Editors:
- Offers a comprehensive coverage of the main topic, ranging from big data analytics to protection
- Provides an up-to-date source on computing/network security and resilience contributed by international well-known subject experts
- Shows how state-of-the-art technologies like deep learning and blockchain can dramatically change the security landscape in the big data era
Part of the book series: Advanced Sciences and Technologies for Security Applications (ASTSA)
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (11 chapters)
-
Front Matter
-
Back Matter
About this book
This book addresses the key security challenges in the big data centric computing and network systems, and discusses how to tackle them using a mix of conventional and state-of-the-art techniques. The incentive for joining big data and advanced analytics is no longer in doubt for businesses and ordinary users alike. Technology giants like Google, Microsoft, Amazon, Facebook, Apple, and companies like Uber, Airbnb, NVIDIA, Expedia, and so forth are continuing to explore new ways to collect and analyze big data to provide their customers with interactive services and new experiences. With any discussion of big data, security is not, however, far behind. Large scale data breaches and privacy leaks at governmental and financial institutions, social platforms, power grids, and so forth, are on the rise that cost billions of dollars.
The book explains how the security needs and implementations are inherently different at different stages of the big data centric system, namely at the point of big data sensing and collection, delivery over existing networks, and analytics at the data centers. Thus, the book sheds light on how conventional security provisioning techniques like authentication and encryption need to scale well with all the stages of the big data centric system to effectively combat security threats and vulnerabilities. The book also uncovers the state-of-the-art technologies like deep learning and blockchain which can dramatically change the security landscape in the big data era.
Keywords
- Big Data Analytics and Security
- Cloud Computing Resiliency
- Internet of Things Security
- Blockchain Based Security and Privacy
- Artificial Intelligence Techniques
- Deep Learning for Security
- Intelligent Intrusion Detection and Prevention Methods
- Heterogeneous Networks
- Cyber Physical System
- Information Fusion
- Early Warning Systems
- Sensor Networks
Editors and Affiliations
-
ATAC, Lakehead University, Thunder Bay, Canada
Zubair Md. Fadlullah
-
Department of Computer Science and Engineering Independent University, Bangladesh (IUB), Dhaka, Bangladesh
Al-Sakib Khan Pathan
About the editors
Al-Sakib Khan Pathan received PhD degree in Computer Engineering in 2009 from Kyung Hee University, South Korea and B.Sc. degree in Computer Science and Information Technology from Islamic University of Technology (IUT), Bangladesh in 2003. He is currently an Associate Professor at the Computer Science and Engineering (CSE) department, Southeast University (SEU), Bangladesh. He is also holding the position of Additional Director of the Internal Quality Assurance Cell (IQAC) at SEU. He is a Guest Lecturer for the STEP project at the Department of Technical and Vocational Education, Islamic University of Technology, Bangladesh since April 2018. Previously, he was with the Computer Science department at IIUM, Malaysia during 2010-2015 and with the CSE department at BRAC University, Bangladesh during 2009-2010. He also worked as a Researcher at Networking Lab, Kyung Hee University, South Korea from September 2005 to August 2009where he completed his MS leading to PhD. His research interests include wireless sensor networks, network security, cloud computing, and e-services technologies. Currently he is also working on some multidisciplinary issues. He is a recipient of several awards/best paper awards and has several notable publications in these areas. He has served as a Chair and Committee Member in numerous international conferences/workshops including the top-tier and prestigious events like INFOCOM, GLOBECOM, ICC, LCN, GreenCom, AINA, WCNC, HPCS, ICA3PP, IWCMC, VTC, HPCC, SGIoT, etc. He was awarded the IEEE Outstanding Leadership Award for his role in IEEE GreenCom’13 conference. He is currently serving as the Series Editor of ICT Book series by CRC Press, Taylor & Francis, Editor-in-Chief of International Journal of Computers and Applications, Taylor & Francis, Associate Technical Editor of IEEE Communications Magazine, Editor of Ad Hoc and Sensor Wireless Networks, Old City Publishing, InternationalJournal of Sensor Networks, Inderscience Publishers, and The International Arab Journal of Information Technology (IAJIT), Associate Editor of International Journal of Computational Science and Engineering, Inderscience, Area Editor of International Journal of Communication Networks and Information Security, Guest Editor of many special issues of top-ranked journals, and Editor/Author of 16 published books. One of his books has been included twice in the Intel Corporation’s Recommended Reading List for Developers, 2nd half 2013 and 1st half of 2014; 3 books were included in IEEE Communications Society’s (IEEE ComSoc) Best Readings in Communications and Information Systems Security, 2013, 2 other books were indexed with all the titles (chapters) in Elsevier’s acclaimed abstract and citation database, Scopus, in February 2015 and a seventh book is translated to simplified Chinese language from English version. Also, 2 of his journal papers and 1 conference paper were included under different categories in IEEE Communications Society's (IEEE ComSoc) Best Readings Topics on Communications and Information Systems Security, 2013. He also serves as a referee of many prestigious journals. He received some awards for his reviewing activities like: one of the most active reviewers of IAJIT for several years since 2012; Elsevier Outstanding Reviewer for Computer Networks, FGCS, and JNCA in multiple years. He is a Senior Member of the Institute of Electrical and Electronics Engineers (IEEE), USA.
Bibliographic Information
Book Title: Combating Security Challenges in the Age of Big Data
Book Subtitle: Powered by State-of-the-Art Artificial Intelligence Techniques
Editors: Zubair Md. Fadlullah, Al-Sakib Khan Pathan
Series Title: Advanced Sciences and Technologies for Security Applications
DOI: https://doi.org/10.1007/978-3-030-35642-2
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Nature Switzerland AG 2020
Hardcover ISBN: 978-3-030-35641-5Published: 27 May 2020
Softcover ISBN: 978-3-030-35644-6Published: 28 May 2021
eBook ISBN: 978-3-030-35642-2Published: 26 May 2020
Series ISSN: 1613-5113
Series E-ISSN: 2363-9466
Edition Number: 1
Number of Pages: XVI, 266
Number of Illustrations: 41 b/w illustrations, 83 illustrations in colour
Topics: Security, Big Data, Artificial Intelligence, Security Science and Technology, Communications Engineering, Networks
Industry Sectors: Aerospace, Automotive, Biotechnology, Electronics, Engineering, Finance, Business & Banking, IT & Software, Law, Pharma, Telecommunications