Skip to main content

Big Data Security Framework Based on Encryption

  • Conference paper
  • First Online:
Book cover Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11065))

Included in the following conference series:

Abstract

The biggest challenge for big data era from a security point of view is the protection of user’s privacy and data security. Big data analysis is a more complex process, especially if the data is unstructured. We must transfer the unstructured to the structured data if we query the information. Organizations will have to track down what pieces of information in their big data are ddata security and the related technologies for big data security, which includes Key Management for Access Control, Attribute-Based Access Control, Secure Search for Parties Involved, Searchable Encryption and Secure Data Processing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sohal, A.S., Sandhu, R., Sood, S.K., Chang, V.: A Cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput. Secur. 74, 340–351 (2018)

    Article  Google Scholar 

  2. Tankard, C.: Digital Pathways. Big-data-security. Network-Security (2012)

    Google Scholar 

  3. The 2011 IDC digital universe. IDC (2011). www.emc.com/collateral/about/news/idc-emc-digital-universe-2011-infographic.pdf. Accessed 1 June 2012

  4. Big data: the next frontier for innovation, competition and productivity. McKinsey Global Institute (2011). www.mckinsey.com/Insights/MGI/Research/Technology/Innovation/Big-data-The-next-frontier-for-innovation. Accessed 11 June 2012

  5. Softserve Big Data Analytics Report. Softserve (2016). www.softserveinc.com/en-us-newsroom/knowledge-centre/softserve-big-data-analytics-report/. Accessed 11 May 2017

  6. 2016 Global Encryption Trends Study. Thales e-Security/Ponemon Institute. www.thales-esecurity.com/knowl-edge-base/analyst-report-s/global-encryption-trends-study. Accessed 13 May 2017

  7. Big data and infosecurity. Varonis (2012). http://blog.varonis.com/big-datasecurity/. Accessed 11 June 2012

  8. Big data gap. MeriTalk (2012). www.meritalk.com/big-data-gap. Accessed 13 June 2013

  9. Kajeepeta, S.: Strategy: Hadoop and big data. InformationWeek (2012). http://reports.informationweek.com/abstract/81/8670/Business-Intelligence-Information-Management/strategy-Hadoop-big-data.html. Accessed 13 Apr 2014

  10. Tankard, C.: Digital Pathways. Encryption as the cornerstone of big data security. Netw. Secur. (2017)

    Google Scholar 

  11. Lafuente, G.: The big data security challenge. Netw. Secur. 2015, 12–14 (2015)

    Article  Google Scholar 

  12. Anisettia, M., Ardagnaa, C., Bellandia, V., et al.: Privacy-aware big data analytics as a service for public health policies in smart cities. Sustain. Cities Soc. 39, 68–77 (2018)

    Article  Google Scholar 

  13. Custers, B., Dechesne, F., Sears, A.M., Tani, T., van der Hof, S.: A comparison of data protection legislation and policies across the EU. Comput. Law Secur. Rev. Int. J. Technol. Law Pract. (2017). https://doi.org/10.1016/j.clsr.2017.09.001

    Article  Google Scholar 

  14. Mandiant, February 2013. http://intelreport.mandiant.com/Mandiant-APT1-Report.pdf

  15. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, 14–17 May 2000, pp. 44–55. IEEE Computer Society (2000)

    Google Scholar 

Download references

Acknowledgements

This thesis is supported by the national social science foundation and supported by Yunnan Normal University postgraduate research Fund (Project number: 2017067).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shaobing Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wu, S., Wang, C. (2018). Big Data Security Framework Based on Encryption. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00012-7_48

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00011-0

  • Online ISBN: 978-3-030-00012-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics