Abstract
Security of Big Data is a huge concern. In a broad sense, Big Data contains two types of data: structured and unstructured. Providing security to unstructured data is more difficult than providing security to structured data. In this paper, we have developed an approach to provide adequate security to unstructured data by considering types of data and their sensitivity levels. We have reviewed the different analytics methods of Big Data to build nodes of different types of data. Each type of data has been classified to provide adequate security and enhance the overhead of the security system. To provide security to a data node, and a security suite has been designed by incorporating different security algorithms. Those security algorithms collectively form a security suite which has been interfaced with the data node. Information on data sensitivity has been collected through a survey. We have shown through several experiments on multiple computer systems with varied configurations that data classification with respect to sensitivity levels enhances the performance of the system. The experimental results show how and in what amount the designed security suite reduces overhead and increases security simultaneously.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
Wu Xindong., Zhu Xingqua., Wu Gong-Qin., Ding Wei. : Data mining with big data. IEEE Transactions on Knowledge and Data Engineering. 26(1), 97–107 (2014)
Grolinger Katarina., Higashino Wilson A., Tiwari Abhinav., Capretz Miriam AM.: Data management in cloud environments: NoSQL and NewSQL data stores. Journal of Cloud Computing. 2(22), 1–24 (2013)
Rivest, Ronald Linn.: MIT Computer Science and Artificial Intelligence Laboratory Web Page, https://people.csail.mit.edu/rivest/pubs/Riv98e.pdf, 5 October 2015
Alanazi Hamda., Zaidan B.B., Zaidan A.A., Jalab Hamid.A., Shabbir M., Al-Nabhani Yahya.: New Comparative Study Between DES, 3DES and AES within Nine Factors. Journal of Computing. 2(3), 152–157 (2010)
Wikipedia Homepage, https://en.wikipedia.org/wiki/Data_integrity, 2 October 2015
Merkle Ralph C.: A fast software one-way hash function. Journal of Cryptology. 3(1), 43–58 (1990)
Mendel, Floria., Rijmen, Vincent.: Cryptanalysis of the Tiger Hash Function. Advances in Cryptology - ASIACRYPT 2007. Springer Berlin Heidelberg, 2007
Dai, Wei.: Cryptopp.com Homepage, http://www.cryptopp.com/benchmarks.html, 2 October 2015
Oracle Homepage, http://docs.oracle.com/cd/E39820_01/doc.11121/gateway_docs/content/encryption_encrypt_settings.html, 2 October 2015
Wikipedia Homepage, https://en.wikipedia.org/wiki/XML_Signature, 2 October 2015
Eastlake, Donald E., Reagle, Joseph M., Solo, David.: World Wide Web Consortium Homepage, http://www.w3.org/TR/xmldsig-core, 2 October 2015
Demchenko, Yuri., Ngo, Canh., Membrey, Peter.: Architecture Framework and Components for the Big Data Ecosystem. System and Network Engineering, Graduate school of Sciences, University of Amsterdam, 2013
Islam Md.Rafiqul. Habiba Mansura.: Data Intensive Dynamic Scheduling Model and Algorithm for Cloud Computing Security, Journal of Computers. 9(8), 1796–1808 (2014)
Tracy, Miles., Jansen, Wayne., Bisker, Scott.: Guidelines on Electronic Mail Security. NIST Special Publication 800-45, 2007
Nordbotten Nils Agne.: XML and Web Services Security Standards. IEEE Communications Surveys & Tutorials. 11(3), 4–21 (2009)
Islam Mohd Rafiqul., Hasan Mohd Toufiq., Ashaduzzaman G. M.: An architecture and a dynamic scheduling algorithm of grid for providing security for real-time data-intensive applications. International Journal of Network Management. 21(5), 402–413 (2011)
Doll, Shelley.: ZDNet Homepage, http://www.zdnet.com/article/xml-security-standards, 2 October 2015
: An Efficient Security System for CABAC Bin-Strings of H264/SVC. IEEE Transactions on Circuits and Systems for Video Technology. 23(3), 425–437 (2013)
Shi, F., Liu, S., Yao, H., Liu, Y., Zhang, S.: Scalable and credible video watermarking towards scalable video coding. Springer, 2010
Bhowmik, Deepayan.: White Horse eTheses Homepage, http://etheses.whiterose.ac.uk/1526/3/Bhowmik,_Deepayan.pdf, 16 September 2015
Stutz Thomas., Uhl Andreas.: A Survey of H264 AVC/SVC Encryption. IEEE Transactions on Circuits and Systems for Video Technology. 22(3), 325–339 (2012)
Arkko, J., Carrara, E., Lindholm, F., Naslund, M., Norrman, K.: Internet Engineering Task Force Homepage, https://tools.ietf.org/html/rfc3830, 2 October 2015
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Islam, M.E., Islam, M.R. & Shawkat Ali, A.B.M. An Approach to Security for Unstructured Big Data. Rev Socionetwork Strat 10, 105–123 (2016). https://doi.org/10.1007/s12626-016-0067-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12626-016-0067-6