Skip to main content

Develop Ten Security Analytics Metrics for Big Data on the Cloud

  • Conference paper
  • First Online:
Advances in Data Sciences, Security and Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 612))

Abstract

This paper reviews big data security analytics and looks into the big data lifecycle for assessments of big data security challenge in clouds. The paper justifies the reasons to develop big data security metrics. In this paper, we propose ten big data security metrics securing big data on cloud. This paper contributes new knowledge to big data security by tying with right security metrics.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bird J (2016) Using metrics to manage your application security program. SANS

    Google Scholar 

  2. Swetha MJ (2017) User activity monitoring and user behavior analytics for enterprise security. https://blogs.informatica.com/2017/11/150user-acyivity-monitoring-and-user-bahavior-analytics-for-enterprise-security/#fbid=w0pYBFYVzY

  3. Salazar D (2015) Cloud security framework audit methods. The SANS Institute

    Google Scholar 

  4. Four trends driving the need for security analytics. https://silasg.com

  5. Oltsik J (2017) Big data security analytics, an enterprise primer. http://e.huawei.com/sg/pulications/global/ict_insights/hw331605/feature%20story/HW_326987

  6. Sreenivasa BL, Kumar M, Shaikh MN, Sathyanarayana S, A study on encryption-decryption algorithm for big-data analytics in cloud. Int J Latest Trends Eng Technol (Special issue):323–329

    Google Scholar 

  7. Bi Survey (2017) Big data security analytics: a weapon against rising cyber security attacks? http://bi-survey.com/big-data-securty-analytics, 5 May 2017

  8. Michalsky R (2014) Cyber security metrics dashboard & analytics. http://www.ehcca.com/presentations/HIPAA22/michalsky.pdf

  9. O’Neill C (2017) Big data needs big security. Here’s why. https://www.imperva.com/blog/2017/02/big-data-needs-big-security-heres

  10. Ingram Micro Advisor (2017) Five metrics to monitor in your big data security analytics. http://www.ingrammicroadvisor.com/data-center/five-metricsto-montor-in-your-big-data-security-analytics

  11. Sagirogli S, Sinanc D (2013) Big data: a review. IEEE

    Google Scholar 

  12. Sullivan D (2015) Introduction to big data security analytics in the enterprise. http://searchsecurity.techtarget.com/feature/Introduction-to-big-data-security-analytics-in-the-enterprise

  13. Sreenivasa BL, Kumar M, Shaikh MN, Sathyanarayana S (2016) A study on encryption-decryption algorithm for big-data analytics in cloud. Int J Latest Trends Eng Technol (Special issue):323–329

    Google Scholar 

  14. Khan N, Yaqoob I, Hashem IAT, Inayut Z, Ali WKM, Alam M, Shiraz M, Gani A (2014) Big data survey, technologies, opportunities, and challenges. Sci World J 2014

    Google Scholar 

  15. Bird J (2016) Using metrics to manage your application security program. https://www.sans.org/reading-room/whitepapers/analyst/metrics-manage-application-security-program-36822

  16. Contos B, Big data security context. https://www.csoonline.com/article/2143842/data-protection/big-data-security-context.html

  17. Oltsik J (2012) Security intelligence: a key component of big data security analytics. http://resources.idgenterprise.com/original/AST-0085582_ESG-SecurityIntelligence-AKeyComponentofBigDataSecurityAnalytics_daiNA_cta68569.pdf

  18. Oltsik J (2014) Big data security analytics meets identity and access management. http://www.esg-global.com/blog-data-security-analytics-meets-identity-and-access-managemnt-iam

  19. Lewis J (2014) How big data means big security changes: Effective identity management in a data-driven world. http://www.datacenterjournal.com/big-data-means-big-security-effective-identity-management-datadriven-world

  20. SMARTYM (2017) How to protect big data? The main big data security challenges. https://smartym.pro/blog/how-to-protect-big-data-the-main-big-data-security-challenges/

  21. Shimeall T (2016) Traffic analysis for network security: two approaches for going beyond network flow data. https://insights.sei.cmu.edu/sei_blog/2016/09/traffic-analysis-for-network-security-two-approaches-for-go-beyond-network-flow/data.html

  22. Bedell C (2016) How to secure big data environments with identity management and auditing. https://www.cio.com/article/3147855/security/how-to-secure-big-data-environments-with-identity-managment-and-auding.html, 7 Dec 2016

  23. Hamlin A, Schear N, Shen E, Varia M, Yakoubov S, Yerukhimovich A (2016) Cryptography for big data security. In: Book chapter for big data: storage, sharing, and security. https://www.crcpress.com/9781498734868

    Chapter  Google Scholar 

  24. Marr B (2017) The 7 best data visualization tools. https://www.forbes.com/sites/bernarsdmarr/2017/20/the-t-best-data-visulaization-tool-in-2017/#5a54bb716c30

  25. Rawal BS, Kalutarage HK, Vivek SS, Pandey K (2016) The disintegration protocol: an ultimate technique for cloud data security. In: 2016 IEEE international conference on smart cloud (SmartCloud). IEEE, pp 27–34

    Google Scholar 

  26. Rawal BS, Vijayakumar V, Manogaran G, Varatharajan R, Chilamkurti N (2018) Secure disintegration protocol for privacy preserving cloud storage. In: Wireless personal communications, pp 1–17

    Article  Google Scholar 

  27. Vijayakumar P, Ganesh SM, Deborah LJ, Rawal BS (2018) A new SmartSMS protocol for secure SMS communication in m-health environment. Comput Electr Eng 65:265–281

    Article  Google Scholar 

  28. Rawal BS, Karne RK, Duan Q (2015) Split-system: the new frontier of cloud computing. In: 2015 IEEE 2nd international conference on cyber security and cloud computing (CSCloud). IEEE, pp 374–381

    Google Scholar 

  29. Rawal BS, Vivek SS (2017) Secure cloud storage and file sharing. In: 2017 IEEE international conference on smart cloud (SmartCloud). IEEE, pp 78–83

    Google Scholar 

  30. Vijayakumar P, Chang V, Deborah LJ, Kshatriya BSR (2018) Key management and key distribution for secure group communication in mobile and cloud network, pp 123–125

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bharat S. Rawal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, Y., Rawal, B.S., Duan, Q. (2020). Develop Ten Security Analytics Metrics for Big Data on the Cloud. In: Jain, V., Chaudhary, G., Taplamacioglu, M., Agarwal, M. (eds) Advances in Data Sciences, Security and Applications. Lecture Notes in Electrical Engineering, vol 612. Springer, Singapore. https://doi.org/10.1007/978-981-15-0372-6_36

Download citation

Publish with us

Policies and ethics