Abstract
With the Big Data been increasingly used nowadays across multiple domains, viz., science, engineering, commercial fields, and so on, it has become an interest of research as there is growing concern over Big Data security and privacy of individuals involved. This entry delineates a study regarding issues, benefits, and challenges of security and privacy of Big Data in the cloud and will discuss research challenges and directions concerning data confidentiality, privacy, and trustworthiness in the context of Big Data. Key research issues discussed in this paper include enormous benefits and challenges regarding security and privacy in Big Data and some techniques to enforce security in Big Data stores.
Similar content being viewed by others
References
Abbas A, Khan SU (2014) A review on the state-of-the-art privacy-preserving approaches in the e-health clouds. IEEE J Biomed Health Inform 18:1431–1441
AbuKhousa E, Mohamed N, Al-Jaroodi J (2012) E-health cloud: opportunities and challenges. Futur Internet 4:621–645
Ahmed M, Ullah ASB (2017) False data injection attacks in healthcare. In Australasian Conference on Data Mining. Springer Singapore, Singapore, pp 192–202
Alguliyev R, Imamverdiyev Y (2014) Big data: big promises for information security. In: Proceedings of IEEE 8th international conference on application of information and communication technologies, pp 1–4
Alshehri S, Raj RK (2013) Secure access control for health information sharing systems. In: Proceedings of IEEE international conference on healthcare informatics, pp 277–286
Azmi Z (2015) Opportunities and security challenges of big data. In: Current and emerging trends in cyber operations. Palgrave Macmillan UK, London, pp 181–197
Balamurugan B, Shivitha NG, Monisha V, Saranya V (2015) Survey of access control models for cloud based real-time applications. In: Proceedings of the international conference on innovation information in computing technologies, 2015. IEEE, pp 1–6
Barua M, Lu R, Shen X (2013) SPS: spersonal health information sharing with patient-centric access control in cloud computing. In: Proceedings of the IEEE global communications conference (GLOBECOM), 2013 IEEE. pp 647–652
Bertino E, Ghinita G, Kamra A (2011) Access control for databases: concepts and systems. Found Trends® Databases 3:1–148
Cheng K, Wang L, Shen Y, Wang H, Wang Y, Jiang X, Zhong H (2017) Secure k-NN query on encrypted cloud data with multiple keys. In: IEEE transactions on big data. IEEE. https://doi.org/10.1109/TBDATA.2017.2707552
Clemens S, Alekhya G, Sneha V, Ujwala S, Yazhini C (2017) Impact of electronic health records on long-term care facilities: systematic review. JMIR Med Inform 5:e35. https://doi.org/10.2196/medinform.7958
Cuzzocrea A (2014) Privacy and security of big data: current challenges and future research perspectives. In: Proceedings of the first international workshop on privacy and secuirty of big data. ACM, pp 45–47
Dwork C (2011) Differential privacy. In: Encyclopedia of cryptography and security. Springer-Verlag Berlin, Heidelberg, pp 338–340
Fang W, Wen XZ, Zheng Y, Zhou M (2017) A survey of big data security and privacy preserving. IETE Tech Rev 34:544–560
Gantz J, Reinsel D (2012) The digital universe in 2020: big data, bigger digital shadows, and biggest growth in the far east. IDC iView: IDC Analyze Futur 2007:1–16
Glavic B (2014) Big data provenance: challenges and implications for benchmarking. In: Specifying big data benchmarks. Springer Berlin Heidelberg. pp 72–80
Griebel L et al (2015) A scoping review of cloud computing in healthcare. BMC Med Inform Decis Mak 15:17. https://doi.org/10.1186/s12911-015-0145-7
Huang J, Peng M, Wang H, Cao J, Gao W, Zhang X (2017) A probabilistic method for emerging topic tracking in microblog stream. World Wide Web 20(2):325–350
Ibraimi L, Asim M, Petković M (2009) Secure management of personal health records by applying attribute-based encryption. In: Proceedings of 2009 6th international workshop on wearable micro and nano technologies for personalized health (pHealth). IEEE, pp 71–74
Jensen M (2013) Challenges of privacy protection in big data analytics. In: Proceedings of 2013 IEEE international congress on big data (BigData Congress). IEEE, pp 235–238
Jeong Y-S, Shin S-S (2016) An efficient authentication scheme to protect user privacy in seamless big data services. Wirel Pers Commun 86:7–19
Kabir ME, Wang H, Bertino E (2012) A role-involved purpose-based access control model. Inf Syst Front 14:809–822
Kadhiwala NJaB (2017) Big data security and privacy issues – a survey. In: Proceedings of the international conference on innovations in power and advanced computing technologies (i-PACT). pp 1–5. https://doi.org/10.1109/IPACT.2017.8245064
Katal A, Wazid M, Goudar R (2013) Big data: issues, challenges, tools and good practices. In: Proceedings of 2013 sixth international conference on contemporary computing (IC3). IEEE, pp 404–409
Khalil F, Wang H, Li J (2007) Integrating markov model with clustering for predicting web page accesses. In: Proceeding of the 13th Australasian world wide web conference, pp 63–74
Li N, Li T, Venkatasubramanian S (2007) t-closeness: privacy beyond k-anonymity and l-diversity. In: Proceeding of the IEEE 23rd international conference on data engineering (ICDE 2007). IEEE, pp 106–115
Li M, Sun X, Wang H, Zhang Y, Zhang J (2011) Privacy-aware access control with trust management in web service. World Wide Web 14:407–430
Li M, Yu S, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24:131–143
Li P, Guo S, Miyazaki T, Xie M, Hu J, Zhuang W (2016) Privacy-preserving access to big data in the cloud. IEEE Cloud Comput 3:34–42
Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007) L-diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data 1:3
Matturdi B, Xianwei Z, Shuai L, Fuhong L (2014) Big data security and privacy: a review. China Commun 11:135–145
McCune JC (1998) Data, data, everywhere. Manag Rev 87:10
Nabeel M, Shang N, Bertino E (2013) Privacy preserving policy-based content sharing in public clouds. IEEE Trans Knowl Data Eng 25:2602–2614
Narayan S, Gagné M, Safavi-Naini R (2010) Privacy preserving EHR system using attribute-based infrastructure. In: Proceedings of the 2010 ACM workshop on cloud computing security workshop. ACM, pp 47–52
Ruj S (2014) Attribute based access control in clouds: a survey. In: Proceedings of the 2014 international conference on signal processing and communications (SPCOM). IEEE, pp 1–6
Shang N, Nabeel M, Paci F, Bertino E (2010) A privacy-preserving approach to policy-based content dissemination. In: Proceedings of 2010 IEEE 26th international conference on data engineering (ICDE). IEEE, pp 944–955
Shen Y, Zhang T, Wang Y, Wang H, Jiang X (2017) MicroThings: a generic iot architecture for flexible data aggregation and scalable service cooperation. IEEE Commun Mag 55:86–93
Shu J, Jia X, Yang Kand Wang H (2018) Privacy-preserving task recommendation services for crowdsourcing. IEEE Trans Serv Comput 1(99):1–1
Sudarsan SD, Jetley RP, Ramaswamy S (2015) Security and privacy of big data. In: Big data. Springer India, New Delhi, pp 121–136
Sun X, Wang H, Li J, Pei J (2011a) Publishing anonymous survey rating data. Data Min Knowl Disc 23:379–406
Sun X, Wang H, Li J, Zhang Y (2011b) Injecting purpose and trust into data anonymisation. Comput Secur 30:332–345
Sweeney L (2002) K-anonymity: a model for protecting privacy. Int J Uncertainty Fuzziness Knowledge Based Syst 10:557–570
Types of Network Attacks against Confidentiality, Integrity and Avilability (2017) http://www.omnisecu.com/ccna-security/types-of-network-attacks.php. Accessed 23 Jan 2017
Ulusoy H, Kantarcioglu M, Pattuk E, Hamlen K (2014) Vigiles: fine-grained access control for mapreduce systems. In: Proceedings of 2014 IEEE international congress on big data (BigData Congress). IEEE, pp 40–47
Venkatram K, Geetha MA (2017) Review on big data & analytics – concepts, philosophy, process and applications. Cybern Inf Technol 17:3–27
Vimalachandran P, Wang H, Zhang Y, Zhuo G, Kuang H (2017) Cryptographic access control in electronic health record systems: a security implication. In: Proceedings of the international conference on web information systems engineering. Springer, pp 540–549
Wang H, Cao J, Zhang Y (2002) Ticket-based service access scheme for mobile users. Aust Comput Sci Commun 24(1):285–292
Wang H, Cao J, Zhang Y (2005) A flexible payment scheme and its role-based access control. IEEE Trans Knowl Data Eng 17:425–436
Wang H, Zhang Y, Cao J (2009) Effective collaboration with information sharing in virtual universities. IEEE Trans Knowl Data Eng 21(6):840–853
Wang H, Jiang X, Kambourakis G (2015) Special issue on security, privacy and trust in network-based big data. Inf Sci Int J 318:48–50
Wu R, Ahn G-J, Hu H (2012) Secure sharing of electronic health records in clouds. In: Proceedings of 2012 8th international conference on collaborative computing: networking, applications and worksharing (CollaborateCom). IEEE, pp 711–718
Xu L, Shi W (2016) Security theories and practices for big data. In: Big data concepts, theories, and applications. Springer International Publishing, Cham, pp 157–192
Yi X, Miao Y, Bertino E, Willemson J (2013) Multiparty privacy protection for electronic health records. In: Proceedings of the global communications conference (GLOBECOM), 2013 IEEE. IEEE, pp 2730–2735
Zhang J, Tao X, Wang H (2014) Outlier detection from large distributed databases. World Wide Web 17:539–568
Zhang Y, Shen Y, Wang H, Yong J, Jiang X (2015) On secure wireless communications for IoT under eavesdropper collusion. IEEE Trans Autom Sci Eng 13(3):1281–1293. July 2016
Zhang J, Li H, Liu X, Luo Y, Chen F, Wang H, Chang L (2017) On efficient and robust anonymization for privacy protection on massive streaming categorical information. IEEE Trans Dependable Secure Comput 14(5):507–520
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this entry
Cite this entry
Chenthara, S., Wang, H., Ahmed, K. (2018). Security and Privacy in Big Data Environment. In: Sakr, S., Zomaya, A. (eds) Encyclopedia of Big Data Technologies. Springer, Cham. https://doi.org/10.1007/978-3-319-63962-8_245-1
Download citation
DOI: https://doi.org/10.1007/978-3-319-63962-8_245-1
Received:
Accepted:
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-63962-8
Online ISBN: 978-3-319-63962-8
eBook Packages: Springer Reference MathematicsReference Module Computer Science and Engineering