Abstract
In the present era, the use of the Internet has extended abruptly. With this abrupt increase, massive data is being created, resulting in big data. Big data means more diverse, more impetus, and more complex data streams. Data is being produced in abundance in exabytes and zettabytes by electronic devices, power grids, and modern software. This big data brings different challenges such as incompleteness, inconsistency, heterogeneity, and security with itself. The presented paper targets the security challenge as it is a very significant feature overseen by various data analysts; thus, data must be secured from dwindling in the wrong hands. This paper discusses the approaches and mechanisms mainly based on anonymization, access control, and encryption.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Arora M, Bahuguna H (2016) Big data security—the big challenge. Int J Sci Eng Res 7(12)
Tarekegn GB, Munaye YY (2016) Big data: security issues, challenges and future scope. Int J Comput Eng Technol 7(4):12–24
Siddique M, Mirza MA, Ahmad M, Chaudhry J, Islam R (2018) A survey of big data security solutions in healthcare. In: International conference on security and privacy in communication systems, Aug 2018. Springer, Cham, pp 391–406
Bhadani AK, Jothimani D (2016) Big data: challenges, opportunities, and realities. In: Effective big data management and opportunities for implementation. IGI Global, pp 1–24
Elgendy N, Elragal A (2014) Big data analytics: a literature review paper. In: Industrial conference on data mining, July 2014. Springer, Cham, pp 214–227
Zuech R, Khoshgoftaar TM, Wald R (2015) Intrusion detection and big heterogeneous data: a survey. J Big Data 2(1):1–41
Ruiz-Rosero J, Ramirez-Gonzalez G, Williams JM, Liu H, Khanna R, Pisharody G (2017) Internet of things: a scientometric review. Symmetry 9(12):301
Sagiroglu S, Sinanc D (2013) Big data: a review. In: 2013 international conference on collaboration technologies and systems (CTS), May 2013. IEEE, pp 42–47
Mujawar S, Kulkarni S (2015) Big data: tools and applications. Int J Comput Appl 115(23):7–11
Joseph Charles P, Carol I, MahaLakshmi S (2018) Big data security—an overview. IRJET 11(2)
Tarekgen GB, Munaye YY (2016) Big data: security issues, challenges and future scope. IJCET 4(7):12–24
Sisense. https://www.sisense.com/glossary/big-data-security. Accessed 2019/12/03
Joseph A, Cherian M (2018) The quest for privacy and security in various big data applications: a survey. IJCESR 3(5):1–8
Lafuente G (2015) The big data security challenge. Netw Secur 2015(1):12–14
Begoli E, Horey J (2012) Design principles for effective knowledge discovery from big data. In: 2012 joint working IEEE/IFIP conference on software architecture and European conference on software architecture, Aug 2012. IEEE, pp 215–218
Xu L, Jiang C, Wang J, Yuan J, Ren Y (2014) Information security in big data: privacy and data mining. IEEE Access 2:1149–1176
Zhang D (2018) Big data security and privacy protection. In: 8th international conference on management and computer science (ICMCS 2018), vol 77, Oct 2018. Atlantis Press, pp 275–278
Li Y, Gai K, Qiu L, Qiu M, Zhao H (2017) Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf Sci 387:103–115
Aljawarneh S, Yassein MB (2017) A resource-efficient encryption algorithm for multimedia big data. Multimed Tools Appl 76(21):22703–22724
Yan Z, Ding W, Yu X, Zhu H, Deng RH (2016) Deduplication on encrypted big data in cloud. IEEE Trans Big Data 2(2):138–150
Dong X, Li R, He H, Zhou W, Xue Z, Wu H (2015) Secure sensitive data sharing on a big data platform. Tsinghua Sci Technol 20(1):72–80
Hu VC, Ferraiolo D, Kuhn R, Friedman AR, Lang AJ, Cogdell MM, Scarfone K (2013) Guide to attribute based access control (ABAC) definition and considerations (draft). NIST Spec Publ 800(162):1–54
Zeng W, Yang Y, Luo B (2013) Access control for big data using data content. In: 2013 IEEE international conference on big data, Oct 2013. IEEE, pp 45–47
Xia QI, Sifah EB, Asamoah KO, Gao J, Du X, Guizani M (2017) MeDShare: Trust-less medical data sharing among cloud service providers via blockchain. IEEE Access 5:14757–14767
Khuntia S, Kumar PS (2018) New hidden policy CP-ABE for big data access control with privacy-preserving policy in cloud computing. In: 2018 9th international conference on computing, communication and networking technologies (ICCCNT), July 2018. IEEE, pp 1–7
Jain P, Gyanchandani M, Khare N (2016) Big data privacy: a technological perspective and review. J Big Data 3(1):1–25
Jasim AC, Tapus N, Hassoon IA (2018) Access control by signature-keys to provide privacy for cloud and big data. In: 2018 5th international conference on control, decision and information technologies (CoDIT), Apr 2018. IEEE, pp 978–983
Zhang X, Qi L, Dou W, He Q, Leckie C, Ramamohanarao K, Salcic Z (2017) Mrmondrian: scalable multidimensional anonymisation for big data privacy preservation. IEEE Trans Big Data
Zhang X, Liu C, Nepal S, Yang C, Dou W, Chen J (2014) A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud. J Comput Syst Sci 80(5):1008–1010
Al-Zobbi M, Shahrestani S, Ruan C (2016) Sensitivity-based anonymization of big data. In: IEEE 41st conference on local computer networks workshops (LCN workshops). IEEE, pp 58–64
Domingo-Ferrer J, Soria-Comas J (2016) Anonymization in the time of big data. In: International conference on privacy in statistical databases, Sept 2016. Springer, Cham, pp 57–68
Cui H, Deng RH, Li Y, Wu G (2017) Attribute-based storage supporting secure deduplication of encrypted data in cloud. IEEE Trans Big Data 5(3):330–342
Mehta BB, Rao UP (2019) Improved l-diversity: scalable anonymization approach for privacy preserving big data publishing. J King Saud Univ Comput Inf Sci
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chaudhary, Y., Pathak, H. (2022). Security of Big Data: Threats and Different Approaches Towards Big Data Security. In: Agrawal, D.P., Nedjah, N., Gupta, B.B., Martinez Perez, G. (eds) Cyber Security, Privacy and Networking. Lecture Notes in Networks and Systems, vol 370. Springer, Singapore. https://doi.org/10.1007/978-981-16-8664-1_31
Download citation
DOI: https://doi.org/10.1007/978-981-16-8664-1_31
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-8663-4
Online ISBN: 978-981-16-8664-1
eBook Packages: EngineeringEngineering (R0)