Abstract
Big data has a growing number of confidentiality and security issues. New technology doubtlessly brings people benefits, privileges, convenience and efficiencies, with confidentiality issues. Additionally, technological advances are accompanied with threats that can pose dangerous privacy risks that can be more detrimental than expected. Privacy of data is a source of much concern to researchers throughout the globe. A question that remains unanswered is the question that “what exactly can be done” to resolve confidentially and privacy issues of big data? To answer some questions, data collected for this chapter has been through the analyze of 58 peer reviewed articles collated from 2007 to 2016 in order to find some resolutions for Big Data confidentiality issues. The articles range from different industries that include healthcare , finance , robotics, web applications , social media , and mobile communication . The selected journal articles are aimed used to make comparative analysis of security issues in different areas to cast solutions. This chapter consists of four main parts: introduction, materials and method, results, discussion and conclusion. This inquiry aimed to find different security issues of big data in various areas and gives solutions by analyzing results. The results of the content analysis suggest that the internet applications and financial institutions are dealing with specific security problems, whereas social media and other industries deal with confidentiality issues of sensitive information which have heightened privacy concerns. Both these issues are addressed in this study, as retrieved results from the data, highlights the gaps that can be further researched for development. The method used to gather data for this chapter is through the analysis of studies that deal with a particular confidentiality issue. After the analysis and evaluations, the suggestions of confidentiality issues are displayed by using a different algorithm method. This research has addressed gaps in the literature by highlighting security and privacy issues that big companies face with recent technological advancements in corporate societies. By doing this, the research could shed revolutionary light on issues of big data and provide futuristic research directions to solve them.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kim, S., Kim, N., Chung, T.: Attribute relationship evaluation methodology for big data security. In: 2013 International Conference on IT Convergence and Security (ICITCS) (2013)
Islam, M., Islam, M., Shawkat Ali, A.: An approach to security for unstructured big data. Rev. Socionetwork Strat. 10, 105–123 (2016)
Faulkner, L., Kritzstein, B., Zimmerman, J.: Security infrastructure for commercial and military ports. In: OCEANS’11 MTS/IEEE KONA (2011)
Zhang, X., Dou, W., Pei, J., Nepal, S., Yang, C., Liu, C., Chen, J.: Proximity-aware local-recoding anonymization with MapReduce for scalable big data privacy preservation in cloud. IEEE Trans. Comput. 64, 2293–2307 (2015)
Abou-Tair, D., Berlik, S., Kelter, U.: Enforcing privacy by means of an ontology driven XACML framework. In: Third International Symposium on Information Assurance and Security (2007)
Ferretti, L., Pierazzi, F., Colajanni, M., Marchetti, M.: Scalable architecture for multi-user encrypted SQL operations on cloud database services. IEEE Trans. Cloud Comput. 2, 448–458 (2014)
Chang, A., Tsai, D., Tsai, C., Lin, Y.: An improved certificate mechanism for transactions using radio frequency identification enabled mobile phone. In: 43rd Annual 2009 International Carnahan Conference on Security Technology (2009)
Huang, X., Du, X.: Achieving big data privacy via hybrid cloud. In: 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (2014)
Raghuwanshi, D., Rajagopalan, M.: MS2: practical data privacy and security framework for data at rest in cloud. In: 2014 World Congress on Computer Applications and Information Systems (WCCAIS) (2014)
Pham, D., Syed, A., Mohammad, A., Halgamuge, M.: Threat analysis of portable hack tools from USB storage devices and protection solutions. In: 2010 International Conference on Information and Emerging Technologies (2010)
Li, X., Niu, J., Kumari, S., Wu, F., Sangaiah, A.K., Choo, K.K.R.: A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J. Netw. Comput. Appl. (2017). https://doi.org/10.1016/j.jnca.2017.07.001
Hu, P., Ning, H., Qiu, T., Xu, Y., Luo, X., Sangaiah, A.K.: A unified face identification and resolution scheme using cloud computing in Internet of Things. Future Gener. Comput. Syst. (2017). https://doi.org/10.1016/j.future.2017.03.030
Xiao, X., Chen, C., Sangaiah, A.K., Hu, G., Ye, R., Jiang, Y.: CenLocShare: a centralized privacy-preserving location-sharing system for mobile online social networks. Future Gener. Comput. Syst. (2017). https://doi.org/10.1016/j.future.2017.01.035
Tan, Z., Nagar, U., He, X., Nanda, P., Liu, R., Wang, S., Hu, J.: Enhancing big data security with collaborative intrusion detection. IEEE Cloud Comput. 1, 27–33 (2014)
Mengke, Y., Xiaoguang, Z., Jianqiu, Z., Jianjian, X.: Challenges and solutions of information security issues in the age of big data. China Commun. 13, 193–202 (2016)
Syed, S., Teja, P.: Novel data storage and retrieval in cloud database by using frequent access node encryption. In: 2014 International Conference on Contemporary Computing and Informatics (IC3I) (2014)
Feng, X., Onafeso, B., Liu, E.: Investigating big data healthcare security issues with Raspberry Pi. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (2015)
Hussain, F.: Internet of Things. Springer International Publishing (2017)
Johnson, S.: The Internet Changes Everything: In: Revolutionizing Public Participation and Access to Government Information through the Internet. http://www.jstor.org/stable/40709905
Kopetz, H.: Real-Time Systems. Springer, New York (2011)
Valentinova, B.: The 5 Methodology Milestones for Big Data. https://icrunchdata.com/blog/480/the-5-methodology-milestones-for-big-data/
Zeng, G.: Research on privacy protection in big data environment. Int. J. Eng. Res. Appl. 46–50 (2015)
Kizza, J.: Guide to Computer Network Security. Springer International Publishing, Cham (2017)
Kuhn, D., Walsh, T., Fries, S.: Security considerations for voice over IP systems. In: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Gaithersburg, MD (2005)
Lee, W., Stolfo, S., Chan, P., Eskin, E., Fan, W., Miller, M., Hershkop, S., Zhang, J.: Real time data mining-based intrusion detection. In: Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX’01, vol. 1, pp. 89–100
Stouffer, K., Falco, J., Scarfone, K.: Guide to Industrial Control Systems (ICS) security. National Institute of Standards & Technology, Gaithersburg (2011)
Montlick, T.: Method and apparatus for wireless remote information retrieval and pen-based data entry (2017)
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28, 583–592 (2012)
Vashist, R.: Big Data in Complex Systems. Springer International Publishing AG, Cham (2015)
Goel, S., Hong, Y.: Security Challenges in Smart Grid Implementation. In: SpringerBriefs in Cybersecurity, pp. 1–39 (2015)
Kaur, K., Dhindsa, K., Singh, G.: Numeric To numeric encryption of databases: using 3Kdec Algorithm. In: 2009 IEEE International Advance Computing Conference, pp. 1501–1505 (2009)
Li, P., Guo, S.: Load balancing for privacy-preserving access to big data in cloud. In: 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (2014)
Motiwalla, L., Xiaobai, L.: Value added privacy services for healthcare data. In: 2010 6th World Congress on Services, pp. 64–71 (2010)
Avireddy, S., Perumal, V., Gowraj, N., Kannan, R., Thinakaran, P., Ganapthi, S., Gunasekaran, J., Prabhu, S.: Random4: An Application Specific Randomized Encryption Algorithm to Prevent SQL Injection, pp. 1327–1333 (2012)
Nair, K., Helberg, A., Van der Merwe, J.: An Approach to Improve the Match-on-Card Fingerprint Authentication System Security. http://hdl.handle.net/10204/8879 (2016)
Moura, J., Serrão, C.: Security and privacy issues of big data. In: Handbook of Research on Trends and Future Directions in Big Data and Web Intelligence, pp. 20–52 (2016)
Swarna, S., Maryam, S.: Increasing security level in data sharing using ring signature in cloud environment. J. Eng. Res. Appl. 01–06 (2016)
Charishma, P., Venkatesh, K.: Big data security analytic solution using Splunk. Int. J. Eng. Res. Appl. (IJERA) (2015)
Chandankere, R., Begum, M.: Secure data sharing in an untrusted cloud. Int. J. Eng. Res. Appl. 5, 49–54 (2015)
Inuwa, U.: The risk and challenges of cloud computing. Int. J. Eng. Res. Appl. 5, 5–10 (2015)
Kaur, K., Pathak, A., Kaur, P., Kaur, K.: E-Commerce privacy and security system. Int. J. Eng. Res. Appl. 5, 63–73 (2017)
Jyothirmai, M., Ashwitha, M.: A survey of information security in healthcare sector. Int. J. Eng. Res. Appl. (IJERA) (2015)
Raji, F., Miri, A., Davarpanah Jazi, M.: Preserving privacy in online social networks. In: Foundations and Practice of Security, pp. 1–13 (2012)
Kepner, J., Gadepally, V., Michaleas, P., Schear, N., Varia, M., Yerukhimovich, A., Cunningham, R.: Computing on masked data: a high performance method for improving big data veracity. In: 2014 IEEE High Performance Extreme Computing Conference (HPEC) (2014)
Wagh, K., Jathar, R.: Securing data transfer in cloud environment. Int. J. Eng. Res. Appl. 4, 91–93 (2014)
Merkel: Privacy. https://www.merkleinc.com/privacy
Hsu, C., Zeng, B., Zhang, M.: A novel group key transfer for big data security. Appl. Math. Comput. 249, 436–443 (2014)
Pace, A.: Technologies for large data management in scientific computing. Int. J. Mod. Phys. C 25, 1430001 (2014)
Bertine, H., Faynberg, I., Lu, H.: Overview of data and telecommunications security standardization efforts in ISO, IEC, ITU, and IETF. Bell Labs Tech. J. 8, 203–229 (2004)
Mehak, G.: improving data storage security in cloud using Hadoop. Int. J. Eng. Res. Appl. 4, 133–138 (2014)
Mirarab, A., Kenari, A.: A new framework for secure M-Commerce. Int. J. Eng. Res. Appl. 4, 163–167 (2014)
Raghuwanshi, S., Nigoti, R.: Modified active monitoring ant clustering based load balancing over public clouds. Int. J. Comput. Appl. 167 (2017)
Abawajy, J., Kelarev, A., Chowdhury, M.: Large iterative multitier ensemble classifiers for security of big data. IEEE Trans. Emerg. Top. Comput. 2, 352–363 (2014)
Tankard, C.: Big data security. Netw. Secur. 2012, 5–8 (2012)
Kaplan, B.: How should health data be used? Camb. Q. Healthc. Ethics 25, 312–329 (2016)
Suji Pramila, R., Shajin Nargunam, A., Affairs, A.: A study on data confidentiality in early detection of Alzheimer’s disease. In: 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET) (2012)
Eler, A.: A Look Into 3 Social Video Apps: Socialcam, Viddy & Klip—ReadWrite. https://readwrite.com/2012/05/02/a-look-into-3-social-video-apps-socialcam-viddy-klip/ (2012)
Wang, Y.: Image enlargement engine based on one-dimensional data interpolation algorithm. J. Jilin Univ. (Inf. Sci. Ed.) 4, (2010)
Skinner, G., Chang, E., McMahon, M., Aisbett, J., Miller, M.: Shield privacy Hippocratic security method for virtual community. In: 30th Annual Conference of IEEE Industrial Electronics Society, 2004. IECON (2004)
Dimitropoulos, L., Rizk, S.: A state-based approach to privacy and security for interoperable health information exchange. Health Aff. 28, 428–434 (2009)
Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data—SIGMOD ’00 (2000)
Acknowledgements
The authors acknowledge the data collection support provided by Mariia Talalaeva.
Author information
Authors and Affiliations
Contributions
Manbir Singh and Malka N. Halgamuge conceived the study idea and developed the analysis plan. Manbir Singh analyzed the data and wrote the initial chapter. Malka N. Halgamuge helped to prepare the figures and tables, and finalizing the manuscript. All authors read the manuscript.
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this chapter
Cite this chapter
Singh, M., Halgamuge, M.N., Ekici, G., Jayasekara, C.S. (2018). A Review on Security and Privacy Challenges of Big Data. In: Sangaiah, A., Thangavelu, A., Meenakshi Sundaram, V. (eds) Cognitive Computing for Big Data Systems Over IoT. Lecture Notes on Data Engineering and Communications Technologies, vol 14 . Springer, Cham. https://doi.org/10.1007/978-3-319-70688-7_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-70688-7_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-70687-0
Online ISBN: 978-3-319-70688-7
eBook Packages: EngineeringEngineering (R0)