Skip to main content

A Review on Security and Privacy Challenges of Big Data

  • Chapter
  • First Online:
Cognitive Computing for Big Data Systems Over IoT

Abstract

Big data has a growing number of confidentiality and security issues. New technology doubtlessly brings people benefits, privileges, convenience and efficiencies, with confidentiality issues. Additionally, technological advances are accompanied with threats that can pose dangerous privacy risks that can be more detrimental than expected. Privacy of data is a source of much concern to researchers throughout the globe. A question that remains unanswered is the question that “what exactly can be done” to resolve confidentially and privacy issues of big data? To answer some questions, data collected for this chapter has been through the analyze of 58 peer reviewed articles collated from 2007 to 2016 in order to find some resolutions for Big Data confidentiality issues. The articles range from different industries that include healthcare , finance , robotics, web applications , social media , and mobile communication . The selected journal articles are aimed used to make comparative analysis of security issues in different areas to cast solutions. This chapter consists of four main parts: introduction, materials and method, results, discussion and conclusion. This inquiry aimed to find different security issues of big data in various areas and gives solutions by analyzing results. The results of the content analysis suggest that the internet applications and financial institutions are dealing with specific security problems, whereas social media and other industries deal with confidentiality issues of sensitive information which have heightened privacy concerns. Both these issues are addressed in this study, as retrieved results from the data, highlights the gaps that can be further researched for development. The method used to gather data for this chapter is through the analysis of studies that deal with a particular confidentiality issue. After the analysis and evaluations, the suggestions of confidentiality issues are displayed by using a different algorithm method. This research has addressed gaps in the literature by highlighting security and privacy issues that big companies face with recent technological advancements in corporate societies. By doing this, the research could shed revolutionary light on issues of big data and provide futuristic research directions to solve them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kim, S., Kim, N., Chung, T.: Attribute relationship evaluation methodology for big data security. In: 2013 International Conference on IT Convergence and Security (ICITCS) (2013)

    Google Scholar 

  2. Islam, M., Islam, M., Shawkat Ali, A.: An approach to security for unstructured big data. Rev. Socionetwork Strat. 10, 105–123 (2016)

    Article  Google Scholar 

  3. Faulkner, L., Kritzstein, B., Zimmerman, J.: Security infrastructure for commercial and military ports. In: OCEANS’11 MTS/IEEE KONA (2011)

    Google Scholar 

  4. Zhang, X., Dou, W., Pei, J., Nepal, S., Yang, C., Liu, C., Chen, J.: Proximity-aware local-recoding anonymization with MapReduce for scalable big data privacy preservation in cloud. IEEE Trans. Comput. 64, 2293–2307 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  5. Abou-Tair, D., Berlik, S., Kelter, U.: Enforcing privacy by means of an ontology driven XACML framework. In: Third International Symposium on Information Assurance and Security (2007)

    Google Scholar 

  6. Ferretti, L., Pierazzi, F., Colajanni, M., Marchetti, M.: Scalable architecture for multi-user encrypted SQL operations on cloud database services. IEEE Trans. Cloud Comput. 2, 448–458 (2014)

    Article  Google Scholar 

  7. Chang, A., Tsai, D., Tsai, C., Lin, Y.: An improved certificate mechanism for transactions using radio frequency identification enabled mobile phone. In: 43rd Annual 2009 International Carnahan Conference on Security Technology (2009)

    Google Scholar 

  8. Huang, X., Du, X.: Achieving big data privacy via hybrid cloud. In: 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (2014)

    Google Scholar 

  9. Raghuwanshi, D., Rajagopalan, M.: MS2: practical data privacy and security framework for data at rest in cloud. In: 2014 World Congress on Computer Applications and Information Systems (WCCAIS) (2014)

    Google Scholar 

  10. Pham, D., Syed, A., Mohammad, A., Halgamuge, M.: Threat analysis of portable hack tools from USB storage devices and protection solutions. In: 2010 International Conference on Information and Emerging Technologies (2010)

    Google Scholar 

  11. Li, X., Niu, J., Kumari, S., Wu, F., Sangaiah, A.K., Choo, K.K.R.: A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J. Netw. Comput. Appl. (2017). https://doi.org/10.1016/j.jnca.2017.07.001

    Google Scholar 

  12. Hu, P., Ning, H., Qiu, T., Xu, Y., Luo, X., Sangaiah, A.K.: A unified face identification and resolution scheme using cloud computing in Internet of Things. Future Gener. Comput. Syst. (2017). https://doi.org/10.1016/j.future.2017.03.030

    Google Scholar 

  13. Xiao, X., Chen, C., Sangaiah, A.K., Hu, G., Ye, R., Jiang, Y.: CenLocShare: a centralized privacy-preserving location-sharing system for mobile online social networks. Future Gener. Comput. Syst. (2017). https://doi.org/10.1016/j.future.2017.01.035

    Google Scholar 

  14. Tan, Z., Nagar, U., He, X., Nanda, P., Liu, R., Wang, S., Hu, J.: Enhancing big data security with collaborative intrusion detection. IEEE Cloud Comput. 1, 27–33 (2014)

    Article  Google Scholar 

  15. Mengke, Y., Xiaoguang, Z., Jianqiu, Z., Jianjian, X.: Challenges and solutions of information security issues in the age of big data. China Commun. 13, 193–202 (2016)

    Article  Google Scholar 

  16. Syed, S., Teja, P.: Novel data storage and retrieval in cloud database by using frequent access node encryption. In: 2014 International Conference on Contemporary Computing and Informatics (IC3I) (2014)

    Google Scholar 

  17. Feng, X., Onafeso, B., Liu, E.: Investigating big data healthcare security issues with Raspberry Pi. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (2015)

    Google Scholar 

  18. Hussain, F.: Internet of Things. Springer International Publishing (2017)

    Google Scholar 

  19. Johnson, S.: The Internet Changes Everything: In: Revolutionizing Public Participation and Access to Government Information through the Internet. http://www.jstor.org/stable/40709905

  20. Kopetz, H.: Real-Time Systems. Springer, New York (2011)

    Book  MATH  Google Scholar 

  21. Valentinova, B.: The 5 Methodology Milestones for Big Data. https://icrunchdata.com/blog/480/the-5-methodology-milestones-for-big-data/

  22. Zeng, G.: Research on privacy protection in big data environment. Int. J. Eng. Res. Appl. 46–50 (2015)

    Google Scholar 

  23. Kizza, J.: Guide to Computer Network Security. Springer International Publishing, Cham (2017)

    Book  MATH  Google Scholar 

  24. Kuhn, D., Walsh, T., Fries, S.: Security considerations for voice over IP systems. In: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Gaithersburg, MD (2005)

    Google Scholar 

  25. Lee, W., Stolfo, S., Chan, P., Eskin, E., Fan, W., Miller, M., Hershkop, S., Zhang, J.: Real time data mining-based intrusion detection. In: Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX’01, vol. 1, pp. 89–100

    Google Scholar 

  26. Stouffer, K., Falco, J., Scarfone, K.: Guide to Industrial Control Systems (ICS) security. National Institute of Standards & Technology, Gaithersburg (2011)

    Google Scholar 

  27. Montlick, T.: Method and apparatus for wireless remote information retrieval and pen-based data entry (2017)

    Google Scholar 

  28. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28, 583–592 (2012)

    Article  Google Scholar 

  29. Vashist, R.: Big Data in Complex Systems. Springer International Publishing AG, Cham (2015)

    Google Scholar 

  30. Goel, S., Hong, Y.: Security Challenges in Smart Grid Implementation. In: SpringerBriefs in Cybersecurity, pp. 1–39 (2015)

    Google Scholar 

  31. Kaur, K., Dhindsa, K., Singh, G.: Numeric To numeric encryption of databases: using 3Kdec Algorithm. In: 2009 IEEE International Advance Computing Conference, pp. 1501–1505 (2009)

    Google Scholar 

  32. Li, P., Guo, S.: Load balancing for privacy-preserving access to big data in cloud. In: 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (2014)

    Google Scholar 

  33. Motiwalla, L., Xiaobai, L.: Value added privacy services for healthcare data. In: 2010 6th World Congress on Services, pp. 64–71 (2010)

    Google Scholar 

  34. Avireddy, S., Perumal, V., Gowraj, N., Kannan, R., Thinakaran, P., Ganapthi, S., Gunasekaran, J., Prabhu, S.: Random4: An Application Specific Randomized Encryption Algorithm to Prevent SQL Injection, pp. 1327–1333 (2012)

    Google Scholar 

  35. Nair, K., Helberg, A., Van der Merwe, J.: An Approach to Improve the Match-on-Card Fingerprint Authentication System Security. http://hdl.handle.net/10204/8879 (2016)

  36. Moura, J., Serrão, C.: Security and privacy issues of big data. In: Handbook of Research on Trends and Future Directions in Big Data and Web Intelligence, pp. 20–52 (2016)

    Google Scholar 

  37. Swarna, S., Maryam, S.: Increasing security level in data sharing using ring signature in cloud environment. J. Eng. Res. Appl. 01–06 (2016)

    Google Scholar 

  38. Charishma, P., Venkatesh, K.: Big data security analytic solution using Splunk. Int. J. Eng. Res. Appl. (IJERA) (2015)

    Google Scholar 

  39. Chandankere, R., Begum, M.: Secure data sharing in an untrusted cloud. Int. J. Eng. Res. Appl. 5, 49–54 (2015)

    Google Scholar 

  40. Inuwa, U.: The risk and challenges of cloud computing. Int. J. Eng. Res. Appl. 5, 5–10 (2015)

    Google Scholar 

  41. Kaur, K., Pathak, A., Kaur, P., Kaur, K.: E-Commerce privacy and security system. Int. J. Eng. Res. Appl. 5, 63–73 (2017)

    Google Scholar 

  42. Jyothirmai, M., Ashwitha, M.: A survey of information security in healthcare sector. Int. J. Eng. Res. Appl. (IJERA) (2015)

    Google Scholar 

  43. Raji, F., Miri, A., Davarpanah Jazi, M.: Preserving privacy in online social networks. In: Foundations and Practice of Security, pp. 1–13 (2012)

    Google Scholar 

  44. Kepner, J., Gadepally, V., Michaleas, P., Schear, N., Varia, M., Yerukhimovich, A., Cunningham, R.: Computing on masked data: a high performance method for improving big data veracity. In: 2014 IEEE High Performance Extreme Computing Conference (HPEC) (2014)

    Google Scholar 

  45. Wagh, K., Jathar, R.: Securing data transfer in cloud environment. Int. J. Eng. Res. Appl. 4, 91–93 (2014)

    Google Scholar 

  46. Merkel: Privacy. https://www.merkleinc.com/privacy

  47. Hsu, C., Zeng, B., Zhang, M.: A novel group key transfer for big data security. Appl. Math. Comput. 249, 436–443 (2014)

    MathSciNet  MATH  Google Scholar 

  48. Pace, A.: Technologies for large data management in scientific computing. Int. J. Mod. Phys. C 25, 1430001 (2014)

    Article  Google Scholar 

  49. Bertine, H., Faynberg, I., Lu, H.: Overview of data and telecommunications security standardization efforts in ISO, IEC, ITU, and IETF. Bell Labs Tech. J. 8, 203–229 (2004)

    Article  Google Scholar 

  50. Mehak, G.: improving data storage security in cloud using Hadoop. Int. J. Eng. Res. Appl. 4, 133–138 (2014)

    Google Scholar 

  51. Mirarab, A., Kenari, A.: A new framework for secure M-Commerce. Int. J. Eng. Res. Appl. 4, 163–167 (2014)

    Google Scholar 

  52. Raghuwanshi, S., Nigoti, R.: Modified active monitoring ant clustering based load balancing over public clouds. Int. J. Comput. Appl. 167 (2017)

    Google Scholar 

  53. Abawajy, J., Kelarev, A., Chowdhury, M.: Large iterative multitier ensemble classifiers for security of big data. IEEE Trans. Emerg. Top. Comput. 2, 352–363 (2014)

    Article  Google Scholar 

  54. Tankard, C.: Big data security. Netw. Secur. 2012, 5–8 (2012)

    Google Scholar 

  55. Kaplan, B.: How should health data be used? Camb. Q. Healthc. Ethics 25, 312–329 (2016)

    Article  Google Scholar 

  56. Suji Pramila, R., Shajin Nargunam, A., Affairs, A.: A study on data confidentiality in early detection of Alzheimer’s disease. In: 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET) (2012)

    Google Scholar 

  57. Eler, A.: A Look Into 3 Social Video Apps: Socialcam, Viddy & Klip—ReadWrite. https://readwrite.com/2012/05/02/a-look-into-3-social-video-apps-socialcam-viddy-klip/ (2012)

  58. Wang, Y.: Image enlargement engine based on one-dimensional data interpolation algorithm. J. Jilin Univ. (Inf. Sci. Ed.) 4, (2010)

    Google Scholar 

  59. Skinner, G., Chang, E., McMahon, M., Aisbett, J., Miller, M.: Shield privacy Hippocratic security method for virtual community. In: 30th Annual Conference of IEEE Industrial Electronics Society, 2004. IECON (2004)

    Google Scholar 

  60. Dimitropoulos, L., Rizk, S.: A state-based approach to privacy and security for interoperable health information exchange. Health Aff. 28, 428–434 (2009)

    Article  Google Scholar 

  61. Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data—SIGMOD ’00 (2000)

    Google Scholar 

Download references

Acknowledgements

The authors acknowledge the data collection support provided by Mariia Talalaeva.

Author information

Authors and Affiliations

Authors

Contributions

Manbir Singh and Malka N. Halgamuge conceived the study idea and developed the analysis plan. Manbir Singh analyzed the data and wrote the initial chapter. Malka N. Halgamuge helped to prepare the figures and tables, and finalizing the manuscript. All authors read the manuscript.

Corresponding author

Correspondence to Malka N. Halgamuge .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Singh, M., Halgamuge, M.N., Ekici, G., Jayasekara, C.S. (2018). A Review on Security and Privacy Challenges of Big Data. In: Sangaiah, A., Thangavelu, A., Meenakshi Sundaram, V. (eds) Cognitive Computing for Big Data Systems Over IoT. Lecture Notes on Data Engineering and Communications Technologies, vol 14 . Springer, Cham. https://doi.org/10.1007/978-3-319-70688-7_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-70688-7_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-70687-0

  • Online ISBN: 978-3-319-70688-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics