Skip to main content

Big Data-Driven Privacy and Security Issues and Challenges

  • Chapter
  • First Online:
Privacy and Security Issues in Big Data

Abstract

The Big Data brings benefits tremendously to all private and government sectors moreover some extents to individuals too. However, it brings a lot of concern for how this massive collection of data is kept secure and how the privacy of the individuals is ensured. This chapter provides a general outlines of Big Data-driven privacy and security issues and challenges through a brief literature analysis to serve as a base for the remaining chapters of this book. This chapter also raised the concerns on individual’s privacy matters as a contribution to the academic and research community. One of such main concerns is the lack of emphasis on the individual’s privacy by the companies and the researches. This issue can be diminished by creating global standards and raising awareness to the individuals.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Agarwal N, Tripathi A (2015) Big data security and privacy issues: a review. Int J Innov Comput Sci Eng 2:12–15

    Google Scholar 

  2. Almeida F (2018) Big data: concept, potentialities and vulnerabilities. Emerging Sci J. https://doi.org/10.28991/esj-2018-01123

  3. Bekker A (2020) Big data security: issues, challenges, concerns [online] Scnsoft.com. Available at: https://www.scnsoft.com/blog/big-data-security-challenges. Accessed 21 July 2020

  4. Mishra S, Mallick PK, Tripathy HK, Bhoi AK, González-Briones A (2020) Performance evaluation of a proposed machine learning model for chronic disease datasets using an integrated attribute evaluator and an improved decision tree classifier. Appl Sci 10(22):8137

    Article  Google Scholar 

  5. Mishra S, Tripathy HK, Mallick PK, Bhoi AK, Barsocchi P (2020) EAGA-MLP—an enhanced and adaptive hybrid classification model for diabetes diagnosis. Sensors 20(14):4036

    Article  Google Scholar 

  6. Chen M, Mao S, Liu Y (2014) Big data: a survey. Mobile Netw Appl 19:171–209. https://doi.org/10.1007/s11036-013-0489-0

    Article  Google Scholar 

  7. Coppens S, Gil Y et al (2010) Provenance XG final report [online] W3.org. Available at: https://www.w3.org/2005/Incubator/prov/XGR-prov-20101214. Accessed 20 July 2020

  8. Rath M, Mishra S (2020) Security approaches in machine learning for satellite communication. In: Machine learning and data mining in aerospace technology, pp 189–204. Springer, Cham

    Google Scholar 

  9. Mishra S, Sahoo S, Mishra BK (2019) Addressing security issues and standards in Internet of things. In: Emerging trends and applications in cognitive computing, pp 224–257. IGI Global

    Google Scholar 

  10. Rath M, Mishra S (2019) Advanced-level security in network and real-time applications using machine learning approaches. In: Machine learning and cognitive science applications in cyber security, pp 84–104. IGI Global

    Google Scholar 

  11. Demchenko Y, Ngo C, de Laat C, Membrey P, Gordijenko D (2014). Big security for big data: addressing security challenges for the big data infrastructure. In Jonker W, Petković M (eds) Secure data management, pp 76–94. Springer International Publishing. https://doi.org/10.1007/978-3-319-06811-4_13

  12. Dudkin I (2018) Top 5 big data security issues—Skywell software [on-line] Skywell Software. Available at: https://skywell.software/blog /top-5-big-data-security-issues/. Accessed 20 July 2020

  13. Ekbia H, Mattioli M, Kouper I, Arave G, Ghazinejad A, Bowman T, Suri V, Tsou A, Weingart S, Sugimoto C (2015) Big data, bigger dilemmas: a critical review. J Am Soc Inf Sci 66:1523–1545. https://doi.org/10.1002/asi.23294

    Article  Google Scholar 

  14. Mishra S, Tripathy N, Mishra BK, Mahanty C (2019) Analysis of security issues in cloud environment. In: Security designs for the cloud, Iot, and social networking, pp 19–41

    Google Scholar 

  15. Mishra S, Mishra BK, Tripathy HK, Dutta A (2020) Analysis of the role and scope of big data analytics with IoT in health care domain. In: Handbook of data science approaches for biomedical engineering, pp 1–23. Academic Press

    Google Scholar 

  16. Frizzo-Barker J, Chow-White P, Mozafari M, Ha D (2016) An empirical study of the rise of big data in business scholarship. Int J Inf Manage 36:403–413. https://doi.org/10.1016/j.ijinfomgt.2016.01.006

    Article  Google Scholar 

  17. Gholami A, Laure E (2016) Big data security and privacy issues in the CLOUD. Int J Netw Security Appl 8:59–79. https://doi.org/10.5121/ijnsa.2016.8104

    Article  Google Scholar 

  18. Dutta A, Misra C, Barik RK, Mishra S (2021) Enhancing mist assisted cloud computing toward secure and scalable architecture for smart healthcare. In: Hura G, Singh A, Siong Hoe L (eds) Advances in communication and computational technology. Lecture Notes in Electrical Engineering, vol 668. Springer, Singapore. https://doi.org/10.1007/978-981-15-5341-7_116

  19. Gorodov E, Gubarev V (2013) Analytical review of data visualization methods in application to big data. J Electrical Comput Eng 2013:1–7. https://doi.org/10.1155/2013/969458

    Article  Google Scholar 

  20. HP (2014) Internet of Things research study. Retrieved from https://fortifyprotect.com/HP_IoT_Research_Study.pdf. Accessed 15 Apr 2020

  21. Jose A, Cartos S (2015) Security and privacy issues of big data. In: Noor J, Mohamed E, Mohamed F (eds) Handbook of trends and future directions in big data and web intelligence. IGI Global, Hershey PA, USA, pp 20–52

    Google Scholar 

  22. Jutla D, Bodorik P, Ali S (2013). Engineering privacy for big data apps with the unified modeling language. In: 2013 IEEE international congress on big data, pp 38–45, IEEE. https://doi.org/10.1109/BigData.Congress.2013.15

  23. Mishra S, Tadesse Y, Dash A, Jena L, Ranjan P (2019) Thyroid disorder analysis using random forest classifier Intelligent and Cloud Computing. Springer, Singapore, pp 385–390

    Google Scholar 

  24. Kindervag J, Balaouras S, Hill B, Mak K (2012) Control and protect sensitive information in the era of big data. Academic Press

    Google Scholar 

  25. Leszczynski A (2015) Spatial big data and anxieties of control. Environ Plann D Soc Space 33:965–984. https://doi.org/10.1177/0263775815595814

    Article  Google Scholar 

  26. Mahmood T, Afzal U (2020) Big data analytics architecture for security intelligence. In: Proceedings of the 11th international conference on security of information and networks, pp 129–134. https://doi.org/10.1109/NCIA.2013.6725337

  27. OWASP (2014) OWASP Internet of Things top ten project. Retrieved August 05, 2014, from https://www.owasp.org/index.php/ OWASP_Internet of_Things_Top_Ten_Project. Accessed 15 Apr 2020

  28. Perera C (2013) Context aware computing for the Internet of Things: a survey. IEEE Comm Surveys & Tutorials 16:414–454

    Article  Google Scholar 

  29. Popa R, Redfield C (2011) Cryptdb: protecting confidentiality with encrypted query processing. In: Proceedings of the …, pp 85–100. https://doi.org/10.1145/2043556.2043566

  30. Strang K, Sun Z (2017) Big data paradigm: what is the status of privacy and security? Ann Data Science (Springer) 4:1–17

    Article  Google Scholar 

  31. Sun Z, Strang K, Pambel F (2018) Privacy and security in the big data paradigm. J Comput Information Syst 60:146–155. https://doi.org/10.1080/08874417.2017.1418631

    Article  Google Scholar 

  32. Sun Z, Sun L, Strang K (2016) Big data analytics services for enhancing business intelligence. J Comput Information Syst 58:162–169. https://doi.org/10.1080/08874417.2016.1220239

    Article  Google Scholar 

  33. Swoyer S (2016) It’s official: metadata management is a strategic problem. Transforming data with intelligence [online] Transforming data with intelligence. Available at: https://tdwi.org/articles/2016/11/02/metadata-management-is-a-strategic-problem.aspx. Accessed 11 June 2020

  34. Tarekegn G, Munaye Y (2016) Big data: security issues, challenges and future scope. Int J Res Stud Comput Sci Eng. https://doi.org/10.20431/2349-4859.0303001

  35. Van Dijk M, Gentry C, Halevi S, Vaikuntanathan V (2010) Fully homomorphic encryption over the integers. In: Advances in cryptology–EUROCRYPT ’10, pp 24–43. https://doi.org/10.1007/978-3-642-13190-5_2

  36. Venkatraman S, Venkatraman R (2019) Big data security challenges and strategies. AIMS Math 4:860–879. https://doi.org/10.3934/math.2019.3.860

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Selvakumar Samuel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Samuel, S., Rajadorai, K.P., Hameed, V.A. (2021). Big Data-Driven Privacy and Security Issues and Challenges. In: Das, P.K., Tripathy, H.K., Mohd Yusof, S.A. (eds) Privacy and Security Issues in Big Data. Services and Business Process Reengineering. Springer, Singapore. https://doi.org/10.1007/978-981-16-1007-3_2

Download citation

Publish with us

Policies and ethics