Abstract
Huge amounts of data are being generated on a regular basis as a result of technological advancements such as social media, smart phones, GPS signals, and sensors. Different types of data, such as structured, semi-structured, and unstructured data, are represented in the datasets. Big data is a word that refers to data that has been collected from many sources and in various volumes. Big data encompasses the vast majority of data generated nowadays. Due to the unstructured form of data, there are a number of concerns with this type of data, including data processing, security, and privacy. This paper will look at some of the characteristics of big data as well as the security concerns it faces. This paper also contains a comprehensive review of the literature on security measures and a comparison of different strategies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
A framework for five big V’s of big data and organizational culture in firms. In: 2018 IEEE international conference on big data (Big Data)
Bhosale HS, Gadekar DP (2014) A review paper on big data and Hadoop. Int J Sci Res Publ 4(10). ISSN 2250-3153
Patel J (2019) An effective and scalable data modeling for enterprise big data platform. In: IEEE international conference on big data (big data)
Ju XH, Fei W, Mei WF, Zhen WX (2017) Some key problems of data management in army data engineering based on big data. In: 2017 IEEE 2nd international conference on big data analysis. 978-1-5090-3619
(2018) Big data and its challenges: a review. In: 2018 4th international conference on computing sciences. IEEE. 978-1-5386-8025-4
Jin H, Luo Y, Li P, Mathew J (2019) A review of secure and privacy-preserving medical data sharing. IEEE Access
LeFevre K Mondrian multidimensional K-anonymity. In: Proceedings of the 22nd international conference on data engineering (ICDE’06). IEEE. 8-7695-2570-9/06
Bayardo RJ (2005) Data privacy through optimal k-anonymization. In: Proceedings of the 21st international conference on data engineering (ICDE 2005)
Wang W (2016) On the relation between identifiability, differential privacy and mutual-information privacy. IEEE Trans Inform Theor. IEEE. https://doi.org/10.1109/TIT.2016.2584610, ISSN 0018-9448
Sei Y Anonymization of sensitive quasi-identifiers for l-diversity and t-closeness. IEEE Trans Depend Sec Comput. ISSN 1545-5971. https://doi.org/10.1109/TDSC.2017.2698472
Begum SH A comparative analysis of differential privacy vs other privacy mechanisms for big data. In: Proceedings of the second international conference on inventive systems and control (ICISC 2018). IEEE Xplore Compliant - Part Number: CFP18J06-ART, ISBN 978-1-5386-0807-4
Nandimath J Big data analysis using Apache Hadoop. In: IEEE IRI 2013, San Francisco, California, USA. 978-1-4799-1050-2/13/2013 IEEE
Vonitsanos G, Dritsas E, Kanavos A, Mylonas P, Sioutas S (2020) Security and privacy solutions associated with NoSQL data stores. In: 15th international workshop on semantic and social media adaptation and personalization
(2020) Comparative survey on big data security applications, a blink on interactive security mechanism in Apache Ozone. In: Global conference on wireless and optical technologies (GCWOT)
Yu S Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access. ACCESS.2016.2577036
Rao RM (2018) Privacy preservation techniques in big data analytics: a survey. J Big Data. Springer Open Access
Tabrizchi H, Rafsanjani K (2020) A survey on security challenges in cloud computing: issues, threats, and solutions. J Supercomput. https://doi.org/10.1007/s11227-020-03213-1, Springer Science and Business Media, LLC, part of Springer Nature 2020
Rathod S (2018) Attribute-based encryption along with data performance and security on cloud storage. In: International conference on information, communication, engineering and technology (ICICET)
Zhang L Outsourcing attributed-based ranked searchable encryption with revocation for cloud storage. IEEE Access. Digital Object Identifier https://doi.org/10.1109/ACCESS.2020.3000049
Suganya S (2018) Hadoop distributed file system security—a review. In: IEEE international conference on current trends toward converging technologies, Coimbatore, India
Chitturi AK (2020) Exploration of various cloud security challenges and threats. In: Soft computing for problem solving, advances in intelligent systems and computing. Springer Nature. https://doi.org/10.1007/978-981-15-0184-5_76 Springer Nature 2020
Zhang Z, Xue-Feng J An identification based authentication scheme in cloud computing. In: International conference on industrial control and electronics engineering. IEEE Computer Society. 978-0-7695-4792-3/12
Yohanes BW, Gunawan T, Handoko Multiparty zero-knowledge protocol for user authentication on Android
Bhrinda M Confidentiality, integrity and authentication of DICOM medical images. In: Systems and control (ICISC 2018). IEEE Xplore Compliant - Part Number:CFP18J06-ART, ISBN 978-1-5386-0807-4; DVD Part Number: CFP18J06DVD, ISBN 9781538608067
Vergnaud D (2020) Comment on “Efficient and secure outsourcing scheme for RSA decryption in Internet of Things”. IEEE. ISSN 2327-4662 (c) 2020
Shen J, Zhou T, He D, Zhang Y, Sun X, Xiang Y Block design-based key agreement for group data sharing in cloud computing. IEEE Trans Depend Sec Comput. https://doi.org/10.1109/TDSC.2017.2725953
Critical security issues in cloud computing: a survey. In: IEEE international conference on big data security on cloud. IEEE Computer Society. 978-1-5386-4399-0/18
Cloud threat defense—a threat protection and security compliance solution. In: IEEE international conference on cloud computing in emerging markets (CCEM). 978-1-5386-9441-1/18
Data access security in cloud computing: a review. In: International conference on computing, power and communication technologies (GUCON). 978-1-5386-4491-1/18
Security requirements for cloud-based C4I security architecture. In: International conference on platform technology and service (PlatCon). 978-1-7281-1288-6/19
(2018) Comparative analysis of GFS and HDFS: technology and architectural landscape. In: 10th international conference on computational intelligence and communication networks. IEEE. 978-1-5386-2578-1/18
(2016) MongoDB NoSQL injection analysis and detection. In: 2016 IEEE 3rd international conference on cyber security and cloud computing. IEEE. 978-1-5090-0946-6, https://doi.org/10.1109/CSCloud.2016.57
Kumar J (2017) Security analysis of unstructured data in NOSQL MongoDB database. In: International conference on computing and communication technologies for smart nation (IC3TSN). IEEE. 978-1-5386-0627-8
Kumar PP (2017) An efficient ciphertext policy-attribute based encryption for big data access control in cloud computing. In: Ninth international conference on advanced computing (ICoAC)
Jujare VA Cloud computing: approach, structure and security. In: International conference on computing methodologies and communication. 978-1-5386-3452-3/18
Rukavitsyn AN, Borisenko KA. Holod II, Shorov AV (2017) The method of ensuring confidentiality and integrity data in cloud computing. 978-1-5386-1810-3
(2014) Big data: moving forward with emerging technology and challenges. Int J Adv Res Comput Sci Manage Stud 2(9). ISSN 232 7782 1 (Online), September 2014
Saxena S Protecting data storage on cloud to enhance security level and processing of the data by using Hadoop. 978-1-5386-5367-8/18/2018 IEEE
Kumar PR, Raj PH, Jelcianaca P (2018) Exploring data security issues and solutions in cloud computing. Procedia Comput Sci 125:691–697. In: ICSCC 2017, Science Direct, Elsevier
Khalil IM (2014) Cloud computing security: a survey. ISSN 2073-431X, https://doi.org/10.3390/computers3010001, Open Access
Hao G (2017) Research on privacy preserving method based on T-closeness model. In: International conference on computer and communications. IEEE. 978-1-5090-6352-9/17
Geetha P (2020) K-anonymization based temporal attack risk detection using machine learning paradigms. J Circ Syst Comput. https://doi.org/10.1142/S021812662150050X
Mohit P (2017) Confidentiality and storage of data in cloud environment. In: 5th international conference on frontiers in intelligent computing: theory and applications, advances in intelligent systems. Springer Nature Singapore
Meinig M (2019) Holistic strategy-based threat model for organizations. In: 10th international conference on ambient systems, networks and technologies (ANT), Leuven, Belgium. Procedia Comput Sci 151:100–107. Science Direct, Elsevier
Joshi M (2018) Attribute based encryption for secure access to cloud based EHR systems. IEEE, IEEE Comput Soc. ISSN 2159-6190
Subramanian N (2018) Recent security challenges in cloud computing. Comput Electr Eng 71:28–42
Chen M, Mao S, Li Y Big data: a survey, pp 171–209. https://doi.org/10.1007/s11036-013-0489-0
Research and design of multi dimension protection system for data security in cloud computing environment. In: International conference on computer technology, electronics and communication (ICCTEC). 978-1-5386-5784-3/17
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wadhwa, B., Tomar, P. (2023). Security and Privacy Challenges in Big Data. In: Khanna, A., Gupta, D., Kansal, V., Fortino, G., Hassanien, A.E. (eds) Proceedings of Third Doctoral Symposium on Computational Intelligence . Lecture Notes in Networks and Systems, vol 479. Springer, Singapore. https://doi.org/10.1007/978-981-19-3148-2_70
Download citation
DOI: https://doi.org/10.1007/978-981-19-3148-2_70
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-3147-5
Online ISBN: 978-981-19-3148-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)