Abstract
This paper reviews big data security analytics and looks into the big data lifecycle for assessments of big data security challenge in clouds. The paper justifies the reasons to develop big data security metrics. In this paper, we propose ten big data security metrics securing big data on cloud. This paper contributes new knowledge to big data security by tying with right security metrics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bird J (2016) Using metrics to manage your application security program. SANS
Swetha MJ (2017) User activity monitoring and user behavior analytics for enterprise security. https://blogs.informatica.com/2017/11/150user-acyivity-monitoring-and-user-bahavior-analytics-for-enterprise-security/#fbid=w0pYBFYVzY
Salazar D (2015) Cloud security framework audit methods. The SANS Institute
Four trends driving the need for security analytics. https://silasg.com
Oltsik J (2017) Big data security analytics, an enterprise primer. http://e.huawei.com/sg/pulications/global/ict_insights/hw331605/feature%20story/HW_326987
Sreenivasa BL, Kumar M, Shaikh MN, Sathyanarayana S, A study on encryption-decryption algorithm for big-data analytics in cloud. Int J Latest Trends Eng Technol (Special issue):323–329
Bi Survey (2017) Big data security analytics: a weapon against rising cyber security attacks? http://bi-survey.com/big-data-securty-analytics, 5 May 2017
Michalsky R (2014) Cyber security metrics dashboard & analytics. http://www.ehcca.com/presentations/HIPAA22/michalsky.pdf
O’Neill C (2017) Big data needs big security. Here’s why. https://www.imperva.com/blog/2017/02/big-data-needs-big-security-heres
Ingram Micro Advisor (2017) Five metrics to monitor in your big data security analytics. http://www.ingrammicroadvisor.com/data-center/five-metricsto-montor-in-your-big-data-security-analytics
Sagirogli S, Sinanc D (2013) Big data: a review. IEEE
Sullivan D (2015) Introduction to big data security analytics in the enterprise. http://searchsecurity.techtarget.com/feature/Introduction-to-big-data-security-analytics-in-the-enterprise
Sreenivasa BL, Kumar M, Shaikh MN, Sathyanarayana S (2016) A study on encryption-decryption algorithm for big-data analytics in cloud. Int J Latest Trends Eng Technol (Special issue):323–329
Khan N, Yaqoob I, Hashem IAT, Inayut Z, Ali WKM, Alam M, Shiraz M, Gani A (2014) Big data survey, technologies, opportunities, and challenges. Sci World J 2014
Bird J (2016) Using metrics to manage your application security program. https://www.sans.org/reading-room/whitepapers/analyst/metrics-manage-application-security-program-36822
Contos B, Big data security context. https://www.csoonline.com/article/2143842/data-protection/big-data-security-context.html
Oltsik J (2012) Security intelligence: a key component of big data security analytics. http://resources.idgenterprise.com/original/AST-0085582_ESG-SecurityIntelligence-AKeyComponentofBigDataSecurityAnalytics_daiNA_cta68569.pdf
Oltsik J (2014) Big data security analytics meets identity and access management. http://www.esg-global.com/blog-data-security-analytics-meets-identity-and-access-managemnt-iam
Lewis J (2014) How big data means big security changes: Effective identity management in a data-driven world. http://www.datacenterjournal.com/big-data-means-big-security-effective-identity-management-datadriven-world
SMARTYM (2017) How to protect big data? The main big data security challenges. https://smartym.pro/blog/how-to-protect-big-data-the-main-big-data-security-challenges/
Shimeall T (2016) Traffic analysis for network security: two approaches for going beyond network flow data. https://insights.sei.cmu.edu/sei_blog/2016/09/traffic-analysis-for-network-security-two-approaches-for-go-beyond-network-flow/data.html
Bedell C (2016) How to secure big data environments with identity management and auditing. https://www.cio.com/article/3147855/security/how-to-secure-big-data-environments-with-identity-managment-and-auding.html, 7 Dec 2016
Hamlin A, Schear N, Shen E, Varia M, Yakoubov S, Yerukhimovich A (2016) Cryptography for big data security. In: Book chapter for big data: storage, sharing, and security. https://www.crcpress.com/9781498734868
Marr B (2017) The 7 best data visualization tools. https://www.forbes.com/sites/bernarsdmarr/2017/20/the-t-best-data-visulaization-tool-in-2017/#5a54bb716c30
Rawal BS, Kalutarage HK, Vivek SS, Pandey K (2016) The disintegration protocol: an ultimate technique for cloud data security. In: 2016 IEEE international conference on smart cloud (SmartCloud). IEEE, pp 27–34
Rawal BS, Vijayakumar V, Manogaran G, Varatharajan R, Chilamkurti N (2018) Secure disintegration protocol for privacy preserving cloud storage. In: Wireless personal communications, pp 1–17
Vijayakumar P, Ganesh SM, Deborah LJ, Rawal BS (2018) A new SmartSMS protocol for secure SMS communication in m-health environment. Comput Electr Eng 65:265–281
Rawal BS, Karne RK, Duan Q (2015) Split-system: the new frontier of cloud computing. In: 2015 IEEE 2nd international conference on cyber security and cloud computing (CSCloud). IEEE, pp 374–381
Rawal BS, Vivek SS (2017) Secure cloud storage and file sharing. In: 2017 IEEE international conference on smart cloud (SmartCloud). IEEE, pp 78–83
Vijayakumar P, Chang V, Deborah LJ, Kshatriya BSR (2018) Key management and key distribution for secure group communication in mobile and cloud network, pp 123–125
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wang, Y., Rawal, B.S., Duan, Q. (2020). Develop Ten Security Analytics Metrics for Big Data on the Cloud. In: Jain, V., Chaudhary, G., Taplamacioglu, M., Agarwal, M. (eds) Advances in Data Sciences, Security and Applications. Lecture Notes in Electrical Engineering, vol 612. Springer, Singapore. https://doi.org/10.1007/978-981-15-0372-6_36
Download citation
DOI: https://doi.org/10.1007/978-981-15-0372-6_36
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0371-9
Online ISBN: 978-981-15-0372-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)