Survey of Security and Privacy Issues in Big Data Analytics
DOI:
https://doi.org/10.51983/ajcst-2019.8.S1.1972Keywords:
Big data, Hadoop Security, Cloud Security Monitoring Auditing, Key Management AnonymizationAbstract
Due to the reasons such as the rapid growth and spread of network services, mobile devices, and online users on the Internet leading to a remarkable increase in the amount of data. Almost each trade is making an attempt to address this large information. Big data phenomenon has begun to gain importance. However, it’s not solely terribly tough to store massive information and analyses them with ancient applications, however conjointly it’s difficult privacy and security issues. For this reason, this paper discusses the massive information, its scheme, considerations on massive information and presents comparative read of massive information privacy and security approaches in literature in terms of infrastructure, application, and data. By grouping these applications associate overall perspective of security and privacy problems in massive information is usually recommended.
References
S. Marchal, J. Xiuyan, R. State, T. Engel, "A Big Data Architecture for Large Scale Security Monitoring," Big Data (BigData Congress), pp. 56 – 63, Anchorage, AK, 2014.
L. Liu, J. Lin, "Some Special Issues of Network Security Monitoring on Big Data Environments," Dependable, Autonomic and Secure Computing (DASC), pp. 10 – 15, Chengdu, 2013.
A. Gupta, A. Verma, P. Kalra, L. Kumar, "Big Data: A security compliance model," IT in Business, Industry and Government (CSIBIG), pp. 1 – 5, Indore, 2014.
L. Chang Liu, R. Ranjan, Y. Chi, Z. Xuyun, W. Lizhe, C. Jinjun, "MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud," Computers, Vol. 64, No. 9, pp. 2609 – 2622, 2015.
H. Chingfang, Z. Bing, Z. Maoyuan, "A novel group key transfer for big data security," Applied Mathematics and Computation, Vol. 249, pp. 436–443, 2014.
S. Junggab, K. DongHyun, R. Hussain, O. Heekuck, "Conditional proxy re-encryption for secure big data group sharing in cloud environment," Computer Communications Workshops (INFOCOM WKSHPS), pp. 541 – 546, Toronto, ON, 2014.
M.R. Islam, M.E. Islam, "An approach to provide security to unstructured Big Data," Software, Knowledge, Information Management and Applications (SKIMA), Dhaka, pp. 1-5, 2014.
T. Omer, P. Jules, "Big Data for All: Privacy and User Control in the Age of Analytics," Northwestern Journal of Technology and Intellectual Property, Vol. 11, No. 5, 2013.
J. Sedayao, R. Bhardwaj, N. Gorade, "Making Big Data, Privacy, and Anonymization Work Together in the Enterprise: Experiences and Issues," Big Data (BigData Congress), pp. 601 – 607, Anchorage, AK, 2014.
T. Vijey, A. Aiiad, "Big Data Security Issues Based on Quantum Cryptography and Privacy with Authentication for Mobile Data Center," Procedia Computer Science, Vol. 50, pp. 149–156, 2015.
B. Matturdi, X. Zhou, S. Li, F. Lin, "Big Data security and privacy: A review," Big Data, Cloud & Mobile Computing, China Communications vol.11, No. 14, pp. 135 – 145, 2014.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2019 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.