSQL solutions, or adapted relational
DBMS. Among the effective ways for database optimization, a
distinction is made for indexing, partitioning, compressing,
and managing data load. These methods ensure the high
performance, scalability, and reliability of storage and
processing systems and are a core in developing digital
platforms. Security and data management also remain crucial
issues.
193