A Review on Big Data: Privacy and Security Challenges

Authors

  • Rohit Kumar Assistant Professor, IT, Institute of Management Studies Noida

Keywords:

big data, Hadoop security, cloud security, monitoring, auditing, key management, anonymization

Abstract

A significant rise in data is being generated due to factors such as the fast expansion and dissemination of the network services, the mobile devices, but also internet users. Almost every business is attempting to deal with the massive amounts of data that are being generated. The concept of big data has starting to gain traction. Traditional apps can't handle huge data because it's hard to store as well as analyse, so it poses serious privacy as well as security concerns. As a result, this article explores the scope of big data and reviews the most recent studies on security as well as privacy issues surrounding it. We'll talk about the problems and the things that impact security. Privacy-preserving methods are also examined and expanded on in this paper.

References

[1] Johns Hopkins, "Big data custodianship in global society", SAIS Review of international Affairs, Volume 34, Number 1, Winter-Spring 2014, pp. 109-116 (Article). https://doi.org/10.1353/sais.2014.0002

[2] C. Philip Chen and C. Zhang, "Data-intensive applications, challenges, techniques and technologies: A survey on Big Data", Information Sciences, vol. 275, 2014, pp. 314-347. https://doi.org/10.1016/j.ins.2014.01.015

[3] D. Terzi, R. Terzi and S. Sagiroglu, "A survey on security and privacy issues in big data", 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), 2015, pp. 202-207.https://doi.org/10.1109/ICITST.2015.7412089

[4] E. Bertino, "Big Data - Security and Privacy", 2015 IEEE International Congress on Big Data,2015, pp. 757-761. https://doi.org/10.1109/BigData.2016.7840581

[5] A. A. Cardenas, P. K. Manadhata, and S. P. Rajan, "Big data analytics for security,"IEEE Security & Privacy, vol. 11, no. 6, pp. 74-76, 2013. https://doi.org/10.1109/MSP.2013.138

[6] D. S. Terzi, R. Terzi, and S. Sagiroglu, "A survey on security and privacy issues in big data," in2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2015, pp. 202-207.

[7] Xinhua Dong, Ruixuan Li_, Heng He, Wanwan Zhou, Zhengyuan Xue, and Hao Wu, "Secure Sensitive Data Sharing on a Big Data Platform", Tsinghua Science and Technology, ISSN ll1007-0214l l08/11l lpp72-80, Volume 20, Number 1, February 2015

[8] I. Hashem, I. Yaqoob, N. Anuar, S. Mokhtar, A. Gani and S. Ullah Khan, "The rise of "big data" on cloud computing: Review and open research issues", Information Systems, vol. 47, 2015, pp. 98-115.

[9] Weichang Kong, Qidi Wu, Li Li and Fei Qiao, "Intelligent Data Analysis and its challenges in big data environment", 2014 IEEE International Conference on System Science and Engineering (ICSSE), 2014, pp. 108-113.

[10] [Online] Challenges and Opportunities with Big Data", Purdue Univesity, 2016[https://www.purdue.edu/discoverypark/cyber/assets/pdfs/BigDataWhite Paper.pdf. [Accessed:12- Jan- 2017].

[11] Z. Azmi, "Opportunities and Security Challenges of Big Data", Current and Emerging Trends in Cyber Operations, 2015, pp. 181-197.

[12] M. Chen, S. Mao and Y. Liu, "Big Data: A Survey", Mobile Networks and Applications, vol. 19, no. 2, 2014, pp. 171-209.https://doi.org/10.1111/bjd.13164

[13] E. Bertino, "Big Data - Security and Privacy", 2015 IEEE International Congress on Big Data,2015, pp. 757-761. https://doi.org/10.1109/BigData.2016.7840581

[14] B. Matturdi, X. Zhou, S. Li, F. Lin, "Big Data security and privacy: A review", Big Data, Cloud & Mobile Computing, China Communications vol.11, issue: 14, pp. 135 - 145, 2014.https://doi.org/10.1109/CC.2014.7085614

[15] P. Adluru, S.S. Datla, Z. Xiaowen, "Hadoop eco system for big data security and privacy", Systems, Applications and Technology Conference (LISAT), Long Island, Farmingdale, NY, pp. 1 - 6, 2015.

[16] S. Marchal, J. Xiuyan, R. State, T. Engel, "A Big Data Architecture for Large Scale Security Monitoring", Big Data (BigData Congress), pp. 56 - 63, Anchorage, AK, 2014.

[17] T. Omer, P. Jules, "Big Data for All: Privacy and User Control in the Age of Analytics", Northwestern Journal of Technology and Intellectual Property, article 1, vol. 11, issue 5, 2013.

[18] A. Kumar, L. HoonJae, R.P. Singh, "Efficient and secure Cloud storage for handling big data", Information Science and Service Science and Data Mining (ISSDM), pp. 162 - 166, Taipei, 2012.

[19] ] T. Vijey, A. Aiiad, "Big Data Security Issues Based on Quantum Cryptography and Privacy with Authentication for Mobile Data Center", Procedia Computer Science, vol. 50, pp. 149-156, 2015.

[20] H. Chingfang, Z. Bing, Z. Maoyuan, "A novel group key transfer for big data security", Applied Mathematics and Computation, vol. 249, pp. 436-443, 2014.https://doi.org/10.1016/j.amc.2014.10.051

Downloads

Published

2022-01-06

How to Cite

[1]
Rohit Kumar 2022. A Review on Big Data: Privacy and Security Challenges. AG Volumes. (Jan. 2022), 43–50.