Skip to main content

Big Data Security and Privacy: New Proposed Model of Big Data with Secured MR Layer

  • Chapter
  • First Online:
Advanced Computing and Systems for Security

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 883))

Abstract

The publication and dispersal of crude information are urgent components in business, scholarly, and restorative applications. With an expanding number of open stages, for example, informal communities and cell phones from which information might be gathered; the volume of such information have likewise expanded after some time progressed toward becoming as Big Data. The traditional model of Big Data does not specify any level for capturing the sensitivity of data both structured and combined. It additionally needs to incorporate the notion of privacy and security where the risk of exposing personal information is probabilistically minimized. This paper introduced security and privacy layer between HDFS and MR Layer (MapReduce) known as new proposed Secured MapReduce (SMR) Layer and this model is known as SMR model. The core benefit of this work is to promote data sharing for knowledge mining. This model creates a privacy and security guarantee and data utility for data miners. In this model, running time, CPU usage, Memory usage, and Information loss are less as compared to traditional approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Abbreviations

SMR Layer:

Secured MapReduce Layer

MR:

MapReduce

KVP:

Key-Value Pairs

HDFS:

Hadoop Distributed File System

API:

Application Programming Interface

References

  1. Jain, P., Gyanchandani, M., Khare, N.: Big data privacy: a technological perspective and review. J. Big Data 3 (2016). ISSN 2196-1115

    Google Scholar 

  2. Mehmood, A., Natgunanathan, I., Xiang, Y., Hua, G., Guo, S.: Protection of big data privacy. IEEE Access 4, 1821–1834 (2016). https://doi.org/10.1109/access.2016.2558446

    Article  Google Scholar 

  3. Big Data Top Challenge 2016. https://downloads.cloudsecurityalliance.org/initiatives/bdwg/BigDataTopTenv1.pdf

  4. Big Data Submits. https://theinnovationenterprise.com/summits/big-data-innovation-mumbai/eventactivities=5546

  5. The intersection of privacy and security data privacy day event 2012. https://concurringopinions.com/archives/2012/01/the-intersection-of-privacy-and-security-data-privacy-day-event-at-gw-law-school.html

  6. Savas, O., Deng, J.: Book Titled Big Data Analytics in Cybersecurity. CRC Press, Taylor Francis Group

    Google Scholar 

  7. Sagiroglu, S., Sinanc, D.: Big data: a review. J. Big Data 20–24 (2013)

    Google Scholar 

  8. Chavan, V., Phursule, R.N.: Survey paper on big data. Int. J. Comput. Sci. Inf. Technol. 5(6) (2014)

    Google Scholar 

  9. Groves, P., Kayyali, B., Knott, D., Kuiken, S.V.: The Big Data Revolution in Healthcare. McKinsey & Company, New York (2013)

    Google Scholar 

  10. Lin, J.: MapReduce is good enough the control project. IEEE Comput. 32 (2013)

    Google Scholar 

  11. Patel, A.B., Birla, M., Nair, U.: Addressing big data problem using Hadoop and Map Reduce. In: Nirma University International Conference on Engineering in Proceedings (2012)

    Google Scholar 

  12. Acampora, G., et al.: Data analytics for pervasive health. In: Healthcare Data Analytics (2015). ISSN 533-576

    Google Scholar 

  13. Kulkarni, A.P., Khandelwal, M.: Survey on Hadoop and introduction to YARN. Int. J. Emerg. Technol. Adv. Eng. 4(5) (2014). www.ijetae.com. ISSN 2250-2459

  14. Yu, E., Deng, S.: Understanding software ecosystems: a strategic modeling approach. In: Proceedings of the Workshop on Software Ecosystems 2011, IWSECO-2011, pp. 6–16 (2011)

    Google Scholar 

  15. Shim, K: MapReduce algorithms for big data analysis. In: DNIS. LNCS, pp. 44–48 (2013)

    Chapter  Google Scholar 

  16. Arora, S., Goel, M.: Survey paper on scheduling in Hadoop. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4(5) (2014)

    Google Scholar 

  17. Evfimievski, S.: Randomization techniques for privacy preserving association rule mining. In: SIGKDD Exploration, vol. 4, no. 2 (2002)

    Google Scholar 

  18. Roy, I., Ramadan, H.E., Setty, T.V., Kilzer, A., Shmatikov, V., Witchel, E.: Airavat: security and privacy for MapReduce. In: Castro, M. (eds.) Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, pp. 297–312. USENIX Association, San Jose (2010)

    Google Scholar 

  19. Tripathy, K., Mitra, A.: An algorithm to achieve k-anonymity and l-diversity anonymization in social networks. In: Proceedings of Fourth International Conference on Computational Aspects of Social Networks (CA-SoN), Sao Carlos, pp. 126–131 (2012)

    Google Scholar 

  20. Mohammadian, E., Noferesti, M., Jalili, R.: FAST: fast anonymization of big data streams. In: Proceedings of the 2014 International Conference on Big Data Science and Computing, p. 23 (2014)

    Google Scholar 

  21. Terzi, D.S., Terzi, R., Sagiroglu, S.: A survey on security and privacy issues in big data. In: Proceedings of ICITST 2015, London, UK, Dec 2015

    Google Scholar 

  22. Derbeko, P., et al.: Security and privacy aspects in MapReduce on clouds: a survey. Comput. Sci. Rev. 20, 1932–128 (2016)

    Article  MathSciNet  Google Scholar 

  23. Kacha, L., Zitouni, A.: An overview on data security in cloud computing. In: CoMeSySo: Cybernetics Approaches in Intelligent Systems, pp. 250–261. Springer (2017)

    Google Scholar 

  24. Ilavarasi, K., Sathiyabhama, B.: An evolutionary feature set decomposition based anonymization for classification workloads: privacy preserving data mining. J. Cluster Comput. (2017)

    Google Scholar 

  25. ApacheHDFS. http://hadoop.apache.org/hdfs

  26. Sweeney, L.: K-anonymity: a model for protecting privacy. Int J Uncertain Fuzz. 10(5), 55770 (2002)

    MathSciNet  MATH  Google Scholar 

  27. Zakerdah, H., Aggarwal, C.C., Barker, K.: Privacy-Preserving Big Data Publishing. ACM, La Jolla (2015)

    Google Scholar 

  28. Morey, T., Forbath, T., Schoop, A.: Customer data: designing for transparency and trust. Harv. Bus. Rev. 93–95 (2015)

    Google Scholar 

  29. Friedman, A., Wolff, R., Schuster, A.: Providing k-anonymity in data mining. Int. J. Very Large Data Bases 17(4), 789–804 (2008)

    Article  Google Scholar 

  30. Fung, B., et al.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. (CSUR) 42–44 (2010)

    Google Scholar 

  31. Cevher, V., Becker, S., Schmidt, M.: Convex optimization for big data: scalable, randomized, and parallel algorithms for big data analytics. IEEE Signal Process. Mag. 31(5), 32–43 (2014)

    Article  Google Scholar 

  32. Kuo, M.H., Sahama, T., Kushniruk, A.W., Borycki, E.M., Grunwell, D.K.: Health big data analytics: current perspectives, challenges and potential solutions. Int. J. Big Data Intell. 1(1/2), 114–126 (2014)

    Article  Google Scholar 

  33. Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4) (2010)

    Article  Google Scholar 

  34. Jain, P., Pathak, N., Tapashetti, P., Umesh, A.S.: Privacy-preserving processing of data decision tree based on sample selection and singular value decomposition. In: 2013 9th International Conference on Information Assurance and Security (IAS), Gammarth, pp. 91–95 (2013)

    Google Scholar 

  35. Jain, P., Gyanchandani, M., Khare, N.: Privacy and security concerns in healthcare big data: an innovative prescriptive. J. Inf. Assur. Secur. 12(1), 18–30 (2017)

    Google Scholar 

  36. Ko, S.Y, Jeon, K., Morales, R.: The HybrEx model for confidentiality and privacy in cloud computing. In: 3rd USENIX Workshop on Hot Topics in Cloud Computing, HotCloud’11, Portland (2011)

    Google Scholar 

  37. Tweepy Dataset Online. https://marcobonzanini.com/2015/03/02/mining-twitter-data-with-python-part-1/

  38. First Things First—Highmark Makes Healthcare-Fraud Prevention Top Priority with SAS (2006)

    Google Scholar 

  39. Apache Hive. http://hive.apache.org

  40. Borthakur, D., Sarma, J.S., Gray, J., Muthukkaruppan, K., Spiegelberg, N., Kuang, H., Krangana Than, D.M.S., Menon, A., Rash, S., Schmidt, R., Amitanand, A.: Apache Hadoop Goes Realtime at Facebook ACM SIGMOD, Athens, Greece (2011). 978-1-4503-0661-4/11/06

    Google Scholar 

  41. Mrigank, M., Akashdeep, K., Snehasish, D., Kumar, N.: Analysis of Big Data Using Apache Hadoop and Map Reduce, vol. 4, no. 5 (2014)

    Google Scholar 

  42. Ghinita, G., Karras, P., Kalnis, P., Mamoulis, N.: Fast data anonymization with low information loss. In: Proceedings of International Conference on Very Large Data Bases (VLDB), pp. 758–769 (2007)

    Google Scholar 

  43. Yin, C., Zhang, S., Xi, J., Wang, J.: An improved anonymity model for big data security based on clustering algorithm. In: Combined Special Issues on Security and privacy in social networks (NSS2015) and 18th IEEE International Conference on Computational Science and Engineering (CSE2015), vol. 29, Issue 7, 10 Apr 2017

    Google Scholar 

Download references

Acknowledgements

We acknowledge the support of Madhya Pradesh Council of India. We are also thankful to Dr. Rajesh Wadhvani and Dr.Sri Khetwat Saritha for providing high configuration system facilities form their respective laboratory Information retrieval lab and Machine Learning lab of MANIT Bhopal.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Priyank Jain .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Jain, P., Gyanchandani, M., Khare, N. (2019). Big Data Security and Privacy: New Proposed Model of Big Data with Secured MR Layer. In: Chaki, R., Cortesi, A., Saeed, K., Chaki, N. (eds) Advanced Computing and Systems for Security. Advances in Intelligent Systems and Computing, vol 883. Springer, Singapore. https://doi.org/10.1007/978-981-13-3702-4_3

Download citation

Publish with us

Policies and ethics