Skip to main content

Security and Privacy Challenges in Big Data

  • Conference paper
  • First Online:
Proceedings of Third Doctoral Symposium on Computational Intelligence

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 479))

Abstract

Huge amounts of data are being generated on a regular basis as a result of technological advancements such as social media, smart phones, GPS signals, and sensors. Different types of data, such as structured, semi-structured, and unstructured data, are represented in the datasets. Big data is a word that refers to data that has been collected from many sources and in various volumes. Big data encompasses the vast majority of data generated nowadays. Due to the unstructured form of data, there are a number of concerns with this type of data, including data processing, security, and privacy. This paper will look at some of the characteristics of big data as well as the security concerns it faces. This paper also contains a comprehensive review of the literature on security measures and a comparison of different strategies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. A framework for five big V’s of big data and organizational culture in firms. In: 2018 IEEE international conference on big data (Big Data)

    Google Scholar 

  2. Bhosale HS, Gadekar DP (2014) A review paper on big data and Hadoop. Int J Sci Res Publ 4(10). ISSN 2250-3153

    Google Scholar 

  3. Patel J (2019) An effective and scalable data modeling for enterprise big data platform. In: IEEE international conference on big data (big data)

    Google Scholar 

  4. Ju XH, Fei W, Mei WF, Zhen WX (2017) Some key problems of data management in army data engineering based on big data. In: 2017 IEEE 2nd international conference on big data analysis. 978-1-5090-3619

    Google Scholar 

  5. (2018) Big data and its challenges: a review. In: 2018 4th international conference on computing sciences. IEEE. 978-1-5386-8025-4

    Google Scholar 

  6. Jin H, Luo Y, Li P, Mathew J (2019) A review of secure and privacy-preserving medical data sharing. IEEE Access

    Google Scholar 

  7. LeFevre K Mondrian multidimensional K-anonymity. In: Proceedings of the 22nd international conference on data engineering (ICDE’06). IEEE. 8-7695-2570-9/06

    Google Scholar 

  8. Bayardo RJ (2005) Data privacy through optimal k-anonymization. In: Proceedings of the 21st international conference on data engineering (ICDE 2005)

    Google Scholar 

  9. Wang W (2016) On the relation between identifiability, differential privacy and mutual-information privacy. IEEE Trans Inform Theor. IEEE. https://doi.org/10.1109/TIT.2016.2584610, ISSN 0018-9448

  10. Sei Y Anonymization of sensitive quasi-identifiers for l-diversity and t-closeness. IEEE Trans Depend Sec Comput. ISSN 1545-5971. https://doi.org/10.1109/TDSC.2017.2698472

  11. Begum SH A comparative analysis of differential privacy vs other privacy mechanisms for big data. In: Proceedings of the second international conference on inventive systems and control (ICISC 2018). IEEE Xplore Compliant - Part Number: CFP18J06-ART, ISBN 978-1-5386-0807-4

    Google Scholar 

  12. Nandimath J Big data analysis using Apache Hadoop. In: IEEE IRI 2013, San Francisco, California, USA. 978-1-4799-1050-2/13/2013 IEEE

    Google Scholar 

  13. Vonitsanos G, Dritsas E, Kanavos A, Mylonas P, Sioutas S (2020) Security and privacy solutions associated with NoSQL data stores. In: 15th international workshop on semantic and social media adaptation and personalization

    Google Scholar 

  14. (2020) Comparative survey on big data security applications, a blink on interactive security mechanism in Apache Ozone. In: Global conference on wireless and optical technologies (GCWOT)

    Google Scholar 

  15. Yu S Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access. ACCESS.2016.2577036

    Google Scholar 

  16. Rao RM (2018) Privacy preservation techniques in big data analytics: a survey. J Big Data. Springer Open Access

    Google Scholar 

  17. Tabrizchi H, Rafsanjani K (2020) A survey on security challenges in cloud computing: issues, threats, and solutions. J Supercomput. https://doi.org/10.1007/s11227-020-03213-1, Springer Science and Business Media, LLC, part of Springer Nature 2020

  18. Rathod S (2018) Attribute-based encryption along with data performance and security on cloud storage. In: International conference on information, communication, engineering and technology (ICICET)

    Google Scholar 

  19. Zhang L Outsourcing attributed-based ranked searchable encryption with revocation for cloud storage. IEEE Access. Digital Object Identifier https://doi.org/10.1109/ACCESS.2020.3000049

  20. Suganya S (2018) Hadoop distributed file system security—a review. In: IEEE international conference on current trends toward converging technologies, Coimbatore, India

    Google Scholar 

  21. Chitturi AK (2020) Exploration of various cloud security challenges and threats. In: Soft computing for problem solving, advances in intelligent systems and computing. Springer Nature. https://doi.org/10.1007/978-981-15-0184-5_76 Springer Nature 2020

  22. Zhang Z, Xue-Feng J An identification based authentication scheme in cloud computing. In: International conference on industrial control and electronics engineering. IEEE Computer Society. 978-0-7695-4792-3/12

    Google Scholar 

  23. Yohanes BW, Gunawan T, Handoko Multiparty zero-knowledge protocol for user authentication on Android

    Google Scholar 

  24. Bhrinda M Confidentiality, integrity and authentication of DICOM medical images. In: Systems and control (ICISC 2018). IEEE Xplore Compliant - Part Number:CFP18J06-ART, ISBN 978-1-5386-0807-4; DVD Part Number: CFP18J06DVD, ISBN 9781538608067

    Google Scholar 

  25. Vergnaud D (2020) Comment on “Efficient and secure outsourcing scheme for RSA decryption in Internet of Things”. IEEE. ISSN 2327-4662 (c) 2020

    Google Scholar 

  26. Shen J, Zhou T, He D, Zhang Y, Sun X, Xiang Y Block design-based key agreement for group data sharing in cloud computing. IEEE Trans Depend Sec Comput. https://doi.org/10.1109/TDSC.2017.2725953

  27. Critical security issues in cloud computing: a survey. In: IEEE international conference on big data security on cloud. IEEE Computer Society. 978-1-5386-4399-0/18

    Google Scholar 

  28. Cloud threat defense—a threat protection and security compliance solution. In: IEEE international conference on cloud computing in emerging markets (CCEM). 978-1-5386-9441-1/18

    Google Scholar 

  29. Data access security in cloud computing: a review. In: International conference on computing, power and communication technologies (GUCON). 978-1-5386-4491-1/18

    Google Scholar 

  30. Security requirements for cloud-based C4I security architecture. In: International conference on platform technology and service (PlatCon). 978-1-7281-1288-6/19

    Google Scholar 

  31. (2018) Comparative analysis of GFS and HDFS: technology and architectural landscape. In: 10th international conference on computational intelligence and communication networks. IEEE. 978-1-5386-2578-1/18

    Google Scholar 

  32. (2016) MongoDB NoSQL injection analysis and detection. In: 2016 IEEE 3rd international conference on cyber security and cloud computing. IEEE. 978-1-5090-0946-6, https://doi.org/10.1109/CSCloud.2016.57

  33. Kumar J (2017) Security analysis of unstructured data in NOSQL MongoDB database. In: International conference on computing and communication technologies for smart nation (IC3TSN). IEEE. 978-1-5386-0627-8

    Google Scholar 

  34. Kumar PP (2017) An efficient ciphertext policy-attribute based encryption for big data access control in cloud computing. In: Ninth international conference on advanced computing (ICoAC)

    Google Scholar 

  35. Jujare VA Cloud computing: approach, structure and security. In: International conference on computing methodologies and communication. 978-1-5386-3452-3/18

    Google Scholar 

  36. Rukavitsyn AN, Borisenko KA. Holod II, Shorov AV (2017) The method of ensuring confidentiality and integrity data in cloud computing. 978-1-5386-1810-3

    Google Scholar 

  37. (2014) Big data: moving forward with emerging technology and challenges. Int J Adv Res Comput Sci Manage Stud 2(9). ISSN 232 7782 1 (Online), September 2014

    Google Scholar 

  38. Saxena S Protecting data storage on cloud to enhance security level and processing of the data by using Hadoop. 978-1-5386-5367-8/18/2018 IEEE

    Google Scholar 

  39. Kumar PR, Raj PH, Jelcianaca P (2018) Exploring data security issues and solutions in cloud computing. Procedia Comput Sci 125:691–697. In: ICSCC 2017, Science Direct, Elsevier

    Google Scholar 

  40. Khalil IM (2014) Cloud computing security: a survey. ISSN 2073-431X, https://doi.org/10.3390/computers3010001, Open Access

  41. Hao G (2017) Research on privacy preserving method based on T-closeness model. In: International conference on computer and communications. IEEE. 978-1-5090-6352-9/17

    Google Scholar 

  42. Geetha P (2020) K-anonymization based temporal attack risk detection using machine learning paradigms. J Circ Syst Comput. https://doi.org/10.1142/S021812662150050X

  43. Mohit P (2017) Confidentiality and storage of data in cloud environment. In: 5th international conference on frontiers in intelligent computing: theory and applications, advances in intelligent systems. Springer Nature Singapore

    Google Scholar 

  44. Meinig M (2019) Holistic strategy-based threat model for organizations. In: 10th international conference on ambient systems, networks and technologies (ANT), Leuven, Belgium. Procedia Comput Sci 151:100–107. Science Direct, Elsevier

    Google Scholar 

  45. Joshi M (2018) Attribute based encryption for secure access to cloud based EHR systems. IEEE, IEEE Comput Soc. ISSN 2159-6190

    Google Scholar 

  46. Subramanian N (2018) Recent security challenges in cloud computing. Comput Electr Eng 71:28–42

    Google Scholar 

  47. Chen M, Mao S, Li Y Big data: a survey, pp 171–209. https://doi.org/10.1007/s11036-013-0489-0

  48. Research and design of multi dimension protection system for data security in cloud computing environment. In: International conference on computer technology, electronics and communication (ICCTEC). 978-1-5386-5784-3/17

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bhawna Wadhwa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wadhwa, B., Tomar, P. (2023). Security and Privacy Challenges in Big Data. In: Khanna, A., Gupta, D., Kansal, V., Fortino, G., Hassanien, A.E. (eds) Proceedings of Third Doctoral Symposium on Computational Intelligence . Lecture Notes in Networks and Systems, vol 479. Springer, Singapore. https://doi.org/10.1007/978-981-19-3148-2_70

Download citation

Publish with us

Policies and ethics