Skip to main content

Security Issues in Geo-Spatial Big Data Analytics with Special Reference to Disaster Management

  • Conference paper
  • First Online:
Proceedings of International Conference on Remote Sensing for Disaster Management

Abstract

In recent times the usage of Location based services is increasing due to its wide range of applications in the science and engineering. Especially, the Geographic Information Systems (GIS) services and applications are more user friendly to the people. Beside the useful advantages, it has its own limitations like data storage, data organization, data privacy and protection, etc. The specified confronts can be solved using the Geo-Spatial Big Data (GSBD) and its security issues. This paper discusses a few issues like Data Security, Data Privacy, Expenses, Bad Analytics and Bad data. Also work describes threats to the GSBD like Spammy locksmith attack, impersonation attack, Denial-of-Service attack (DOS) and many more and its impact on the GSBD. These security issues will help to researchers and practitioners to design and development, a novel strong security mechanism for GSBD.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen, C.L.P., Zhang, C.-Y.: Data-intensive applications, challenges, techniques and technologies: a survey on big data. Inf. Sci. 275, 314–347 (2014)

    Article  Google Scholar 

  2. Choi, S., Bae, B.: The real-time monitoring system of social big data for disaster management. In: Computer Science and Its Applications, pp. 809–815. Springer, Berlin, Heidelberg (2015)

    Google Scholar 

  3. Donovan, S.: Big data: teaching must evolve to keep up with advances. Nature 455(7212), 461 (2008)

    Article  Google Scholar 

  4. Duvvuru, R., Rao, P.J., Singh, S.K.: Improvizing security levels in WLAN via novel BSPS. In: International Conference on Emerging Trends in Communication, Control, Signal Processing & Computing Applications (C2SPCA), 2013 IEEE (2013)

    Google Scholar 

  5. Duvvuru, R., Singh, S.K., Rao, G.N., Kote, A., Krishna, B.B., Raju, M.V.: Scheme for Assigning Security Automatically for Real-Time Wireless Nodes via ARSA. InQuality, Reliability, Security and Robustness in Heterogeneous Networks, 1 Jan 2013, pp. 185–196. Springer, Berlin, Heidelberg (2013)

    Google Scholar 

  6. Duvvuru, R., Rao, P.J., Singh, S.K., Sinha, A.: Enhanced security levels of BSPS in WLAN. Int. J. Comput. Appl. 84(2), 33–39 (2013)

    Google Scholar 

  7. Duvvuru, R., Rao, P.J., Rao, G.N.: Multi-level chaos based encryption mechanism to enhance security of high security zone areas on Google map satellite images of India. Int. J. Appl. Eng. Res. 10(3), 8059–8072 (2015)

    Google Scholar 

  8. González-Tablas, A.I., et al.: Survey on location authentication protocols and spatial-temporal attestation services. In: Embedded and Ubiquitous Computing–EUC 2005 Workshops, Springer Berlin Heidelberg (2005)

    Chapter  Google Scholar 

  9. http://data-informed.com/the-5-biggest-risks-of-big-data/. Accessed 14 June 2015

  10. https://www.google.co.in/maps?source=tldsi&hl=te. Accessed 10 May 2015

  11. https://www.google.com/earth/explore/products/desktop.html. Accessed 04 Aug 2015

  12. http://bhuvan.nrsc.gov.in/governance/mowr_ganga/. Accessed 18 June 2015

  13. http://boingboing.net/2014/03/31/google-maps-spam-problem-pre.html. Accessed 22 Aug 2015

  14. Labrinidis, A., Jagadish, H.V.: Challenges and opportunities with big data. Proceedings of the VLDB Endowment 5(12), 2032–2033 (2012)

    Article  Google Scholar 

  15. Markoff, J., Barboza, D.: Researchers trace data theft to Intruders in China. The New York Times (2010)

    Google Scholar 

  16. Rachel, S.S., Chittibabu, D.: Article: improvising security of HSZ areas on Google map satellite images of India via COTPCSD mechanism. Int. J. Comput. Appl. 128(13), 1–7 (2015). October 2015. Published by Foundation of Computer Science (FCS), NY, USA

    Google Scholar 

  17. Seelan, S.K., et al.: Remote sensing applications for precision agriculture: a learning community approach. Remote Sens. Environ. 88(1), 157–169 (2003)

    Article  Google Scholar 

  18. Tankard, C.: Big data security. Netw. Secur. 7, 5–8 (2012)

    Google Scholar 

  19. Xu, W., et al.: Channel surfing and spatial retreats: defenses against wireless denial of service. In: Proceedings of the 3rd ACM Workshop on Wireless Security, ACM (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajesh Duvvuru .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Duvvuru, R. et al. (2019). Security Issues in Geo-Spatial Big Data Analytics with Special Reference to Disaster Management. In: Rao, P., Rao, K., Kubo, S. (eds) Proceedings of International Conference on Remote Sensing for Disaster Management. Springer Series in Geomechanics and Geoengineering. Springer, Cham. https://doi.org/10.1007/978-3-319-77276-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-77276-9_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-77275-2

  • Online ISBN: 978-3-319-77276-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics