Advertisement

Develop Ten Security Analytics Metrics for Big Data on the Cloud

  • Yong Wang
  • Bharat S. RawalEmail author
  • Qiang Duan
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 612)

Abstract

This paper reviews big data security analytics and looks into the big data lifecycle for assessments of big data security challenge in clouds. The paper justifies the reasons to develop big data security metrics. In this paper, we propose ten big data security metrics securing big data on cloud. This paper contributes new knowledge to big data security by tying with right security metrics.

Keywords

Security Big data Analytics Metrics Cloud 

References

  1. 1.
    Bird J (2016) Using metrics to manage your application security program. SANSGoogle Scholar
  2. 2.
    Swetha MJ (2017) User activity monitoring and user behavior analytics for enterprise security. https://blogs.informatica.com/2017/11/150user-acyivity-monitoring-and-user-bahavior-analytics-for-enterprise-security/#fbid=w0pYBFYVzY
  3. 3.
    Salazar D (2015) Cloud security framework audit methods. The SANS InstituteGoogle Scholar
  4. 4.
    Four trends driving the need for security analytics. https://silasg.com
  5. 5.
    Oltsik J (2017) Big data security analytics, an enterprise primer. http://e.huawei.com/sg/pulications/global/ict_insights/hw331605/feature%20story/HW_326987
  6. 6.
    Sreenivasa BL, Kumar M, Shaikh MN, Sathyanarayana S, A study on encryption-decryption algorithm for big-data analytics in cloud. Int J Latest Trends Eng Technol (Special issue):323–329Google Scholar
  7. 7.
    Bi Survey (2017) Big data security analytics: a weapon against rising cyber security attacks? http://bi-survey.com/big-data-securty-analytics, 5 May 2017
  8. 8.
    Michalsky R (2014) Cyber security metrics dashboard & analytics. http://www.ehcca.com/presentations/HIPAA22/michalsky.pdf
  9. 9.
    O’Neill C (2017) Big data needs big security. Here’s why. https://www.imperva.com/blog/2017/02/big-data-needs-big-security-heres
  10. 10.
    Ingram Micro Advisor (2017) Five metrics to monitor in your big data security analytics. http://www.ingrammicroadvisor.com/data-center/five-metricsto-montor-in-your-big-data-security-analytics
  11. 11.
    Sagirogli S, Sinanc D (2013) Big data: a review. IEEEGoogle Scholar
  12. 12.
    Sullivan D (2015) Introduction to big data security analytics in the enterprise. http://searchsecurity.techtarget.com/feature/Introduction-to-big-data-security-analytics-in-the-enterprise
  13. 13.
    Sreenivasa BL, Kumar M, Shaikh MN, Sathyanarayana S (2016) A study on encryption-decryption algorithm for big-data analytics in cloud. Int J Latest Trends Eng Technol (Special issue):323–329Google Scholar
  14. 14.
    Khan N, Yaqoob I, Hashem IAT, Inayut Z, Ali WKM, Alam M, Shiraz M, Gani A (2014) Big data survey, technologies, opportunities, and challenges. Sci World J 2014Google Scholar
  15. 15.
    Bird J (2016) Using metrics to manage your application security program. https://www.sans.org/reading-room/whitepapers/analyst/metrics-manage-application-security-program-36822
  16. 16.
  17. 17.
  18. 18.
    Oltsik J (2014) Big data security analytics meets identity and access management. http://www.esg-global.com/blog-data-security-analytics-meets-identity-and-access-managemnt-iam
  19. 19.
    Lewis J (2014) How big data means big security changes: Effective identity management in a data-driven world. http://www.datacenterjournal.com/big-data-means-big-security-effective-identity-management-datadriven-world
  20. 20.
    SMARTYM (2017) How to protect big data? The main big data security challenges. https://smartym.pro/blog/how-to-protect-big-data-the-main-big-data-security-challenges/
  21. 21.
    Shimeall T (2016) Traffic analysis for network security: two approaches for going beyond network flow data. https://insights.sei.cmu.edu/sei_blog/2016/09/traffic-analysis-for-network-security-two-approaches-for-go-beyond-network-flow/data.html
  22. 22.
    Bedell C (2016) How to secure big data environments with identity management and auditing. https://www.cio.com/article/3147855/security/how-to-secure-big-data-environments-with-identity-managment-and-auding.html, 7 Dec 2016
  23. 23.
    Hamlin A, Schear N, Shen E, Varia M, Yakoubov S, Yerukhimovich A (2016) Cryptography for big data security. In: Book chapter for big data: storage, sharing, and security. https://www.crcpress.com/9781498734868CrossRefGoogle Scholar
  24. 24.
  25. 25.
    Rawal BS, Kalutarage HK, Vivek SS, Pandey K (2016) The disintegration protocol: an ultimate technique for cloud data security. In: 2016 IEEE international conference on smart cloud (SmartCloud). IEEE, pp 27–34Google Scholar
  26. 26.
    Rawal BS, Vijayakumar V, Manogaran G, Varatharajan R, Chilamkurti N (2018) Secure disintegration protocol for privacy preserving cloud storage. In: Wireless personal communications, pp 1–17CrossRefGoogle Scholar
  27. 27.
    Vijayakumar P, Ganesh SM, Deborah LJ, Rawal BS (2018) A new SmartSMS protocol for secure SMS communication in m-health environment. Comput Electr Eng 65:265–281CrossRefGoogle Scholar
  28. 28.
    Rawal BS, Karne RK, Duan Q (2015) Split-system: the new frontier of cloud computing. In: 2015 IEEE 2nd international conference on cyber security and cloud computing (CSCloud). IEEE, pp 374–381Google Scholar
  29. 29.
    Rawal BS, Vivek SS (2017) Secure cloud storage and file sharing. In: 2017 IEEE international conference on smart cloud (SmartCloud). IEEE, pp 78–83Google Scholar
  30. 30.
    Vijayakumar P, Chang V, Deborah LJ, Kshatriya BSR (2018) Key management and key distribution for secure group communication in mobile and cloud network, pp 123–125CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Department of Computer Science and MathematicsAlcorn State UniversityLormanUSA
  2. 2.Information Sciences and TechnologyThe Pennsylvania State UniversityAbingtonUSA

Personalised recommendations