Survey on Sensitive Data Handling—Challenges and Solutions in Cloud Storage System

  • M. Sumathi
  • S. Sangeetha
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 750)


Big data encompasses massive volume of digital data received from enormously used digital devices, social networks and real-time data sources. Due to its characteristics data storage, transfer, analysis and providing security to confidential data become a challenging task. The key objective of this survey is to investigate these challenges and possible solutions on sensitive data handling process is analysed. First, the characteristics of big data are described. Next, de-duplication, load balancing and security issues in data storage are reviewed. Third, different data transfer methods with secure transmission are analysed. Finally, different kind of sensitive data identification methods with its pros and cons in security point of view is analysed. This survey concludes with a summary of sensitive data protection issues with possible solutions and future research directions.


Big data storage Transmission Security and privacy issues Sensitive data 


  1. 1.
    Florissi, P.: EMC and Big Data.
  2. 2.
    Minelli, M., Chambers, M., Dhiraj, A.: Text book on Big Data, Data AnalyticsGoogle Scholar
  3. 3.
    Ishwarappa, Anuradha, J.: A brief introduction of big data 5 V’s characteristics and hadoop technology. In: International Conference on Intelligent Computing, Communication and Convergence, ICCC-2015, pp. 319–324Google Scholar
  4. 4.
    Alnafoosi, A.B., Steinbach, T.: An integrated framework for evaluating big-data storage solutions-IDA case study. In: Science and Information Conference (2013)Google Scholar
  5. 5.
    Zhang, X., Xu, F.: Survey of research on big data storage. IEEE, pp. 76–80 (2013)Google Scholar
  6. 6.
    Li, J., Chen, X., Xhafa, F., Barolli, L.: Secure deduplication storage systems supporting keyword search. J. Comput. Syst. Sci. (Elsevier)Google Scholar
  7. 7.
    Wang, Z., Chen, H., Ying, F., Lin, D., Ban, Y.: Workload balancing and adaptive resource management for the swift storage system on cloud. Future Gener. Comput. Syst. 51, 120–131 (2015)CrossRefGoogle Scholar
  8. 8.
    Basu, A., Sengupta, I., Sing, J.: Cryptosystem for secret sharing scheme with hierarchical groups. Int. J. Netw. Secur. 15(6), 455–464 (2013)Google Scholar
  9. 9.
    Dorairaj, S.D., Kaliannan, T.: An adaptive multilevel security framework for the data stored in cloud environment. Sci. World J. 2015 (Hindawi publishing corporation)Google Scholar
  10. 10.
    Tanwar, S., Prema, K.V.: Role of public key infrastructure in big data security. CSI Communication (2014)Google Scholar
  11. 11.
    Kaur, K., Zandu, V.: A data classification model for achieving data confidentiality in cloud computing. Int. J. Mod. Comput. Sci. 4(4) (2016)Google Scholar
  12. 12.
    Torra, V.: Towards knowledge intensive privacy. In: Proceeding of the 5th International Workshop on Data Privacy Management, pp. 1–7. Springer-VerlagGoogle Scholar
  13. 13.
    Perez-Lainez, R.C, Pablo-Sanchez, Iglesias, A.: Anonimytext: Anonymization of unstructured documents. Scitepress Digital Library, pp. 284–287 (2008)Google Scholar
  14. 14.
    Sanchez, D., Betat, M.: Toward sensitive document release with privacy guarantees. Eng. Appl. Artif. Intell. 59, 23–34 (2017)CrossRefGoogle Scholar
  15. 15.
    Domingo-Ferrer, J., Sanchez, D., Soria-Comas, J.: Database anonymization: privacy models, data utility, and micro-aggregation based inter-model connections. Morgan & Clayton, San Rafael, California USA (2016)Google Scholar
  16. 16.
    Yildirim, E., Arslan, E., Kim, J., Kosar, T.: Application level optimization of big data transfers through pipelining, parallelism and concurrency. IEEE Trans. Cloud Comput. 4(1), 63–75 (2016)CrossRefGoogle Scholar
  17. 17.
    Tudoran, R., Costan, A., Antoniu, G.: Overflow: multi-site aware big data management for scientific workflows on cloud. IEEE Trans. Cloud Comput. Vol. x, No. x (2014)Google Scholar
  18. 18.
    Li, F., Zheng, Z., Jin, C.: Secure and Efficient Data Transmission in the Internet of Things, vol. 62, pp. 111–122. Springer (2015)Google Scholar
  19. 19.
    Baritha Begam, M., Venkataramani, Y.: A new compression scheme for secure transmission. Int. J. Autom. Comput. 10(6), 579–586 (2013)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of Computer ApplicationsNational Institute of TechnologyTiruchirappalliIndia

Personalised recommendations