A Comparative Study of Recent Advances in Big Data for Security and Privacy

  • Ahlam KouridEmail author
  • Salim Chikhi
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 4)


Big data is coming with new challenges in security; it involves the three aspects of security confidentiality, availability, integrity, and privacy. These challenges are due to the 5V data characteristics in big data domain: velocity, variety, volume, value, and veracity depending on different levels of security: network, data, application, and authentication. Furthermore, big data is also promising security. The huge amount of data provides a more security information like data logs. Big data analysis can be applied to security. Many theories for big data security have been proposed in literature, covering the different aspects of security and privacy. Recently, different schemes and frameworks were introduced to reach high level of security in big data, based on different security theories. In this paper, we discuss different challenges in big data for security and privacy. Moreover, recent security theories and works in this field have been introduced. A comparative study of latest advances in big data for security and privacy is presented. Finally, some future directions for big data for security and privacy are discussed.


Big data Security Privacy Cryptography Access control Intrusion detection Encryption 


  1. 1.
    VG Savant. Approaches to Solve Big Data Security Issues and Comparative Study of Cryptographic Algorithms for Data Encryption. International Journal of Engineering Research and General Science, 2015.Google Scholar
  2. 2.
    Chandra Kopparapu. Load Balancing Servers, Firewalls, and Caches. Wiley, 2002.Google Scholar
  3. 3.
    DH Ackley. Indefinite Scalability for Living Computation. Association for the Advancement of Artificial Intelligence, 2016.Google Scholar
  4. 4.
    S Rajan, et al. Top ten big data security and privacy challenges, Cloud Security Alliance, 2012.Google Scholar
  5. 5.
    A Agarwal, A Agarwal, The Security Risks Associated with Cloud Computing, International Journal of Computer Applications in Engineering Sciences, 2011.Google Scholar
  6. 6.
    L Xu and W Shi, Security Theories and Practices for Big Data, Big Data Concepts, Theories, and Applications. Springer, 2016.Google Scholar
  7. 7.
    M Blaze et al. Divertible protocols and atomic proxy cryptography, Springer, 1998.Google Scholar
  8. 8.
    M Mambo, E Okamoto. Proxy cryptosystems: delegation of the power to decrypt ciphertexts. IEICE Trans Fundam Electron Commun Comput Sci E80-A:54–63, 1997.Google Scholar
  9. 9.
    YR Bachupally et al. Network Security Analysis Using Big Data Technology, IEEE, 2016.Google Scholar
  10. 10.
    DS Terzi et al. A Survey on Security and Privacy Issues in Big Data. IEEE, 2015.Google Scholar
  11. 11.
    C Dwork. Differential privacy. Springer,2006.Google Scholar
  12. 12.
    K Shirudkar, D Motwani, Big-Data Security, International Journal of Advanced Research in Computer Science and Software Engineering, 2015.Google Scholar
  13. 13.
    X Huang and X Du Achieving Big Data Privacy Via Hybrid Cloud, IEEE, 2014.Google Scholar
  14. 14.
    DE Cho, et al. Double Privacy Layer Architecture for Big Data Framework, International Journal of Software Engineering and Its Applications, 2016.Google Scholar
  15. 15.
    X Dong, et al. Secure Sensitive Data Sharing on a Big Data Platform, Tsinghua Science and Technology. IEEE, 2015.Google Scholar
  16. 16.
    Z Liu et al. An Improved Cloud Data Sharing Scheme with Hierarchical Attribute Structure, Journal of Universal Computer Science, 2015.Google Scholar
  17. 17.
    VC Hu, et al. An Access Control Scheme for Big Data Processing, Collaborative Computing: Networking, Applications and Worksharing, 2014 International Conference. IEEE, 2014.Google Scholar
  18. 18.
    C Lin, ET al. Differential Privacy Preserving in Big Data Analytics for Connected Health, Journal of Medical Systems. Springer, 2016.Google Scholar
  19. 19.
    C Lin, ET al. A differential privacy protection scheme for sensitive big data in body sensor networks, annals of Telecommunications. Springer, 2016.Google Scholar
  20. 20.
    B. Saraladevi et al. Big Data and Hadoop-A Study in Security Perspective, Elsevier, 2015.Google Scholar
  21. 21.
    H Ulusoy, et al. Vigiles: Fine-grained Access Control for MapReduce Systems, Congress on Big Data. IEEE, 2014.Google Scholar
  22. 22.
    AA. Cárdenas et al. Big Data Analytics for Security, IEEE Security & Privacy, 2013.Google Scholar
  23. 23.
    KS Jeon et al. A Study on the Big Data Log Analysis for Security, International Journal of Security and Its Applications, 2016.Google Scholar
  24. 24.
    SS Sathe, et al. Deploying and researching hadoop algorithms on virtual machines and analyzing log files, International Education & Research Journal, 2015.Google Scholar
  25. 25.
    L Cui, et al. When big data meets software defined networking: SDN for big data and big data for SDN, IEEE Network, 2016.Google Scholar
  26. 26.
    P Verma, et al. Network Security in Big Data: Tools and Techniques, Springer, 2016.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Computer Science Department, MISC LaboratoryCollege of NTIC, Constantine 2 University – A. MehriConstantineAlgeria

Personalised recommendations