Abstract
The Big Data brings benefits tremendously to all private and government sectors moreover some extents to individuals too. However, it brings a lot of concern for how this massive collection of data is kept secure and how the privacy of the individuals is ensured. This chapter provides a general outlines of Big Data-driven privacy and security issues and challenges through a brief literature analysis to serve as a base for the remaining chapters of this book. This chapter also raised the concerns on individual’s privacy matters as a contribution to the academic and research community. One of such main concerns is the lack of emphasis on the individual’s privacy by the companies and the researches. This issue can be diminished by creating global standards and raising awareness to the individuals.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Agarwal N, Tripathi A (2015) Big data security and privacy issues: a review. Int J Innov Comput Sci Eng 2:12–15
Almeida F (2018) Big data: concept, potentialities and vulnerabilities. Emerging Sci J. https://doi.org/10.28991/esj-2018-01123
Bekker A (2020) Big data security: issues, challenges, concerns [online] Scnsoft.com. Available at: https://www.scnsoft.com/blog/big-data-security-challenges. Accessed 21 July 2020
Mishra S, Mallick PK, Tripathy HK, Bhoi AK, González-Briones A (2020) Performance evaluation of a proposed machine learning model for chronic disease datasets using an integrated attribute evaluator and an improved decision tree classifier. Appl Sci 10(22):8137
Mishra S, Tripathy HK, Mallick PK, Bhoi AK, Barsocchi P (2020) EAGA-MLP—an enhanced and adaptive hybrid classification model for diabetes diagnosis. Sensors 20(14):4036
Chen M, Mao S, Liu Y (2014) Big data: a survey. Mobile Netw Appl 19:171–209. https://doi.org/10.1007/s11036-013-0489-0
Coppens S, Gil Y et al (2010) Provenance XG final report [online] W3.org. Available at: https://www.w3.org/2005/Incubator/prov/XGR-prov-20101214. Accessed 20 July 2020
Rath M, Mishra S (2020) Security approaches in machine learning for satellite communication. In: Machine learning and data mining in aerospace technology, pp 189–204. Springer, Cham
Mishra S, Sahoo S, Mishra BK (2019) Addressing security issues and standards in Internet of things. In: Emerging trends and applications in cognitive computing, pp 224–257. IGI Global
Rath M, Mishra S (2019) Advanced-level security in network and real-time applications using machine learning approaches. In: Machine learning and cognitive science applications in cyber security, pp 84–104. IGI Global
Demchenko Y, Ngo C, de Laat C, Membrey P, Gordijenko D (2014). Big security for big data: addressing security challenges for the big data infrastructure. In Jonker W, Petković M (eds) Secure data management, pp 76–94. Springer International Publishing. https://doi.org/10.1007/978-3-319-06811-4_13
Dudkin I (2018) Top 5 big data security issues—Skywell software [on-line] Skywell Software. Available at: https://skywell.software/blog /top-5-big-data-security-issues/. Accessed 20 July 2020
Ekbia H, Mattioli M, Kouper I, Arave G, Ghazinejad A, Bowman T, Suri V, Tsou A, Weingart S, Sugimoto C (2015) Big data, bigger dilemmas: a critical review. J Am Soc Inf Sci 66:1523–1545. https://doi.org/10.1002/asi.23294
Mishra S, Tripathy N, Mishra BK, Mahanty C (2019) Analysis of security issues in cloud environment. In: Security designs for the cloud, Iot, and social networking, pp 19–41
Mishra S, Mishra BK, Tripathy HK, Dutta A (2020) Analysis of the role and scope of big data analytics with IoT in health care domain. In: Handbook of data science approaches for biomedical engineering, pp 1–23. Academic Press
Frizzo-Barker J, Chow-White P, Mozafari M, Ha D (2016) An empirical study of the rise of big data in business scholarship. Int J Inf Manage 36:403–413. https://doi.org/10.1016/j.ijinfomgt.2016.01.006
Gholami A, Laure E (2016) Big data security and privacy issues in the CLOUD. Int J Netw Security Appl 8:59–79. https://doi.org/10.5121/ijnsa.2016.8104
Dutta A, Misra C, Barik RK, Mishra S (2021) Enhancing mist assisted cloud computing toward secure and scalable architecture for smart healthcare. In: Hura G, Singh A, Siong Hoe L (eds) Advances in communication and computational technology. Lecture Notes in Electrical Engineering, vol 668. Springer, Singapore. https://doi.org/10.1007/978-981-15-5341-7_116
Gorodov E, Gubarev V (2013) Analytical review of data visualization methods in application to big data. J Electrical Comput Eng 2013:1–7. https://doi.org/10.1155/2013/969458
HP (2014) Internet of Things research study. Retrieved from https://fortifyprotect.com/HP_IoT_Research_Study.pdf. Accessed 15 Apr 2020
Jose A, Cartos S (2015) Security and privacy issues of big data. In: Noor J, Mohamed E, Mohamed F (eds) Handbook of trends and future directions in big data and web intelligence. IGI Global, Hershey PA, USA, pp 20–52
Jutla D, Bodorik P, Ali S (2013). Engineering privacy for big data apps with the unified modeling language. In: 2013 IEEE international congress on big data, pp 38–45, IEEE. https://doi.org/10.1109/BigData.Congress.2013.15
Mishra S, Tadesse Y, Dash A, Jena L, Ranjan P (2019) Thyroid disorder analysis using random forest classifier Intelligent and Cloud Computing. Springer, Singapore, pp 385–390
Kindervag J, Balaouras S, Hill B, Mak K (2012) Control and protect sensitive information in the era of big data. Academic Press
Leszczynski A (2015) Spatial big data and anxieties of control. Environ Plann D Soc Space 33:965–984. https://doi.org/10.1177/0263775815595814
Mahmood T, Afzal U (2020) Big data analytics architecture for security intelligence. In: Proceedings of the 11th international conference on security of information and networks, pp 129–134. https://doi.org/10.1109/NCIA.2013.6725337
OWASP (2014) OWASP Internet of Things top ten project. Retrieved August 05, 2014, from https://www.owasp.org/index.php/ OWASP_Internet of_Things_Top_Ten_Project. Accessed 15 Apr 2020
Perera C (2013) Context aware computing for the Internet of Things: a survey. IEEE Comm Surveys & Tutorials 16:414–454
Popa R, Redfield C (2011) Cryptdb: protecting confidentiality with encrypted query processing. In: Proceedings of the …, pp 85–100. https://doi.org/10.1145/2043556.2043566
Strang K, Sun Z (2017) Big data paradigm: what is the status of privacy and security? Ann Data Science (Springer) 4:1–17
Sun Z, Strang K, Pambel F (2018) Privacy and security in the big data paradigm. J Comput Information Syst 60:146–155. https://doi.org/10.1080/08874417.2017.1418631
Sun Z, Sun L, Strang K (2016) Big data analytics services for enhancing business intelligence. J Comput Information Syst 58:162–169. https://doi.org/10.1080/08874417.2016.1220239
Swoyer S (2016) It’s official: metadata management is a strategic problem. Transforming data with intelligence [online] Transforming data with intelligence. Available at: https://tdwi.org/articles/2016/11/02/metadata-management-is-a-strategic-problem.aspx. Accessed 11 June 2020
Tarekegn G, Munaye Y (2016) Big data: security issues, challenges and future scope. Int J Res Stud Comput Sci Eng. https://doi.org/10.20431/2349-4859.0303001
Van Dijk M, Gentry C, Halevi S, Vaikuntanathan V (2010) Fully homomorphic encryption over the integers. In: Advances in cryptology–EUROCRYPT ’10, pp 24–43. https://doi.org/10.1007/978-3-642-13190-5_2
Venkatraman S, Venkatraman R (2019) Big data security challenges and strategies. AIMS Math 4:860–879. https://doi.org/10.3934/math.2019.3.860
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Samuel, S., Rajadorai, K.P., Hameed, V.A. (2021). Big Data-Driven Privacy and Security Issues and Challenges. In: Das, P.K., Tripathy, H.K., Mohd Yusof, S.A. (eds) Privacy and Security Issues in Big Data. Services and Business Process Reengineering. Springer, Singapore. https://doi.org/10.1007/978-981-16-1007-3_2
Download citation
DOI: https://doi.org/10.1007/978-981-16-1007-3_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-1006-6
Online ISBN: 978-981-16-1007-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)