An Improved Security Threat Model for Big Data Life Cycle
DOI:
https://doi.org/10.51983/ajcst-2018.7.1.1834Keywords:
Big Data, Big Data Security, Security Threat Model for Big Data Life cycleAbstract
Big data is a huge amount of data created by individuals related to their medical, internet activity, social networking sites, energy usage communication patterns etc. From these sources, data is being collected and processed by various survey organizations, national statistical agencies, medical centres, and other companies etc. There are many security challenges which occur during data transactions, such as un-authentication, phishing, Vishing, data mining based attacks, etc. From a security point of view the biggest challenge for big data is the protection of user’s privacy. Yazan et.al, have presented big data lifecycle threat model. This paper does a critical review of the work. An Improved Security Threat Model for Big Data Life Cycle has been proposed as a main contribution of the paper. A new phase i.e. data creation phase has been added to the life cycle and it is claimed that the phase is very important one with respect to security and privacy. To justify the claim theoretical and statistical evidences have been provided.
References
L. Ertoz, E. Eilertson, A. Lazarevic, P. Tan, et al., "Detection and Summarization of Novel Network Attacks Using Data Mining," Technical Report, 2003.
B. Muthukumaran, "Cyber crime scenario in India," Criminal Investigations Department Review, pp. 17-23, 2008.
"Nigerian national held for lottery fraud," available at: http://newsaboutfrauds.blogspot.in/2009/05/nigerian-national-held-for-lottery.html?m=0, 2009.
Shri Rajesh Aggarwal, available at: https://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_PoonaAuto_Vs_PNB-22022013.pdf, November 2011.
J. Gantz and D. Reinsel, "The digital universe in 2020: Big data, bigger digital shadows, and biggest growth in the Far East," IDC Analyze the future, pp. 1-16, 2012.
C. Tankard, "Big data security," Network Security, pp. 5-8, 2012.
X. Wu, X. Zhu, Q. Wu Gong, D. Wei, "Big privacy: protecting confidentiality in big data," XRDS: Crossroads, the ACM Magazine for Students, pp. 20-23, 2012.
H. S. Kim, N. Kim, T. Chung, "Attribute relationship evaluation methodology for big data security," IT Convergence and Security (ICITCS), 2013 International Conference on. IEEE, 2013.
T. Alexandru Adrian, "Big data challenges," Database Syst, pp. 31-40, 2013.
A. Katal, M. Wazid, R. H. Goudar, "Big Data: Issues, Challenges, Tools and Good Practices," Contemporary Computing (IC3), 2013 Sixth International Conference on. IEEE, pp. 404-409, 2013.
C. Yadav, S. Wang, M. Kumar, "Algorithm and approaches to handle large Data-A Survey," IJCSN International Journal of Computer Science and Network, 2013.
Tommie Singleton, available at: https://www.aicpa.org/InterestAreas/ForensicAndValuation/Resources/ElectronicDataAnalysis/DownloadableDocuments/Top-5-CyberCrimes.pdf, October 2013.
I. Inukollu et al., "Security issues associated with big data in cloud computing," International Journal of Network Security & Its Applications, pp. 45-55, 2014.
J. Xu, C. J. Wang, Y. Jian, R. Yong, "Information Security in Big Data: Privacy and Data Mining," IEEE, pp. 1149-1176, 2014.
W. Bhaya, M. E. Manaa, "A proactive DDoS attack detection approach using data mining cluster analysis," Journal of Next Generation Information Technology, Vol. 5, No. 4, pp. 36-47, 2014.
N. Khan et al., "Big data: survey, technologies, opportunities, and challenges," The Scientific World Journal, pp. 1-18, 2014.
"12 arrested in vishing case," available at: https://www.scmagazine.com/massive-uptick-in-tax-scam-phishing-emails-records-cost-50-on-the-dark-web/article/648452/, May 2014.
Y. Alshboul, Y. Wang, K. R. Nepali, "Big Data Life Cycle: Threats and Security Model," Americas Conference on Information Systems, pp. 1-7, 2015.
K. Shirudkar, D. Motwani, "Big Data Security," International Journal of Advanced Research in Computer Science and Software Engineering, pp. 1100-1109, 2015.
D. Ben, "Big Data and analytics in higher education: Opportunities and challenges," British Journal of Educational Technology, pp. 904-920, 2015.
H. Özköse, E. S. Arı, C. Gencer, "Yesterday, Today and Tomorrow of Big Data," Procedia- social and Behavioral Sciences, pp. 1042-1050, 2015.
E. Ramirez, "Securing the Big Data Life Cycle," MIT Technology review custom + ORACLE, pp. 1-8, 2015.
"Calling time on telephone fraud," available at: http://www.financial-ombudsman.org.uk/assets/pdf/vishing-insight-report2015.pdf.
"2016: A reflection of the year in cybercrime," available at: http://www.csoonline.com/article/3146807/compliance/2016-a-reflection-of-the-year-in-cybercrime.html.
"Vishing," available at: https://www.techopedia.com/definition/4159/vishing.
Action Fraud, available at: http://www.actionfraud.police.uk/
Cyber Law of India, available at: http://www.cyberlawsindia.net/index.html
Spear phishing, available at: http://searchsecurity.techtarget.com/definition/spear-phishing
Austria’s FACC, hit by cyber fraud, fires CEO, available at: http://www.reuters.com/article/us-facc-ceo-idUSKCN0YG0ZF
Private bank’s manager arrested for phishing scam, available at: http://www.thehindu.com/news/cities/bangalore/Private-bank%E2%80%99s-deputy-manager-arrested-for-phishing-scam/article13996057.ece
Bank Info Security, available at: http://www.bankinfosecurity.in/
Not easy to crack cyber crime, available at: http://www.thehindu.com/news/cities/bangalore/Not-easy-to-crack-cyber-crime/article14006807.ece
Massive uptick in tax scam phishing emails, records cost $50 on the Dark Web, available at: https://www.scmagazine.com/massive-uptick-in-tax-scam-phishing-emails-records-cost-50-on-the-dark-web/article/648452/
Phone banking fraud hits thousands; tricksters deal Rs 12,000-cr blow, available at: http://www.hindustantimes.com/india/phone-banking-fraud-hits-thousands-tricksters-deal-rs-12-000-cr-blow/story-AP7DdpYdoHwX0UADrQnxRM.html
Phishing and vishing cases on the rise in city, available at: http://www.thehindu.com/news/cities/Visakhapatnam/phising-and-vishing-cases-on-the-rise-in-city/article7680053.ece
Cyber crimes on the rise in State, available at: http://www.thehindu.com/todays-paper/tp-national/tp-kerala/cyber-crimes-on-the-rise-in-state/article3068112.ece
Phishing: DG&IGP’s case solved but 57 more wait, available at: http://www.thehindu.com/news/cities/bangalore/phishing-dgigps-case-solved-but-57-more-wait/article7347371.ece
Cabbie falls for phishing call, loses Rs. 65,000, available at: http://www.thehindu.com/news/national/karnataka/cabbie-falls-for-phishing-call-loses-rs-65000/article8386845.ece
Cyber crimes on the rise in State, available at: http://www.thehindu.com/todays-paper/tp-national/tp-kerala/cyber-crimes-on-the-rise-in-state/article3068112.ece
Youth in jail for sending e-mail threat, available at: http://www.thehindu.com/todays-paper/Youth-in-jail-for-sending-e-mail-threat/article14813210.ece
Mumbai: Cyber fraudsters cheat businessman of Rs 17L using duplicate SIM, available at: http://www.hindustantimes.com/mumbai/mumbai-cyber-fraudsters-cheat-bizman-of-rs-17l-using-duplicate-sim/story-ox88HEeD6LAwoC8QOMpRqJ.html
Phone scams: 'A criminal convinced me he was from TalkTalk and stole £13,600, available at: http://www.telegraph.co.uk/money/consumer-affairs/phone-scams-a-criminal-convinced-me-he-was-from-talktalk-and-sto/
Top 5 biggest phishing scams, available at: http://www.theinquirer.net/inquirer/feature/2460065/top-5-biggest-phishing-scams/page/3
Online lottery frauds on the rise, say cops, available at: http://indianexpress.com/article/cities/pune/online-lottery-frauds-on-the-rise-say-cops/
Available at: http://www.jagran.com/bihar/shiekhpura-cyber-crime-15212116.html?src=Search-ART-cyber
Online fraud: Top Nigerian scammer arrested, available at: http://www.bbc.com/new/world-africa-36939751
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2018 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.