© 2020

Handbook of Big Data Privacy

  • Kim-Kwang Raymond Choo
  • Ali Dehghantanha

Table of contents

  1. Front Matter
    Pages i-ix
  2. Amin Azmoodeh, Ali Dehghantanha
    Pages 1-5
  3. Jacob Sakhnini, Hadis Karimipour, Ali Dehghantanha, Reza M. Parizi
    Pages 7-36
  4. Abdulrahman Al-Abassi, Hadis Karimipour, Hamed HaddadPajouh, Ali Dehghantanha, Reza M. Parizi
    Pages 37-61
  5. Mostafa Farhdi Moghadam, Amirhossein Mohajerzdeh, Hadis Karimipour, Hamid Chitsaz, Roya Karimi, Behzad Molavi
    Pages 63-76
  6. Shamim Yousefi, Farnaz Derakhshan, Hadis Karimipour
    Pages 77-108
  7. William Peters, Ali Dehghantanha, Reza M. Parizi, Gautam Srivastava
    Pages 109-120
  8. Suby Singh, Hadis Karimipour, Hamed HaddadPajouh, Ali Dehghantanha
    Pages 121-164
  9. Mahdi Amrollahi, Shahrzad Hadayeghparast, Hadis Karimipour, Farnaz Derakhshan, Gautam Srivastava
    Pages 165-189
  10. Mridula Sharma, Haytham Elmiligi, Fayez Gebali
    Pages 191-217
  11. Hossein Mohammadi Rouzbahani, Hadis Karimipour, Abolfazl Rahimnejad, Ali Dehghantanha, Gautam Srivastava
    Pages 219-235
  12. Hossein Mohammadi Rouzbahani, Hadis Karimipour, Gautam Srivastava
    Pages 237-254
  13. Jesus Castillo Cabello, Hadis Karimipour, Amir Namavar Jahromi, Ali Dehghantanha, Reza M. Parizi
    Pages 255-283
  14. Wenyu Han, Amin Azmoodeh, Hadis Karimipour, Simon Yang
    Pages 285-303
  15. Sanaz Nakhodchi, Ali Dehghantanha, Hadis Karimipour
    Pages 305-318
  16. Mahdi Amrollahi, Ali Dehghantanha, Reza M. Parizi
    Pages 319-342
  17. Mahdis Saharkhizan, Amin Azmoodeh, Hamed HaddadPajouh, Ali Dehghantanha, Reza M. Parizi, Gautam Srivastava
    Pages 343-357
  18. Mohammad Nassiri, Hamed HaddadPajouh, Ali Dehghantanha, Hadis Karimipour, Reza M. Parizi, Gautam Srivastava
    Pages 359-370
  19. Mohammad Mehdi BehradFar, Hamed HaddadPajouh, Ali Dehghantanha, Amin Azmoodeh, Hadis Karimipour, Reza M. Parizi et al.
    Pages 371-383
  20. Amin Azmoodeh, Ali Dehghantanha, Reza M. Parizi, Sattar Hashemi, Bahram Gharabaghi, Gautam Srivastava
    Pages 385-397

About this book


This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to overcome those issues. It then focuses on big data security and privacy issues in relation to developments in the Industry 4.0. Internet of Things (IoT) devices are becoming a major source of security and privacy concern in big data platforms. Multiple solutions that leverage machine learning for addressing security and privacy issues in IoT environments are also discussed this handbook. 

The second part of this handbook is focused on privacy and security issues in different layers of big data systems. It discusses about methods for evaluating security and privacy of big data systems on network, application and physical layers. This handbook elaborates on existing methods to use data analytic and AI techniques at different layers of big data platforms to identify privacy and security attacks.  The final part of this handbook is focused on analyzing cyber threats applicable to the big data environments. It offers an in-depth review of attacks applicable to big data platforms in smart grids, smart farming, FinTech, and health sectors. Multiple solutions are presented to detect, prevent and analyze cyber-attacks and assess the impact of malicious payloads to those environments.  

This handbook provides information for security and privacy experts in most areas of big data including; FinTech, Industry 4.0, Internet of Things, Smart Grids, Smart Farming and more. Experts working in big data, privacy, security, forensics, malware analysis, machine learning and data analysts will find this handbook useful as a reference. Researchers and advanced-level computer science students focused on computer systems, Internet of Things, Smart Grid, Smart Farming, Industry 4.0 and network analysts will also find this handbook useful as a reference.


cyber threat cyber security privacy big data threat intelligence machine learning cyber forensics intrusion detection incident response cyber defense malware campaign detection indicators of compromise evidence correlation data security

Editors and affiliations

  1. 1.University of Texas at San AntonioSan AntonioUSA
  2. 2.Cyber Science Lab, School of Computer ScienceUniversity of GuelphGuelphCanada

About the editors

​Kim-Kwang Raymond Choo holds the Cloud Technology Endowed Professorship at The University of Texas at San Antonio (UTSA), San Antonio, TX, USA. In 2015 he and his team won the Digital Forensics Research Challenge organized by Germany's University of Erlangen-Nuremberg. He is the recipient of the 2019 IEEE TCSC Award for Excellence in Scalable Computing (Middle Career Researcher), 2018 UTSA College of Business Col. Jean Piccione and Lt. Col. Philip Piccione Endowed Research Award for Tenured Faculty, British Computer Society's 2019 Wilkes Award Runner-up, 2019 EURASIP JWCN Best Paper Award, Korea Information Processing Society's JIPS Survey Paper Award (Gold) 2019, IEEE Blockchain 2019 Outstanding Paper Award, Best Paper Awards from IEEE TrustCom 2018 and ESORICS 2015, Fulbright Scholarship in 2009, 2008 Australia Day Achievement Medallion, and British Computer Society's Wilkes Award in 2008. He is also a Fellow of the Australian Computer Society, an IEEE Senior Member, and Co-Chair of IEEE Multimedia Communications Technical Committee's Digital Rights Management for Multimedia Interest Group.

Ali Dehghantanha is the director of Cyber Science Lab in the University of Guelph, Ontario, Canada. His lab is focused on building AI-powered solutions to support cyber threat attribution, cyber threat hunting and digital forensics tasks in Internet of Things (IoT), Industrial IoT, and Internet of Military of Things (IoMT) environments. Ali has served for more than a decade in a variety of industrial and academic positions with leading players in cyber security and AI. Prior to joining UofG, he has served as a Sr. Lecturer in the University of Sheffield - UK. He is an EU Marie-Curie Fellow alumnus and an IEEE Sr. member. He received his Ph.D. in Security in Computing in 2011 and his M.Sc. in Security in Computing in 2008.

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking