Open Access   Article Go Back

Big Data and its Security Issues

B. Duhan1 , D. Singh2

  1. Dept. of Computer Science and Engineering, DCRUST, Murthal, Sonepat, India.
  2. Dept. of Computer Science and Engineering, DCRUST, Murthal, Sonepat, India.

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 828-831, May-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i5.828831

Online published on May 31, 2018

Copyright © B. Duhan, D. Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: B. Duhan, D. Singh, “Big Data and its Security Issues,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.828-831, 2018.

MLA Style Citation: B. Duhan, D. Singh "Big Data and its Security Issues." International Journal of Computer Sciences and Engineering 6.5 (2018): 828-831.

APA Style Citation: B. Duhan, D. Singh, (2018). Big Data and its Security Issues. International Journal of Computer Sciences and Engineering, 6(5), 828-831.

BibTex Style Citation:
@article{Duhan_2018,
author = {B. Duhan, D. Singh},
title = {Big Data and its Security Issues},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {828-831},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2072},
doi = {https://doi.org/10.26438/ijcse/v6i5.828831}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.828831}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2072
TI - Big Data and its Security Issues
T2 - International Journal of Computer Sciences and Engineering
AU - B. Duhan, D. Singh
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 828-831
IS - 5
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
519 244 downloads 212 downloads
  
  
           

Abstract

Big data, as the term implies is a collection of huge amount of data. This can be valuable information to any organization. This huge amount of data requires emerging new technologies and design that makes it easier to take out information. As today world is connected virtually through internet so daily data generated is very high like in the form of zettabytes. As complexity of data has increased, there is a difficulty in managing such data by using traditional computing resources. It’s necessary to secure big data environments from the infringement of confidential data. This paper presents introduction of big data and various security issues in this area.

Key-Words / Index Term

Big data, Security, Privacy

References

[1] https://www.datasciencecentral.com/forum/topics/the-3vs-that-define-big-data
[2] BigDataWorkingGroup, “Expanded Top Ten Big Data Security and Privacy Challenges,” 2013. [Online].Available:https://downloads.cloudsecurityalliance.org/initiatives/bdwg/Expanded_Top_Ten_Big_Data_Security_and_Privacy_Challenges.pdf.
[3] Bertino, E. (2015, June). Big data-security and privacy. In Big Data (BigData Congress), 2015 IEEE International Congress on (pp. 757-761). IEEE.
[4] Katal, A., Wazid, M., &Goudar, R. H. (2013, August). Big data: issues, challenges, tools and good practices. In Contemporary Computing (IC3), 2013 Sixth International Conference on (pp. 404-409). IEEE.
[5] Praveena, M. A., &Bharathi, B. (2017, February). A survey paper on big data analytics. In Information Communication and Embedded Systems (ICICES), 2017 International Conference on (pp. 1-9). IEEE.
[6] Chandra, S., Ray, S., &Goswami, R. T. (2017, January). Big Data Security: Survey on Frameworks and Algorithms. In Advance Computing Conference (IACC), 2017 IEEE 7th International (pp. 48-54). IEEE.
[7] Xu, L., & Shi, W. (2016). Security Theories and Practices for Big Data. In Big Data Concepts, Theories, and Applications(pp. 157-192). Springer, Cham.
[8] Sudarsan, S. D., Jetley, R. P., &Ramaswamy, S. (2015). Security and Privacy of Big Data. In Big Data (pp. 121-136). Springer, New Delhi.
[9] Jeong, Y. S., & Shin, S. S. (2016). An efficient authentication scheme to protect user privacy in seamless big data services. Wireless Personal Communications, 86(1), 7-19.
[10] Yang, K., Han, Q., Li, H., Zheng, K., Su, Z., &Shen, X. (2017). An efficient and fine-grained big data access control scheme with privacy-preserving policy. IEEE Internet of Things Journal, 4(2), 563-571.
[11] Azmi, Z. (2015). Opportunities and Security Challenges of Big Data. In Current and Emerging Trends in Cyber Operations(pp. 181-197). Palgrave Macmillan, London.
[12] Gao, Y., Fu, X., Luo, B., Du, X., &Guizani, M. (2015, December). Haddle: a framework for investigating data leakage attacks in Hadoop. In Global Communications Conference (GLOBECOM), 2015 IEEE (pp. 1-6). IEEE.
[13] "SANS Institute InfoSec Reading Room", Sans.org, 2017. [Online].Available: https://www.sans.org/reading room/whitepapers/dlp/dataloss-prevention-32883.
[14] Jeong, Y. S., & Shin, S. S. (2016). An efficient authentication scheme to protect user privacy in seamless big data services. Wireless Personal Communications, 86(1), 7-19.
[15] Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2015, November). A dynamic key length based approach for real-time security verification of big sensing data stream. In International Conference on Web Information Systems Engineering (pp. 93-108). Springer, Cham.
[16] Liu, C., Ranjan, R., Yang, C., Zhang, X., Wang, L., & Chen, J. (2015). MuR-DPA: Top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Transactions on Computers, 64(9), 2609-2622.
[17] Rahman, F., Ahamed, S. I., Yang, J. J., & Wang, Q. (2013, June). PriGen: A Generic Framework to Preserve Privacy of Healthcare Data in the Cloud. In International Conference on Smart Homes and Health Telematics (pp. 77-85). Springer, Berlin, Heidelberg.
[18] "Types of Network Attacks against Confidentiality, Integrity and Avilability", Omnisecu.com, 2017. [Online].Available:http://www.omnisecu.com/ccna-security/types-of-network attacks.php.