Bonfring International Journal of Software Engineering and Soft Computing, Vol. 9, No. 2, April 2019 1 Abstract--- Upgrade of security and protection in portable server farms is challengeable with proficient security key administration. For promoting and research, huge numbers of the organizations utilize huge information, however might not have the major resources especially from a security viewpoint. Security of Big Data is a major concern. In expansive sense Big Data contains two sorts of information, for example, organized and unstructured. To give security to unstructured information is more troublesome than that of organized. In this paper manages an overview on enormous information security and proposed new system called huge information security suite with quantum cryptographic key administration conspire. The best possible security norms of calculations can be actuated utilizing and which has been interfaced with the information hub. Unstructured information by considering the kinds of the information and their affectability levels. We have looked into the changed examination strategies for Big Data, which gives us the office to manufacture an information hub of databases of various kinds of information. Each kind of information has been additionally characterized to give satisfactory security and improve the overhead of the security framework Keywords--- Security, Authentication, Information Secrecy, Data Node, NoSQL, Hadoop and Map Reduce. I. INTRODUCTION N case a security break hops out at colossal data, it would result in extensively more veritable authentic repercussions and reputational hurt than at present. In this new time, numerous associations are using the advancement to store and look at petabytes of data about their association, business and their customers. Along these lines, information gathering ends up being fundamentally progressively essential. For making colossal data secure, methodologies, for instance, encryption, logging, honeypot ID must be fundamental. In various affiliations, the course of action of enormous data for distortion area is especially engaging and accommodating. The trial of recognizing and preventing impelled risks and harmful intruders, must be comprehended using tremendous data style examination. These methodology help in perceiving the risks in the beginning periods using further developed model examination and separating different data sources [1]. Security just as data insurance challenges existing endeavors and government affiliations. With the development in the usage of gigantic data in business, numerous associations are R. Gowsalya, PG Scholar, Department of Computer Science and Engineering, Nandha Engineering College. E-mail: gowsalya3@gmail.com Dr.P. Thirumoorthy, Professor, Department of Computer Science and Engineering, Nandha Engineering College. E-mail: thiru4u@gmail.com DOI:10.9756/BIJSESC.9011 pondering insurance issues. Data security is a hazard, thusly associations must be on assurance mindful. In any case, not in any manner like security, assurance should be considered as preference, along these lines it transforms into an offering point for the two customers and diverse accomplices. There should be a congruity between data assurance and national security. In Big Data with its volume there are groupings of data, for instance, sorted out, semi-composed, unstructured, etc. The security of sorted out data can be considered by existing security methods of insight or measures using SQL questions. Thusly, our favorable position is to offer security to unstructured data, which join content, XML, picture, video, sound and whatnot. We have developed a methodology for security of unstructured Big Data by considering the present measures or estimations of security. This approach portrays examination of the unstructured information utilizing information investigation innovations; manufacture an information hub of databases. In this paper concentrate on various overviews in huge information security issues. II. SURVEY ON BIG DATA SECURITY 2.1. Big Data Causes Privacy Violation in Various Applications By virtue of the social insurance huge focal points in verifying the soundness of patients, immense data is exceedingly reinforced by restorative administrations system. Tremendous data information is used to see people with a high risk of certain remedial conditions at beginning period and giving improved quality consideration and cutting down the development cost of human administrations. Regardless of the way that there are giant points of interest, new surveys are revealing that gigantic data may be less secure than at first thought. As indicated by diagram it is found that, anyway the social protection data is up close and personal, it is easily open. It is basic to be perceptive about security and insurance proposals exploiting gigantic data. Tremendous data allows the desire for a lot of other information about people. The information tremendous data can envision is logically developing the likelihood to be used as a strategy for mistreating people in [7] a collection of economics. An audit exhibits that when view of status for example like information from face book was dismembered, it gave exact information to isolate men dependent upon race, alcohol use, sexual introduction, etc. It is especially stressed by numerous people that affiliations, directors, preparing structure may use such models and start isolating people in light of various human organized parameters. One of the genuine employments of colossal data is advancing where the publicists endeavor to put their things and organizations before significantly centered around customers. Regardless, when the customer is R. Gowsalya and Dr.P. Thirumoorthy A Survey on Big Data Security and Related Techniques to Improve Security I ISSN 2277-5099 | © 2019 Bonfring