DOI QR코드

DOI QR Code

Big Data Key Challenges

  • Alotaibi, Sultan (College of Computer and Information Systems, Umm Al-Qura University)
  • Received : 2022.04.05
  • Published : 2022.04.30

Abstract

The big data term refers to the great volume of data and complicated data structure with difficulties in collecting, storing, processing, and analyzing these data. Big data analytics refers to the operation of disclosing hidden patterns through big data. This information and data set cloud to be useful and provide advanced services. However, analyzing and processing this information could cause revealing and disclosing some sensitive and personal information when the information is contained in applications that are correlated to users such as location-based services, but concerns are diminished if the applications are correlated to general information such as scientific results. In this work, a survey has been done over security and privacy challenges and approaches in big data. The challenges included here are in each of the following areas: privacy, access control, encryption, and authentication in big data. Likewise, the approaches presented here are privacy-preserving approaches in big data, access control approaches in big data, encryption approaches in big data, and authentication approaches in big data.

Keywords

References

  1. Sagiroglu, S., & Sinanc, D. (2013, May). Big data: A review. In 2013 international conference on collaboration technologies and systems (CTS) (pp. 42-47). IEEE.
  2. Jain, P., Gyanchandani, M., Khare, N., Singh, D. P., & Rajesh, L. (2017). A Survey on big data privacy using hadoop architecture. International Journal of Computer Science and Network Security (IJCSNS), 17(2), 148.
  3. Tene, O., & Polonetsky, J. (2012). Big data for all: Privacy and user control in the age of analytics. Nw. J. Tech. & Intell. Prop., 11, xxvii.
  4. Smith, M., Szongott, C., Henne, B., & Von Voigt, G. (2012, June). Big data privacy issues in public social media. In 2012 6th IEEE international conference on digital ecosystems and technologies (DEST) (pp. 1-6). IEEE.
  5. Dong, C., Chen, L., & Wen, Z. (2013, November). When private set intersection meets big data: an efficient and scalable protocol. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (pp. 789-800).
  6. Patil, H. K., & Seshadri, R. (2014, June). Big data security and privacy issues in healthcare. In 2014 IEEE international congress on big data (pp. 762-765). IEEE.
  7. Liu, W., Uluagac, A. S., & Beyah, R. (2014, April). MACA: A privacy-preserving multi-factor cloud authentication system utilizing big data. In 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp. 518-523). IEEE.
  8. Fang, W., Wen, X. Z., Zheng, Y., & Zhou, M. (2017). A survey of big data security and privacy preserving. IETE Technical Review, 34(5), 544-560. https://doi.org/10.1080/02564602.2016.1215269
  9. Bertino, E., Ferrari, E., & Pitoura, E. (2001, April). An access control mechanism for large scale data dissemination systems. In Proceedings Eleventh International Workshop on Research Issues in Data Engineering. Document Management for Data Intensive Business and Scientific Applications. RIDE 2001 (pp. 43-50). IEEE.
  10. Chen, X., & Huang, Q. (2013, May). The data protection of MapReduce using homomorphic encryption. In 2013 IEEE 4th International Conference on Software Engineering and Service Science (pp. 419-421). IEEE.
  11. Raghuwanshi, D. S., & Rajagopalan, M. R. (2014, January). MS2: Practical data privacy and security framework for data at rest in cloud. In 2014 World Congress on Computer Applications and Information Systems (WCCAIS) (pp. 1-8). IEEE.
  12. Son, J., Kim, D., Hussain, R., & Oh, H. (2014, April). Conditional proxy re-encryption for secure big data group sharing in cloud environment. In 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp. 541-546). IEEE.
  13. Chakravorty, A., Wlodarczyk, T., & Rong, C. (2013, May). Privacy preserving data analytics for smart homes. In 2013 IEEE Security and Privacy Workshops (pp. 23-27). IEEE.
  14. Dev, H., Sen, T., Basak, M., & Ali, M. E. (2012, November). An approach to protect the privacy of cloud data from data mining based attacks. In 2012 SC Companion: High Performance Computing, Networking Storage and Analysis (pp. 1106-1115). IEEE.
  15. Ukil, A., Bandyopadhyay, S., Joseph, J., Banahatti, V., & Lodha, S. (2012, August). Negotiation-based privacy preservation scheme in internet of things platform. In Proceedings of the First International Conference on Security of Internet of Things (pp. 75-84).
  16. Huang, X., & Du, X. (2014, April). Achieving big data privacy via hybrid cloud. In 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp. 512-517). IEEE.
  17. Kumar, A., Lee, H., & Singh, R. P. (2012, October). Efficient and secure Cloud storage for handling big data. In 2012 6th International Conference on New Trends in Information Science, Service Science and Data Mining (ISSDM2012) (pp. 162-166). IEEE.
  18. Leontiadis, I., Onen, M., Molva, R., Chorley, M. J., & Colombo, G. B. (2013, September). Privacy preserving similarity detection for data analysis. In 2013 International Conference on Cloud and Green Computing (pp. 547-552). IEEE.
  19. Liu, D., & Wang, S. (2012, October). Query encrypted databases practically. In Proceedings of the 2012 ACM conference on Computer and communications security (pp. 1049-1051).
  20. Dinh, T. T. A., & Datta, A. (2012). Stream on the sky: Outsourcing access control enforcement for stream data to the cloud. arXiv preprint arXiv:1210.0660.
  21. Zhang, X., Liu, C., Nepal, S., Dou, W., & Chen, J. (2012, November). Privacy-preserving layer over MapReduce on cloud. In 2012 Second International Conference on Cloud and Green Computing (pp. 304-310). IEEE.