Skip to main content

Security of Big Data: Threats and Different Approaches Towards Big Data Security

  • Conference paper
  • First Online:
Cyber Security, Privacy and Networking

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 370))

Abstract

In the  present era, the use of the Internet has extended abruptly. With this abrupt increase, massive data is being created, resulting in big data. Big data means more diverse, more impetus, and more complex data streams. Data is being produced in abundance in exabytes and zettabytes by electronic devices, power grids, and modern software. This big data brings different challenges such as incompleteness, inconsistency, heterogeneity, and security with itself. The presented paper targets the security challenge as it is a very significant feature overseen by various data analysts; thus, data must be secured from dwindling in the wrong hands. This paper discusses the approaches and mechanisms mainly based on anonymization, access control, and encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Arora M, Bahuguna H (2016) Big data security—the big challenge. Int J Sci Eng Res 7(12)

    Google Scholar 

  2. Tarekegn GB, Munaye YY (2016) Big data: security issues, challenges and future scope. Int J Comput Eng Technol 7(4):12–24

    Google Scholar 

  3. Siddique M, Mirza MA, Ahmad M, Chaudhry J, Islam R (2018) A survey of big data security solutions in healthcare. In: International conference on security and privacy in communication systems, Aug 2018. Springer, Cham, pp 391–406

    Google Scholar 

  4. Bhadani AK, Jothimani D (2016) Big data: challenges, opportunities, and realities. In: Effective big data management and opportunities for implementation. IGI Global, pp 1–24

    Google Scholar 

  5. Elgendy N, Elragal A (2014) Big data analytics: a literature review paper. In: Industrial conference on data mining, July 2014. Springer, Cham, pp 214–227

    Google Scholar 

  6. Zuech R, Khoshgoftaar TM, Wald R (2015) Intrusion detection and big heterogeneous data: a survey. J Big Data 2(1):1–41

    Article  Google Scholar 

  7. Ruiz-Rosero J, Ramirez-Gonzalez G, Williams JM, Liu H, Khanna R, Pisharody G (2017) Internet of things: a scientometric review. Symmetry 9(12):301

    Article  Google Scholar 

  8. Sagiroglu S, Sinanc D (2013) Big data: a review. In: 2013 international conference on collaboration technologies and systems (CTS), May 2013. IEEE, pp 42–47

    Google Scholar 

  9. Mujawar S, Kulkarni S (2015) Big data: tools and applications. Int J Comput Appl 115(23):7–11

    Google Scholar 

  10. Joseph Charles P, Carol I, MahaLakshmi S (2018) Big data security—an overview. IRJET 11(2)

    Google Scholar 

  11. Tarekgen GB, Munaye YY (2016) Big data: security issues, challenges and future scope. IJCET 4(7):12–24

    Google Scholar 

  12. Sisense. https://www.sisense.com/glossary/big-data-security. Accessed 2019/12/03

  13. Joseph A, Cherian M (2018) The quest for privacy and security in various big data applications: a survey. IJCESR 3(5):1–8

    Google Scholar 

  14. Lafuente G (2015) The big data security challenge. Netw Secur 2015(1):12–14

    Article  Google Scholar 

  15. Begoli E, Horey J (2012) Design principles for effective knowledge discovery from big data. In: 2012 joint working IEEE/IFIP conference on software architecture and European conference on software architecture, Aug 2012. IEEE, pp 215–218

    Google Scholar 

  16. Xu L, Jiang C, Wang J, Yuan J, Ren Y (2014) Information security in big data: privacy and data mining. IEEE Access 2:1149–1176

    Article  Google Scholar 

  17. Zhang D (2018) Big data security and privacy protection. In: 8th international conference on management and computer science (ICMCS 2018), vol 77, Oct 2018. Atlantis Press, pp 275–278

    Google Scholar 

  18. Li Y, Gai K, Qiu L, Qiu M, Zhao H (2017) Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf Sci 387:103–115

    Article  Google Scholar 

  19. Aljawarneh S, Yassein MB (2017) A resource-efficient encryption algorithm for multimedia big data. Multimed Tools Appl 76(21):22703–22724

    Article  Google Scholar 

  20. Yan Z, Ding W, Yu X, Zhu H, Deng RH (2016) Deduplication on encrypted big data in cloud. IEEE Trans Big Data 2(2):138–150

    Article  Google Scholar 

  21. Dong X, Li R, He H, Zhou W, Xue Z, Wu H (2015) Secure sensitive data sharing on a big data platform. Tsinghua Sci Technol 20(1):72–80

    Article  MathSciNet  Google Scholar 

  22. Hu VC, Ferraiolo D, Kuhn R, Friedman AR, Lang AJ, Cogdell MM, Scarfone K (2013) Guide to attribute based access control (ABAC) definition and considerations (draft). NIST Spec Publ 800(162):1–54

    Google Scholar 

  23. Zeng W, Yang Y, Luo B (2013) Access control for big data using data content. In: 2013 IEEE international conference on big data, Oct 2013. IEEE, pp 45–47

    Google Scholar 

  24. Xia QI, Sifah EB, Asamoah KO, Gao J, Du X, Guizani M (2017) MeDShare: Trust-less medical data sharing among cloud service providers via blockchain. IEEE Access 5:14757–14767

    Article  Google Scholar 

  25. Khuntia S, Kumar PS (2018) New hidden policy CP-ABE for big data access control with privacy-preserving policy in cloud computing. In: 2018 9th international conference on computing, communication and networking technologies (ICCCNT), July 2018. IEEE, pp 1–7

    Google Scholar 

  26. Jain P, Gyanchandani M, Khare N (2016) Big data privacy: a technological perspective and review. J Big Data 3(1):1–25

    Article  Google Scholar 

  27. Jasim AC, Tapus N, Hassoon IA (2018) Access control by signature-keys to provide privacy for cloud and big data. In: 2018 5th international conference on control, decision and information technologies (CoDIT), Apr 2018. IEEE, pp 978–983

    Google Scholar 

  28. Zhang X, Qi L, Dou W, He Q, Leckie C, Ramamohanarao K, Salcic Z (2017) Mrmondrian: scalable multidimensional anonymisation for big data privacy preservation. IEEE Trans Big Data

    Google Scholar 

  29. Zhang X, Liu C, Nepal S, Yang C, Dou W, Chen J (2014) A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud. J Comput Syst Sci 80(5):1008–1010

    Article  MathSciNet  Google Scholar 

  30. Al-Zobbi M, Shahrestani S, Ruan C (2016) Sensitivity-based anonymization of big data. In: IEEE 41st conference on local computer networks workshops (LCN workshops). IEEE, pp 58–64

    Google Scholar 

  31. Domingo-Ferrer J, Soria-Comas J (2016) Anonymization in the time of big data. In: International conference on privacy in statistical databases, Sept 2016. Springer, Cham, pp 57–68

    Google Scholar 

  32. Cui H, Deng RH, Li Y, Wu G (2017) Attribute-based storage supporting secure deduplication of encrypted data in cloud. IEEE Trans Big Data 5(3):330–342

    Article  Google Scholar 

  33. Mehta BB, Rao UP (2019) Improved l-diversity: scalable anonymization approach for privacy preserving big data publishing. J King Saud Univ Comput Inf Sci

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yashi Chaudhary .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chaudhary, Y., Pathak, H. (2022). Security of Big Data: Threats and Different Approaches Towards Big Data Security. In: Agrawal, D.P., Nedjah, N., Gupta, B.B., Martinez Perez, G. (eds) Cyber Security, Privacy and Networking. Lecture Notes in Networks and Systems, vol 370. Springer, Singapore. https://doi.org/10.1007/978-981-16-8664-1_31

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-8664-1_31

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-8663-4

  • Online ISBN: 978-981-16-8664-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics