An Improved Security Threat Model for Big Data Life Cycle

Authors

  • Kanika Research Scholar, Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Uttar Pradesh, India
  • Alka Assistant Professor, Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Uttar Pradesh, India
  • R. A. Khan Professor, Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Uttar Pradesh, India

DOI:

https://doi.org/10.51983/ajcst-2018.7.1.1834

Keywords:

Big Data, Big Data Security, Security Threat Model for Big Data Life cycle

Abstract

Big data is a huge amount of data created by individuals related to their medical, internet activity, social networking sites, energy usage communication patterns etc. From these sources, data is being collected and processed by various survey organizations, national statistical agencies, medical centres, and other companies etc. There are many security challenges which occur during data transactions, such as un-authentication, phishing, Vishing, data mining based attacks, etc. From a security point of view the biggest challenge for big data is the protection of user’s privacy. Yazan et.al, have presented big data lifecycle threat model. This paper does a critical review of the work. An Improved Security Threat Model for Big Data Life Cycle has been proposed as a main contribution of the paper. A new phase i.e. data creation phase has been added to the life cycle and it is claimed that the phase is very important one with respect to security and privacy. To justify the claim theoretical and statistical evidences have been provided.

References

L. Ertoz, E. Eilertson, A. Lazarevic, P. Tan, et al., "Detection and Summarization of Novel Network Attacks Using Data Mining," Technical Report, 2003.

B. Muthukumaran, "Cyber crime scenario in India," Criminal Investigations Department Review, pp. 17-23, 2008.

"Nigerian national held for lottery fraud," available at: http://newsaboutfrauds.blogspot.in/2009/05/nigerian-national-held-for-lottery.html?m=0, 2009.

Shri Rajesh Aggarwal, available at: https://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_PoonaAuto_Vs_PNB-22022013.pdf, November 2011.

J. Gantz and D. Reinsel, "The digital universe in 2020: Big data, bigger digital shadows, and biggest growth in the Far East," IDC Analyze the future, pp. 1-16, 2012.

C. Tankard, "Big data security," Network Security, pp. 5-8, 2012.

X. Wu, X. Zhu, Q. Wu Gong, D. Wei, "Big privacy: protecting confidentiality in big data," XRDS: Crossroads, the ACM Magazine for Students, pp. 20-23, 2012.

H. S. Kim, N. Kim, T. Chung, "Attribute relationship evaluation methodology for big data security," IT Convergence and Security (ICITCS), 2013 International Conference on. IEEE, 2013.

T. Alexandru Adrian, "Big data challenges," Database Syst, pp. 31-40, 2013.

A. Katal, M. Wazid, R. H. Goudar, "Big Data: Issues, Challenges, Tools and Good Practices," Contemporary Computing (IC3), 2013 Sixth International Conference on. IEEE, pp. 404-409, 2013.

C. Yadav, S. Wang, M. Kumar, "Algorithm and approaches to handle large Data-A Survey," IJCSN International Journal of Computer Science and Network, 2013.

Tommie Singleton, available at: https://www.aicpa.org/InterestAreas/ForensicAndValuation/Resources/ElectronicDataAnalysis/DownloadableDocuments/Top-5-CyberCrimes.pdf, October 2013.

I. Inukollu et al., "Security issues associated with big data in cloud computing," International Journal of Network Security & Its Applications, pp. 45-55, 2014.

J. Xu, C. J. Wang, Y. Jian, R. Yong, "Information Security in Big Data: Privacy and Data Mining," IEEE, pp. 1149-1176, 2014.

W. Bhaya, M. E. Manaa, "A proactive DDoS attack detection approach using data mining cluster analysis," Journal of Next Generation Information Technology, Vol. 5, No. 4, pp. 36-47, 2014.

N. Khan et al., "Big data: survey, technologies, opportunities, and challenges," The Scientific World Journal, pp. 1-18, 2014.

"12 arrested in vishing case," available at: https://www.scmagazine.com/massive-uptick-in-tax-scam-phishing-emails-records-cost-50-on-the-dark-web/article/648452/, May 2014.

Y. Alshboul, Y. Wang, K. R. Nepali, "Big Data Life Cycle: Threats and Security Model," Americas Conference on Information Systems, pp. 1-7, 2015.

K. Shirudkar, D. Motwani, "Big Data Security," International Journal of Advanced Research in Computer Science and Software Engineering, pp. 1100-1109, 2015.

D. Ben, "Big Data and analytics in higher education: Opportunities and challenges," British Journal of Educational Technology, pp. 904-920, 2015.

H. Özköse, E. S. Arı, C. Gencer, "Yesterday, Today and Tomorrow of Big Data," Procedia- social and Behavioral Sciences, pp. 1042-1050, 2015.

E. Ramirez, "Securing the Big Data Life Cycle," MIT Technology review custom + ORACLE, pp. 1-8, 2015.

"Calling time on telephone fraud," available at: http://www.financial-ombudsman.org.uk/assets/pdf/vishing-insight-report2015.pdf.

"2016: A reflection of the year in cybercrime," available at: http://www.csoonline.com/article/3146807/compliance/2016-a-reflection-of-the-year-in-cybercrime.html.

"Vishing," available at: https://www.techopedia.com/definition/4159/vishing.

Action Fraud, available at: http://www.actionfraud.police.uk/

Cyber Law of India, available at: http://www.cyberlawsindia.net/index.html

Spear phishing, available at: http://searchsecurity.techtarget.com/definition/spear-phishing

Austria’s FACC, hit by cyber fraud, fires CEO, available at: http://www.reuters.com/article/us-facc-ceo-idUSKCN0YG0ZF

Private bank’s manager arrested for phishing scam, available at: http://www.thehindu.com/news/cities/bangalore/Private-bank%E2%80%99s-deputy-manager-arrested-for-phishing-scam/article13996057.ece

Bank Info Security, available at: http://www.bankinfosecurity.in/

Not easy to crack cyber crime, available at: http://www.thehindu.com/news/cities/bangalore/Not-easy-to-crack-cyber-crime/article14006807.ece

Massive uptick in tax scam phishing emails, records cost $50 on the Dark Web, available at: https://www.scmagazine.com/massive-uptick-in-tax-scam-phishing-emails-records-cost-50-on-the-dark-web/article/648452/

Phone banking fraud hits thousands; tricksters deal Rs 12,000-cr blow, available at: http://www.hindustantimes.com/india/phone-banking-fraud-hits-thousands-tricksters-deal-rs-12-000-cr-blow/story-AP7DdpYdoHwX0UADrQnxRM.html

Phishing and vishing cases on the rise in city, available at: http://www.thehindu.com/news/cities/Visakhapatnam/phising-and-vishing-cases-on-the-rise-in-city/article7680053.ece

Cyber crimes on the rise in State, available at: http://www.thehindu.com/todays-paper/tp-national/tp-kerala/cyber-crimes-on-the-rise-in-state/article3068112.ece

Phishing: DG&IGP’s case solved but 57 more wait, available at: http://www.thehindu.com/news/cities/bangalore/phishing-dgigps-case-solved-but-57-more-wait/article7347371.ece

Cabbie falls for phishing call, loses Rs. 65,000, available at: http://www.thehindu.com/news/national/karnataka/cabbie-falls-for-phishing-call-loses-rs-65000/article8386845.ece

Cyber crimes on the rise in State, available at: http://www.thehindu.com/todays-paper/tp-national/tp-kerala/cyber-crimes-on-the-rise-in-state/article3068112.ece

Youth in jail for sending e-mail threat, available at: http://www.thehindu.com/todays-paper/Youth-in-jail-for-sending-e-mail-threat/article14813210.ece

Mumbai: Cyber fraudsters cheat businessman of Rs 17L using duplicate SIM, available at: http://www.hindustantimes.com/mumbai/mumbai-cyber-fraudsters-cheat-bizman-of-rs-17l-using-duplicate-sim/story-ox88HEeD6LAwoC8QOMpRqJ.html

Phone scams: 'A criminal convinced me he was from TalkTalk and stole £13,600, available at: http://www.telegraph.co.uk/money/consumer-affairs/phone-scams-a-criminal-convinced-me-he-was-from-talktalk-and-sto/

Top 5 biggest phishing scams, available at: http://www.theinquirer.net/inquirer/feature/2460065/top-5-biggest-phishing-scams/page/3

Online lottery frauds on the rise, say cops, available at: http://indianexpress.com/article/cities/pune/online-lottery-frauds-on-the-rise-say-cops/

Available at: http://www.jagran.com/bihar/shiekhpura-cyber-crime-15212116.html?src=Search-ART-cyber

Online fraud: Top Nigerian scammer arrested, available at: http://www.bbc.com/new/world-africa-36939751

Downloads

Published

08-02-2018

How to Cite

Kanika, Alka, & Khan, R. A. (2018). An Improved Security Threat Model for Big Data Life Cycle. Asian Journal of Computer Science and Technology, 7(1), 33–39. https://doi.org/10.51983/ajcst-2018.7.1.1834