Abstract
The biggest challenge for big data era from a security point of view is the protection of user’s privacy and data security. Big data analysis is a more complex process, especially if the data is unstructured. We must transfer the unstructured to the structured data if we query the information. Organizations will have to track down what pieces of information in their big data are ddata security and the related technologies for big data security, which includes Key Management for Access Control, Attribute-Based Access Control, Secure Search for Parties Involved, Searchable Encryption and Secure Data Processing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sohal, A.S., Sandhu, R., Sood, S.K., Chang, V.: A Cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput. Secur. 74, 340–351 (2018)
Tankard, C.: Digital Pathways. Big-data-security. Network-Security (2012)
The 2011 IDC digital universe. IDC (2011). www.emc.com/collateral/about/news/idc-emc-digital-universe-2011-infographic.pdf. Accessed 1 June 2012
Big data: the next frontier for innovation, competition and productivity. McKinsey Global Institute (2011). www.mckinsey.com/Insights/MGI/Research/Technology/Innovation/Big-data-The-next-frontier-for-innovation. Accessed 11 June 2012
Softserve Big Data Analytics Report. Softserve (2016). www.softserveinc.com/en-us-newsroom/knowledge-centre/softserve-big-data-analytics-report/. Accessed 11 May 2017
2016 Global Encryption Trends Study. Thales e-Security/Ponemon Institute. www.thales-esecurity.com/knowl-edge-base/analyst-report-s/global-encryption-trends-study. Accessed 13 May 2017
Big data and infosecurity. Varonis (2012). http://blog.varonis.com/big-datasecurity/. Accessed 11 June 2012
Big data gap. MeriTalk (2012). www.meritalk.com/big-data-gap. Accessed 13 June 2013
Kajeepeta, S.: Strategy: Hadoop and big data. InformationWeek (2012). http://reports.informationweek.com/abstract/81/8670/Business-Intelligence-Information-Management/strategy-Hadoop-big-data.html. Accessed 13 Apr 2014
Tankard, C.: Digital Pathways. Encryption as the cornerstone of big data security. Netw. Secur. (2017)
Lafuente, G.: The big data security challenge. Netw. Secur. 2015, 12–14 (2015)
Anisettia, M., Ardagnaa, C., Bellandia, V., et al.: Privacy-aware big data analytics as a service for public health policies in smart cities. Sustain. Cities Soc. 39, 68–77 (2018)
Custers, B., Dechesne, F., Sears, A.M., Tani, T., van der Hof, S.: A comparison of data protection legislation and policies across the EU. Comput. Law Secur. Rev. Int. J. Technol. Law Pract. (2017). https://doi.org/10.1016/j.clsr.2017.09.001
Mandiant, February 2013. http://intelreport.mandiant.com/Mandiant-APT1-Report.pdf
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, 14–17 May 2000, pp. 44–55. IEEE Computer Society (2000)
Acknowledgements
This thesis is supported by the national social science foundation and supported by Yunnan Normal University postgraduate research Fund (Project number: 2017067).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Wu, S., Wang, C. (2018). Big Data Security Framework Based on Encryption. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_48
Download citation
DOI: https://doi.org/10.1007/978-3-030-00012-7_48
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00011-0
Online ISBN: 978-3-030-00012-7
eBook Packages: Computer ScienceComputer Science (R0)