The Review of Socionetwork Strategies

, Volume 10, Issue 2, pp 105–123 | Cite as

An Approach to Security for Unstructured Big Data

  • Md. Ezazul Islam
  • Md. Rafiqul Islam
  • A B M Shawkat Ali


Security of Big Data is a huge concern. In a broad sense, Big Data contains two types of data: structured and unstructured. Providing security to unstructured data is more difficult than providing security to structured data. In this paper, we have developed an approach to provide adequate security to unstructured data by considering types of data and their sensitivity levels. We have reviewed the different analytics methods of Big Data to build nodes of different types of data. Each type of data has been classified to provide adequate security and enhance the overhead of the security system. To provide security to a data node, and a security suite has been designed by incorporating different security algorithms. Those security algorithms collectively form a security suite which has been interfaced with the data node. Information on data sensitivity has been collected through a survey. We have shown through several experiments on multiple computer systems with varied configurations that data classification with respect to sensitivity levels enhances the performance of the system. The experimental results show how and in what amount the designed security suite reduces overhead and increases security simultaneously.


Big Data Data security Data analytics Unstructured data Security suite Security standard 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Wu Xindong., Zhu Xingqua., Wu Gong-Qin., Ding Wei. : Data mining with big data. IEEE Transactions on Knowledge and Data Engineering. 26(1), 97–107 (2014)CrossRefGoogle Scholar
  2. 2.
    Grolinger Katarina., Higashino Wilson A., Tiwari Abhinav., Capretz Miriam AM.: Data management in cloud environments: NoSQL and NewSQL data stores. Journal of Cloud Computing. 2(22), 1–24 (2013)Google Scholar
  3. 3.
    Rivest, Ronald Linn.: MIT Computer Science and Artificial Intelligence Laboratory Web Page,, 5 October 2015
  4. 4.
    Alanazi Hamda., Zaidan B.B., Zaidan A.A., Jalab Hamid.A., Shabbir M., Al-Nabhani Yahya.: New Comparative Study Between DES, 3DES and AES within Nine Factors. Journal of Computing. 2(3), 152–157 (2010)Google Scholar
  5. 5.
    Wikipedia Homepage,, 2 October 2015
  6. 6.
    Merkle Ralph C.: A fast software one-way hash function. Journal of Cryptology. 3(1), 43–58 (1990)Google Scholar
  7. 7.
    Mendel, Floria., Rijmen, Vincent.: Cryptanalysis of the Tiger Hash Function. Advances in Cryptology - ASIACRYPT 2007. Springer Berlin Heidelberg, 2007Google Scholar
  8. 8.
    Dai, Wei.: Homepage,, 2 October 2015
  9. 9.
  10. 10.
    Wikipedia Homepage,, 2 October 2015
  11. 11.
    Eastlake, Donald E., Reagle, Joseph M., Solo, David.: World Wide Web Consortium Homepage,, 2 October 2015
  12. 12.
    Demchenko, Yuri., Ngo, Canh., Membrey, Peter.: Architecture Framework and Components for the Big Data Ecosystem. System and Network Engineering, Graduate school of Sciences, University of Amsterdam, 2013Google Scholar
  13. 13.
    Islam Md.Rafiqul. Habiba Mansura.: Data Intensive Dynamic Scheduling Model and Algorithm for Cloud Computing Security, Journal of Computers. 9(8), 1796–1808 (2014)Google Scholar
  14. 14.
    Tracy, Miles., Jansen, Wayne., Bisker, Scott.: Guidelines on Electronic Mail Security. NIST Special Publication 800-45, 2007Google Scholar
  15. 15.
    Nordbotten Nils Agne.: XML and Web Services Security Standards. IEEE Communications Surveys & Tutorials. 11(3), 4–21 (2009)CrossRefGoogle Scholar
  16. 16.
    Islam Mohd Rafiqul., Hasan Mohd Toufiq., Ashaduzzaman G. M.: An architecture and a dynamic scheduling algorithm of grid for providing security for real-time data-intensive applications. International Journal of Network Management. 21(5), 402–413 (2011)CrossRefGoogle Scholar
  17. 17.
    Doll, Shelley.: ZDNet Homepage,, 2 October 2015
  18. 18.
    : An Efficient Security System for CABAC Bin-Strings of H264/SVC. IEEE Transactions on Circuits and Systems for Video Technology. 23(3), 425–437 (2013)CrossRefGoogle Scholar
  19. 19.
    Shi, F., Liu, S., Yao, H., Liu, Y., Zhang, S.: Scalable and credible video watermarking towards scalable video coding. Springer, 2010Google Scholar
  20. 20.
    Bhowmik, Deepayan.: White Horse eTheses Homepage,,_Deepayan.pdf, 16 September 2015
  21. 21.
    Stutz Thomas., Uhl Andreas.: A Survey of H264 AVC/SVC Encryption. IEEE Transactions on Circuits and Systems for Video Technology. 22(3), 325–339 (2012)CrossRefGoogle Scholar
  22. 22.
    Arkko, J., Carrara, E., Lindholm, F., Naslund, M., Norrman, K.: Internet Engineering Task Force Homepage,, 2 October 2015

Copyright information

© Springer Japan 2016

Authors and Affiliations

  • Md. Ezazul Islam
    • 1
  • Md. Rafiqul Islam
    • 2
  • A B M Shawkat Ali
    • 3
  1. 1.Department of Computer ScienceAmerican International University-BangladeshDhakaBangladesh
  2. 2.Computer Science and Engineering Discipline, Khulna UniversityKhulnaBangladesh
  3. 3.School of Science and TechnologyUniversity of FijiLautokaFiji

Personalised recommendations