Open Access   Article Go Back

A Novel Approach on Tech Solutions to Mitigate Big Data Security Threats

Suneetha V1 , Sunitha. M2 , Arshiya 3

Section:Survey Paper, Product Type: Journal Paper
Volume-07 , Issue-09 , Page no. 63-68, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si9.6368

Online published on Apr 30, 2019

Copyright © Suneetha V, Sunitha. M, Arshiya . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Suneetha V, Sunitha. M, Arshiya, “A Novel Approach on Tech Solutions to Mitigate Big Data Security Threats,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.09, pp.63-68, 2019.

MLA Style Citation: Suneetha V, Sunitha. M, Arshiya "A Novel Approach on Tech Solutions to Mitigate Big Data Security Threats." International Journal of Computer Sciences and Engineering 07.09 (2019): 63-68.

APA Style Citation: Suneetha V, Sunitha. M, Arshiya, (2019). A Novel Approach on Tech Solutions to Mitigate Big Data Security Threats. International Journal of Computer Sciences and Engineering, 07(09), 63-68.

BibTex Style Citation:
@article{V_2019,
author = {Suneetha V, Sunitha. M, Arshiya},
title = {A Novel Approach on Tech Solutions to Mitigate Big Data Security Threats},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {07},
Issue = {09},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {63-68},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=956},
doi = {https://doi.org/10.26438/ijcse/v7i9.6368}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i9.6368}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=956
TI - A Novel Approach on Tech Solutions to Mitigate Big Data Security Threats
T2 - International Journal of Computer Sciences and Engineering
AU - Suneetha V, Sunitha. M, Arshiya
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 63-68
IS - 09
VL - 07
SN - 2347-2693
ER -

           

Abstract

Big Data is the buzz word today. Numerous projects centering big data are booming. It hides in itself vital information which if unearthed would provide great insights into various areas. The growing need of this data is complicating security. Handling big data projects is a challenging task. To prevent a potentially disastrous data breach, big data security should be considered seriously. To prevent security issues, some simple steps should be implemented. It can be done with best practices and internal controls, like protecting against NoSQL Injection points. These points provide a way for attackers to access Big Data. This paper discusses the various big data security threats and different innovative Tech solutions to meet many of the security concerns hindering the Big Data persistence, analysis and presentation.

Key-Words / Index Term

Big Data, Big data security threats, Data Security, SQL injection, NoSQL injection

References

[1] Ahmed E. Youssef and Manal Alageel, “A Framework for Secure Cloud Computing”, International Journal of Computer Science Issues (IJCSI), Vol. 9, Issue 4, No 3, pp. 478-500, July 2012.
[2] A. Youssef and M. Alageel, “Security Issues in Cloud Computing”, the GSTF International Journal on Computing , Vol.1 No. 3, 2011.
[3] P. Groves, B. Kayyali, D. Knott and S. V. Kuiken, "The `big data` revolution in healthcare," McKinsey &Company, 2013.
[4] P. Institute, "Third Annual Benchmark Study on Patient Privacy and Data Security," Ponemon Institute LLC, 2012..
[5] Shoffner, M. (2012). Handling “hot” health data without getting burned. Presented at the Strata Rx Conference, San Francisco, CA, USA. http://strataconf.com/rx2012/public/schedule/detail/26231..
[6] Katal, A.; Wazid, M.; Goudar, R.H., "Big data: Issues, challenges, tools and Good practices," Contemporary Computing (IC3), 2013 Sixth International Conference on , vol., no., pp.404,409, 8-10 Aug. 2013.
[7] Nambiar, R.; Bhardwaj, R.; Sethi, A.; Vargheese, R., "A look at challenges and opportunities of Big Data analytics in healthcare," Big Data, 2013 IEEE International Conference on , vol., no., pp.17,22, 6-9 Oct. 2013.
[8] Sun, Jimeng, and Chandan K. Reddy. "Big data analytics for healthcare." Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2013.
[9] Smitha Rao, S.N.Suma, M.Sunitha. "Security Solutions for Big Data Analytics in Healthcare",2015 Second International Conference n Advances in Computing and Communication Engineering,2015.
[10] www.whishworks.com
[11] http://blog.sqlauthority.com
[12] www.ibmbigdatahub.com
[13] https://arxiv.org/ftp/arxiv/papers/1506/1506.04082.pdf
[14] “Analysis and Diminution of NoSQL Injection attacks” by Pritesh, Ashwini, Rachana Badekar
[15] https://thesai.org/Downloads/Volume8No11/Paper_78-NoSQL_Racket_A_Testing_Tool.pdf
[16] https://pdfs.semanticscholar.org/9e33/338f42d2d97349063cf24db36a74936f0613.pdf
[17] https://www.synopsys.com/software-integrity/resources/knowledge-database/sql-injection.html
https://www.acunetix.com/websitesecurity/sql-injection/
[17] www.synopsys.com
[18] www.acenutix.com