Abstract
We are in the midst of a revolution within computing, it goes under the name of big data. Thus, Due to big data proliferation and the various information resources, our personal data will be shared and published by all people; that is why our privacy will be increasingly accessed, and thus threatened by hackers. In this context, many researchers have proposed different methods to ensure the security of sensitive and identifiable information. Through this paper, we want to dig into the security context while implementing a methodological approach to protect the sensitive data in the big data frameworks. In this article, we propose a method which combines fragmentation and encryption to ensure security in Mongo database. It allows sensitive data security in NoSQL context.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Heni, H., Gargouri, F.: A methodological approach for big data security: application for NoSQL data stores. In: International Conference on Neural Information Processing, pp. 685–692 (2015)
Tene, O., Polonetsky, J.: Privacy in the age of big data: a time for big decisions. Stan. L. Rev. 64, 63 (2012)
Jensen, M.: Challenges of Privacy Protection in Big Data Analytics. In: Proceeding of Big Data Congress (2013)
Sood, S.K.: A combined approach to ensure data security in cloud computing. J. Netw. Comput. Appl. 35(6), 1831–1838 (2012)
Ciliani, V., Vimercati, S.D.C.D., Foresti, S.: Combining fragmentation and encryption to protect privacy in data storage. ACM Trans. Inf. Syst. Secur. 13(3), 1–30 (2010)
Rekatsinas, T., Deshpande, A., Machanavajjhala, A.: Partitioning sensitive data amongst multiple adversaries. Proc. VLDB Endow. 6, 1594–1605 (2013)
Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncert. Fuzziness. Knowl.-Based Syst. 10(5), 571–588 (2002). shah, S.N: Find data bases with protected health information. IBM white paper. October 2010
Blanning, R.: Sensitivity Analysis in Hierarchical Fuzzy Logic Models. In: Proceeding of International Conference on Decision Support and Knowledge Based Systems (1988)
Meyerson, A., Williams, R.: On the complexity of optimal k-anonymity. In: Proceeding of International Symposium on Principles of Database Systems (PODS), pp. 223–228 (2004)
Chakaravarthy, V.T., Gupta, H., Roy, P., Mohania, M.K.: Efficient Techniques for Document Sanitization. In: Proceeding of International Conference on Information and Knowledge Management (CIKM), pp. 843–852 (2008)
Datamasker. http://www.datamasker.com
Camouflage. http://www.datamasking.com
Solix. http://www.solix.com
Datavantage Globa. http://www.datavantage.com
Pse Data Security. http://www.psedatasecurity.com
Heni, H., Gargouri, F.: Big data security using fragmentation in mongo data store. In: International Business Information Management Association (IBIMA) (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Heni, H., Abdallah, M.B., Gargouri, F. (2018). Combining Fragmentation and Encryption to Ensure Big Data at Rest Security. In: Abraham, A., Muhuri, P., Muda, A., Gandhi, N. (eds) Hybrid Intelligent Systems. HIS 2017. Advances in Intelligent Systems and Computing, vol 734. Springer, Cham. https://doi.org/10.1007/978-3-319-76351-4_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-76351-4_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-76350-7
Online ISBN: 978-3-319-76351-4
eBook Packages: EngineeringEngineering (R0)