Advertisement

Big Data and Privacy: Challenges and Opportunities

  • Amin AzmoodehEmail author
  • Ali Dehghantanha
Chapter
  • 25 Downloads

Abstract

With increasing volume of data, including sensitive and personal information stored on distributed online services such as clouds, data breaches and privacy leakage are urgent and challenging issues. For practical deployment and from different points of view such as application and spatial, different and case-specific solutions are required. A considerable number of security and privacy approaches in the area of big data have been designed based on their application circumstances. Hence, it is essential to design and implement systematic privacy characterization and computational models and analyze different aspects, including protection level, profit or loss, complexity, etc. The purpose of this handbook is to explore challenges and solutions relating to big data privacy.

References

  1. 1.
    A. Azmoodeh, A. Dehghantanha, K.-K.R. Choo, Big Data and Internet of Things Security and Forensics: Challenges and Opportunities (Springer International Publishing, Cham, 2019), pp. 1–4Google Scholar
  2. 2.
    V. Ho, A. Dehghantanha, K. Shanmugam, A guideline to enforce data protection and privacy digital laws in Malaysia, in 2010 Second International Conference on Computer Research and Development (IEEE, Piscataway, 2010), pp. 3–6CrossRefGoogle Scholar
  3. 3.
    S. Walker-Roberts, M. Hammoudeh, A. Dehghantanha, A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure. IEEE Access 6, 25167–25177 (2018)CrossRefGoogle Scholar
  4. 4.
    G. Epiphaniou, P. Karadimas, D. Kbaier Ben Ismail, H. Al-Khateeb, A. Dehghantanha, K.R. Choo, Nonreciprocity compensation combined with turbo codes for secret key generation in vehicular Ad Hoc social IoT networks. IEEE Internet Things J. 5(4), 2496–2505 (2018)Google Scholar
  5. 5.
    H. Karimipour, A. Dehghantanha, R.M. Parizi, K.R. Choo, H. Leung, A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids. IEEE Access 7, 80778–80788 (2019)CrossRefGoogle Scholar
  6. 6.
    A. Azmoodeh, A. Dehghantanha, K.R. Choo, Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning. IEEE Trans. Sustain. Comput. 4(1), 88–95 (2019)CrossRefGoogle Scholar
  7. 7.
    R. Bao, Z. Chen, M.S. Obaidat, Challenges and techniques in big data security and privacy: a review. Secur. Priv. 1(4), e13 (2018)Google Scholar
  8. 8.
    S. Yu, Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4, 2751–2763 (2016)CrossRefGoogle Scholar
  9. 9.
    S. Nepal, R. Ranjan, K.R. Choo, Trustworthy processing of healthcare big data in hybrid clouds. IEEE Cloud Comput. 2(2), 78–84 (2015)CrossRefGoogle Scholar
  10. 10.
    Y. Teing, A. Dehghantanha, K.R. Choo, Z. Muda, M.T. Abdullah, Greening cloud-enabled big data storage forensics: syncany as a case study. IEEE Trans. Sustain. Comput. 4(2), 204–216 (2019)CrossRefGoogle Scholar
  11. 11.
    C. Yang, Q. Huang, Z. Li, K. Liu, F. Hu, Big data and cloud computing: innovation opportunities and challenges. Int. J. Digital Earth 10(1), 13–53 (2017)CrossRefGoogle Scholar
  12. 12.
    P.J. Taylor, T. Dargahi, A. Dehghantanha, Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as a Case Study (Springer International Publishing, Cham, 2019), pp. 257–272Google Scholar
  13. 13.
    Y.-Y. Teing, A. Dehghantanha, K.-K.R. Choo, CloudMe forensics: a case of big data forensic investigation. Concurr. Comput. Pract. Exp. 30(5), e4277 (2017)Google Scholar
  14. 14.
    J. Sakhnini, H. Karimipour, A. Dehghantanha, R.M. Parizi, AI and security of critical infrastructure, in Big Data and Privacy, ed. by K.-K.R. Choo, A. Dehghantanha (Springer, Cham, 2020). https://doi.org/10.1007/978-3-030-38557-6_2 Google Scholar
  15. 15.
    A. Al-Abassi, H. Karimipour, H.H. Pajouh, A. Dehghantanha, R.M. Parizi, Industrial big data analytics: challenges and opportunities, in Big Data and Privacy, ed. by K.-K.R. Choo, A. Dehghantanha (Springer, Cham, 2020). https://doi.org/10.1007/978-3-030-38557-6_3 Google Scholar
  16. 16.
    M.F. Moghadam, A. Mohajerzdeh, H. Karimipour, H. Chitsaz, R. Karimi, B. Molavi, A privacy protection key agreement protocol based on ECC for smart grid, in Big Data and Privacy, ed. by K.-K.R. Choo, A. Dehghantanha (Springer, Cham, 2020). https://doi.org/10.1007/978-3-030-38557-6_4 Google Scholar
  17. 17.
    S. Yousefi, F. Derakhshan, H. Karimipour, Applications of big data analytics and machine learning in the internet of things, in Big Data and Privacy, ed. by K.-K.R. Choo, A. Dehghantanha (Springer, Cham, 2020). https://doi.org/10.1007/978-3-030-38557-6_5 Google Scholar
  18. 18.
    W. Peters, A. Dehghantanha, R.M. Parizi, G. Srivastava, A comparison of various machine learning models for opcode based internet of things malware detection, in Big Data and Privacy, ed. by K.-K.R. Choo, A. Dehghantanha (Springer, Cham, 2020). https://doi.org/10.1007/978-3-030-38557-6_6 Google Scholar
  19. 19.
    S. Singh, H. Karimipour, H. HaddadPajouh, A. Dehghantanha, Artificial intelligence and security of industrial control systems, in Big Data and Privacy, K.-K. R. Choo, A. Dehghantanha (Springer, Cham, 2020). https://doi.org/10.1007/978-3-030-38557-6_7
  20. 20.
    M. Amrollahi, S. Hadayeghparast, H. Karimipour, F. Derakhshan, G. Srivastava, Enhancing network security via machine learning: opportunities and challenges, in Big Data and Privacy, ed. by K.-K.R. Choo, A. Dehghantanha (Springer, Cham, 2020). https://doi.org/10.1007/978-3-030-38557-6_8 Google Scholar
  21. 21.
    M. Sharma, H. Elmiligi, F. Gebali, Network security and privacy evaluation scheme for cyber physical systems (CPS), in Big Data and Privacy, ed. by K.-K.R. Choo, A. Dehghantanha (Springer, Cham, 2020). https://doi.org/10.1007/978-3-030-38557-6_9 Google Scholar
  22. 22.
    H.M. Rouzbahani, H. Karimipour, A. Rahimnejad, A. Dehghantanha, G. Srivastava, Anomaly attack detection in cyber-physical systems using machine learning, in Big Data and Privacy, ed. by K.-K.R. Choo, A. Dehghantanha (Springer, Cham, 2020). https://doi.org/10.1007/978-3-030-38557-6_10 Google Scholar
  23. 23.
    H.M. Rouzbahani, H. Karimipour, G. Srivastava, Big data application for renewable energy resource security, in Big Data and Privacy, ed. by K.-K.R. Choo, A. Dehghantanha (Springer, Cham, 2020). https://doi.org/10.1007/978-3-030-38557-6_11 Google Scholar
  24. 24.
    J.C. Cabello, A.N. Jahromi, H. Karimipour, A. Dehghantanha, R.M. Parizi, Big-data and cyber-physical systems in healthcare: challenges and opportunities, in Big Data and Privacy, ed. by K.-K. R. Choo, A. Dehghantanha (Springer, Cham, 2020). https://doi.org/10.1007/978-3-030-38557-6_12 Google Scholar
  25. 25.
    W. Han, A. Azmoodeh, H. Karimipour, S. Yang, Privacy preserving abnormality detection: a deep learning approach, in Big Data and Privacy, ed. by K.-K.R. Choo, A. Dehghantanha (Springer, Cham, 2020). https://doi.org/10.1007/978-3-030-38557-6_13 Google Scholar
  26. 26.
    S. Nakhodchi, A. Dehghantanha, H. Karimipour, Privacy and security in smart and precision farming: a bibliometric analysis,” in Big Data and Privacy, ed. by K.-K.R. Choo, A. Dehghantanha (Springer, Cham, 2020). https://doi.org/10.1007/978-3-030-38557-6_14 Google Scholar
  27. 27.
    M. Amrollahi, A. Dehghantanha, R.M. Parizi, A survey on application of big data in fin tech banking security and privacy, in Big Data and Privacy, ed. by K.-K.R. Choo, A. Dehghantanha, (Springer, Cham, 2020). https://doi.org/10.1007/978-3-030-38557-6_15 Google Scholar
  28. 28.
    M. Saharkhizan, A. Azmoodeh, H. HaddadPajouh, A. Dehghantanha, R.M. Parizi, G. Srivastava, A hybrid deep generative local metric learning method for intrusion detection, in Big Data and Privacy, ed. by K.-K.R. Choo, A. Dehghantanha (Springer, Cham, 2020). https://doi.org/10.1007/978-3-030-38557-6_16 Google Scholar
  29. 29.
    M. Nassiri, H. HaddadPajouh, A. Dehghantanha, H. Karimipour, R.M. Parizi, G. Srivastava, Malware elimination impact on dynamic analysis: an experimental analysis on machine learning approach, in Big Data and Privacy, ed. by K.-K.R. Choo, A. Dehghantanha (Springer, Cham, 2020). https://doi.org/10.1007/978-3-030-38557-6_17 Google Scholar
  30. 30.
    M.M. BehradFar, H. HaddadPajouh, A. Dehghantanha, A. Azmoodeh, H. Karimipour, R.M. Parizi, G. Srivastava, Rat hunter: building robust models for detecting rats based on optimum hybrid features, in Big Data and Privacy, K.-K.R. Choo, A. Dehghantanha (Springer, Cham, 2020). https://doi.org/10.1007/978-3-030-38557-6_18
  31. 31.
    A. Azmoodeh, A. Dehghantanha, R.M. Parizi, S. Hashemi, B. Gharabaghi, G. Srivastava, Active spectral botnet detection based on eigenvalue weighting, in Big Data and Privacy, ed. by K.-K.R. Choo, A. Dehghantanha (Springer, Cham, 2020). https://doi.org/10.1007/978-3-030-38557-6_19 Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Cyber Science LabUniversity of GuelphGuelphCanada

Personalised recommendations