Advertisement

Big Data Security and Privacy Concerns: A Review

  • Akbar KhananEmail author
  • Salwani Abdullah
  • Abdul Hakim H. M. Mohamed
  • Amjad Mehmood
  • Khairul Akram Zainol Ariffin
Conference paper
Part of the Advances in Science, Technology & Innovation book series (ASTI)

Abstract

The past few decades have recorded increases in the development of new technologies. These technologies, such as the smart phone, computers, and social network sensors, have resulted in the production of a large amount unstructured data from different formats ranging from Tera Bytes (TB) to Peta Bytes (PB). This huge and differently formatted data is known as big data. Big data has a great potential for both the public and private sector. The utilisation of big data can have a positive impact. Different tools and techniques such as analytics and data mining are being used to make the data useful. However, big data is beset by security and privacy issues. Researcher from different domain are trying to overcome the issues in the big data, this paper will focus on the applications and major security, and privacy issues of big data.

Keywords

Big data Data analytics Privacy Security 

Notes

Acknowledgements

This work was supported by the Universiti Kebangsaan Malaysia (DIP-2016-024).

References

  1. 1.
    Chang, F., Dean, J., Ghemawat, S., Hsieh, W.C., Wallach, D.A., Burrows, M., Chandra, T., Fikes, A., Gruber, R.E.: Bigtable: a distributed storage system for structured data. Google Inc. In: Proceeding of the OSDI, 6 (2006)Google Scholar
  2. 2.
    Mehmood, A., Khanan, A., Umar, M.M., Abdullah, S., Ariffin, K.A.Z., Song, H.: Secure knowledge and cluster-based intrusion detection mechanism for smart wireless sensor networks. IEEE Access 6, 5688–5694 (2018).  https://doi.org/10.1109/ACCESS.2017.2770020CrossRefGoogle Scholar
  3. 3.
    Boyd, D., Crawford, K.: Critical questions for big data. Inf. Commun. Soc. 15, 662–679 (2012)CrossRefGoogle Scholar
  4. 4.
    Elragal, N., Elragal, A.: Big data analytics: a literature review paper. In: Lecture Notes in Computer Science (2014)Google Scholar
  5. 5.
    Duan, L., Xiong, Y.: Big data analytics and business analytics. J. Manag. Anal. 2 (2015)CrossRefGoogle Scholar
  6. 6.
    Kshetri, N.: The emerging role of big data in key development issues: opportunities, challenges, and concerns. Big Data Soc. 1 (2014)CrossRefGoogle Scholar
  7. 7.
    Abawajy, J.: Comprehensive analysis of big data variety landscape. Int. J. Parallel Emergent Distrib. Syst. 30, 5–14 (2015)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Kuo, M.-H., Sahama, T., Kushniruk, A.W., Borycki, E.M., Grunwell, D.K.: Health big data analytics: current perspectives, challenges, and potential solutions. Int. J. Big Data Intell. 1, 114–126 (2014)CrossRefGoogle Scholar
  9. 9.
    Cardenas, A.A., Manadhata, P.K., Rajan, S.P.: Big data analytics for security. IEEE Secur. Priv. 11(6), 74–76 (2013)CrossRefGoogle Scholar
  10. 10.
    Li, Y., Gai, K., Qiu, L., Qiu, M., Zhao, H.: Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf. Sci. 387, 103–115 (2017)CrossRefGoogle Scholar
  11. 11.
    Xu, L., Jiang, C., Wang, J., Yuan, J., Ren, Y.: Information security in big data: privacy and data mining. IEEE Access 2, 1149–1176 (2014)CrossRefGoogle Scholar
  12. 12.
    Kaisler, S., Armour, F., Espinosa, J.A., Money, W.: Big data: issues and challenges moving forward. In: System Sciences (HICSS), 46th Hawaii International Conference, IEEE, pp. 995–1004 (2013)Google Scholar
  13. 13.
    Wolfert, S., Ge, L., Verdouw, C., Bogaardt, M.J.: Big data in smart farming–a review. Agric. Syst. 153, 69–80 (2017)CrossRefGoogle Scholar
  14. 14.
    Lukoianova, T., Rubin, V.L.: Veracity roadmap: is big data objective, truthful, and credible? 12 (2014)Google Scholar
  15. 15.
    Chen, M., Mao, S., Liu, Y.: Big data: a survey. Mob. Netw. Appl. 19, 171–209 (2014)CrossRefGoogle Scholar
  16. 16.
    Herland, M., Khoshgoftaar, T.M., Wald, R.: A review of data mining using big data in health informatics. J. Big Data 1, 2 (2014).  https://doi.org/10.1186/2196-1115-1-2CrossRefGoogle Scholar
  17. 17.
    Plachkinova, M., Vo, A., Bhaskar, R., Hilton, B.: A conceptual framework for quality healthcare accessibility: a scalable approach for big data technologies. Inf. Syst. Front. 1–14 (2016)Google Scholar
  18. 18.
    Mehmood, A., Khanan, A., Mohamed, A.H.H.M., Mahfooz, S., Song, H., Abdullah, S.: ANTSC: an intelligent Naïve Bayesian probabilistic estimation practice for traffic flow to form stable clustering in VANET. IEEE Access 6, 4452–4461 (2018).  https://doi.org/10.1109/ACCESS.2017.2732727CrossRefGoogle Scholar
  19. 19.
    Fay Chang, J., Ghemawat, S., Wilson, C., Hsieh, D.A., Wallach, M., Burrows, T., Fikes, A., Grube, R.E.: Bigtable: A Distributed Storage System for Structured Data. Google Inc (2006)Google Scholar
  20. 20.
    Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A., Khan, S.U.: The rise of ‘big data’ on cloud computing: review and open research issues. Inf. Syst. 47, 98–115 (2015)CrossRefGoogle Scholar
  21. 21.
    Herland, M., Khoshgoftaar, T.M., Wald, R.: A review of data mining using big data in health informatics. J. Big Data 1, 2 (2014).  https://doi.org/10.1186/2196-1115-1-2CrossRefGoogle Scholar
  22. 22.
    Kim, G.-H., Trimi, S., Chung, J.-H.: Big-data applications in the government sector. Commun. ACM 57, 78–85 (2014)CrossRefGoogle Scholar
  23. 23.
    Manogaran, G., Thota, C., Lopez, D., Sundarasekar, R.: Big data security intelligence for healthcare industry 4.0. In: Cybersecurity for Industry 4.0, pp. 103–126. Springer, Cham (2017)Google Scholar
  24. 24.
    Bagloee, S.A., Tavana, M., Asadi, M., Oliver, T.: Autonomous vehicles: challenges, opportunities, and future implications for transportation policies. J. Mod. Transp. 24, 284–303 (2016)CrossRefGoogle Scholar
  25. 25.
    Gupta, A.: Review on big data promises for information security. J. Data Min. Manag. 1 (2016)Google Scholar
  26. 26.
    Poczter, S.L., Jankovic, L.M.: The Google car: driving toward a better future? J. Bus. Case Stud. (Online) 10, 7 (2014)Google Scholar
  27. 27.
    Thota, C., Manogaran, G., Lopez, D., Vijayakumar, V.: Big data security framework for distributed cloud data centers. In: Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, pp. 589–607, IGI Global (2018)Google Scholar
  28. 28.
    Moura, J., Serrao, C.: Security and privacy issues of big data. arXiv preprint arXiv:1601.06206 (2016)
  29. 29.
    Eiman Al Nuaimi, H.A.N., Mohamed, N., Al-Jaroodi, J.: Applications of big data to smart cities. J. Internet Serv. Appl. (2005)Google Scholar
  30. 30.
    Chaulagain, R.S., Pandey, S., Basnet, S.R., Shakya, S.: Cloud based web scraping for big data applications. In: 2017 IEEE International Conference on Smart Cloud (SmartCloud), New York, NY, pp. 138–143 (2017)  https://doi.org/10.1109/smartcloud.2017.28
  31. 31.
    Demchenko, Y., Zhao, Z., Grosso, P., Wibisono, A., Laat, C.D.: Addressing big data challenges for scientific data infrastructure. In: Cloud Computing Technology and Science (CloudCom), IEEE 4th International Conference on 3–6 Dec 2012, pp. 614–617 (2012)Google Scholar
  32. 32.
    Sneha Gupta, M.S.C.: Big data issues and challenges. Recent Innov. Trends Comput. Commun. 3 (2015)Google Scholar
  33. 33.
    Katal, A., Wazid, M., Goudar, R.H.: Big data: issues, challenges, tools, and good practices. In: Contemporary Computing (IC3), 2013 Sixth International Conference, 8–10 Aug 2013, pp. 404–409 (2013)Google Scholar
  34. 34.
    Liu, Y.: Research on the application of big data in academic libraries. In: 2018 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS), Xiamen, pp. 364–367 (2018)  https://doi.org/10.1109/icitbs.2018.00099
  35. 35.
    Stahl, B.C., Wright, D.: Ethics and privacy in AI and big data: implementing responsible research and innovation. IEEE Secur. Priv. 16(3), 26–33 (May/June 2018).  https://doi.org/10.1109/msp.2018.2701164CrossRefGoogle Scholar
  36. 36.
    Gupta, A.: Analysis of real-time big data: its applications and challenges. J. Data Min. Manag. 1 (2016)Google Scholar
  37. 37.
    Kaur, P., Monga, A.A.: Big data management. Adv. Found. Res. Sci. Eng., 1 (2015)Google Scholar
  38. 38.
    Alvaro, A., Cardenas, P.K.M., Sreeranga, P., Rajan: Big data analytics for security. IEEE Comput. Reliab. Soc. (2013)Google Scholar
  39. 39.
    Khan, N., Yaqoob, I., Hashem, I.A.T., Inayat, Z., Mahmoud A.W.K., Alam, M., Shiraz, M., Gani, A.: Big data: survey, technologies, opportunities, and challenges. Sci. World J. (2014)Google Scholar
  40. 40.
    Stahl, B.C., Wright, D.: Ethics and privacy in AI and big data: implementing responsible research and innovation. IEEE Secur. Priv. 16(3), 26–33 (May/June 2018).  https://doi.org/10.1109/msp.2018.2701164CrossRefGoogle Scholar
  41. 41.
    Jasim, A.C., Tapus, N., Hassoon, I.A.: Access control by signature-keys to provide privacy for cloud and big data. In: 5th International Conference on Control, Decision and Information Technologies (CoDIT), Thessaloniki, Greece, pp. 978–983 (2018)  https://doi.org/10.1109/codit.2018.8394916
  42. 42.
    Cai, L., Zhu, Y.: The challenges of data quality and data quality assessment in the big data era. Data Sci. J. 14, 2 (2015)CrossRefGoogle Scholar
  43. 43.
    Zaki, T., Uddin, M.S., Hasan, M.M., Islam, M.N.: Security threats for big data: a study on Enron e-mail dataset. In: International Conference on Research and Innovation in Information Systems (ICRIIS), pp. 1–6. (2017)Google Scholar
  44. 44.
    Chin, W.L., Li, W., Chen, H.H.: Energy big data security threats in IoT-based smart grid communications. In: IEEE Communications Magazine, vol. 55, pp. 70–75, Available: ISSN: 0163-6804 (Oct 2017)Google Scholar
  45. 45.
    Chandra, S., Ray, S., Goswami, R.T.: Big data security in healthcare: survey on frameworks and algorithms. In: IEEE 7th International Advance Computing Conference (IACC), pp. 89–94 (2017)Google Scholar
  46. 46.
    Chin, W.L., Li, W., Chen, H.H.: Energy big data security threats in IoT-based smart grid communications. In: IEEE Communications Magazine, vol. 55, pp. 70–75, Available: ISSN: 0163-6804 (Oct 2017)Google Scholar
  47. 47.
    Surbiryala, J.: Ph.D. Forum: improving the security for storing the big data in cloud environment. In: IEEE International Conference on Smart Computing (SMARTCOMP), pp. 1–2 (2017)Google Scholar
  48. 48.
    Salleh, K.A., Janczewski, L.: Technological, organizational, and environmental security and privacy issues of big data: a literature review. Procedia Comput. Sci. 100, 19–28 (2016)CrossRefGoogle Scholar
  49. 49.
    Zaki, T., Uddin, M.S., Hasan, M.M., Islam, M.N.: Security threats for big data: a study on Enron e-mail dataset. In: International Conference on Research and Innovation in Information Systems (ICRIIS), pp. 1–6 (2017)Google Scholar
  50. 50.
    Sivarajah, U., Kamal, M.M., Irani, Z., Weerakkody, V.: Critical analysis of big data challenges and analytical methods. J. Bus. Res. (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Centre for Artificial Intelligence TechnologyUniversiti Kebangsaan Malaysia (UKM)BangiMalaysia
  2. 2.Department of Management Information SystemA’Sharqiyah UniversityIbraSultanate of Oman
  3. 3.Institute of Information TechnologyKohat University of Science & TechnologyKohatPakistan
  4. 4.Research Centre for Software and ManagementUniversiti Kebangsaan Malaysia (UKM)BangiMalaysia

Personalised recommendations