Skip to main content

Combining Fragmentation and Encryption to Ensure Big Data at Rest Security

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 734))

Abstract

We are in the midst of a revolution within computing, it goes under the name of big data. Thus, Due to big data proliferation and the various information resources, our personal data will be shared and published by all people; that is why our privacy will be increasingly accessed, and thus threatened by hackers. In this context, many researchers have proposed different methods to ensure the security of sensitive and identifiable information. Through this paper, we want to dig into the security context while implementing a methodological approach to protect the sensitive data in the big data frameworks. In this article, we propose a method which combines fragmentation and encryption to ensure security in Mongo database. It allows sensitive data security in NoSQL context.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    http://docs.mongodb.org/ecosystem/tools/administration-interfaces/

References

  1. Heni, H., Gargouri, F.: A methodological approach for big data security: application for NoSQL data stores. In: International Conference on Neural Information Processing, pp. 685–692 (2015)

    Chapter  Google Scholar 

  2. Tene, O., Polonetsky, J.: Privacy in the age of big data: a time for big decisions. Stan. L. Rev. 64, 63 (2012)

    Google Scholar 

  3. Jensen, M.: Challenges of Privacy Protection in Big Data Analytics. In: Proceeding of Big Data Congress (2013)

    Google Scholar 

  4. Sood, S.K.: A combined approach to ensure data security in cloud computing. J. Netw. Comput. Appl. 35(6), 1831–1838 (2012)

    Article  Google Scholar 

  5. Ciliani, V., Vimercati, S.D.C.D., Foresti, S.: Combining fragmentation and encryption to protect privacy in data storage. ACM Trans. Inf. Syst. Secur. 13(3), 1–30 (2010)

    Google Scholar 

  6. Rekatsinas, T., Deshpande, A., Machanavajjhala, A.: Partitioning sensitive data amongst multiple adversaries. Proc. VLDB Endow. 6, 1594–1605 (2013)

    Article  Google Scholar 

  7. Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncert. Fuzziness. Knowl.-Based Syst. 10(5), 571–588 (2002). shah, S.N: Find data bases with protected health information. IBM white paper. October 2010

    Article  MathSciNet  Google Scholar 

  8. Blanning, R.: Sensitivity Analysis in Hierarchical Fuzzy Logic Models. In: Proceeding of International Conference on Decision Support and Knowledge Based Systems (1988)

    Google Scholar 

  9. Meyerson, A., Williams, R.: On the complexity of optimal k-anonymity. In: Proceeding of International Symposium on Principles of Database Systems (PODS), pp. 223–228 (2004)

    Google Scholar 

  10. Chakaravarthy, V.T., Gupta, H., Roy, P., Mohania, M.K.: Efficient Techniques for Document Sanitization. In: Proceeding of International Conference on Information and Knowledge Management (CIKM), pp. 843–852 (2008)

    Google Scholar 

  11. Datamasker. http://www.datamasker.com

  12. Camouflage. http://www.datamasking.com

  13. Solix. http://www.solix.com

  14. Datavantage Globa. http://www.datavantage.com

  15. Pse Data Security. http://www.psedatasecurity.com

  16. Heni, H., Gargouri, F.: Big data security using fragmentation in mongo data store. In: International Business Information Management Association (IBIMA) (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Houyem Heni .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Heni, H., Abdallah, M.B., Gargouri, F. (2018). Combining Fragmentation and Encryption to Ensure Big Data at Rest Security. In: Abraham, A., Muhuri, P., Muda, A., Gandhi, N. (eds) Hybrid Intelligent Systems. HIS 2017. Advances in Intelligent Systems and Computing, vol 734. Springer, Cham. https://doi.org/10.1007/978-3-319-76351-4_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-76351-4_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-76350-7

  • Online ISBN: 978-3-319-76351-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics