Skip to main content

Survey on Big Data Security Framework

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 731))

Abstract

Big Data are large data sets that are either structured/unstructured collection of various data formats. These repositories are mined for information extraction and decision-making. The data being sensitive draws unauthorized access, prompting to secure each and every vulnerable access points. Security in Big Data is one of the interesting areas that are being researched.

This Paper covers an overall framework for the big data security including Data Classification, Authentication, Authorization, Crypto Methods, Logging and Monitoring. Major security concerns appear on the Application level, Network level, Classification level and Analytics level.

The breach of security results in sensitive data loss, threats on data misuse and even loss of money for customers. The aim of this paper is to provide a detailed survey on the researches undertaken on the ‘Big Data Security Framework’ area for the past few years through various publications. It also analyses the open problems still existing despite consistent exploration and probable future directions to probe other security options.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. URL http://techspective.net/2015/04/27/big-data-analytics-leads-the-way-for-next-gen-malware-protection/ (Analysis on the Malware with the Big Data)

  2. https://www.researchgate.net/publication/300413833_A_survey_on_security_and_privacy_issues_in_big_data (Security and Private Issues are Discussed)

  3. http://image.slidesharecdn.com/bigdata-160318183327/95/big-data-14-638.jpg?cb=1458326157 (Security Issues in Big Data discussed in the above link)

  4. Ouda, A.: A framework for next generation user authentication. In: 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), 15–16 March 2016

    Google Scholar 

  5. Trole, A.A.: Big data challenges. Database Syst. J. IV(3), 31–40 (2013)

    Google Scholar 

  6. Cuzzocrea, A.: Privacy and security of big data:current challenges and future research perspectives. Shanghai, China, 07 November 2014

    Google Scholar 

  7. Ibrahim, A., Ouda, A.: Innovative data authentication model. In: 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pp. 13–15, October 2016

    Google Scholar 

  8. Samuel, A., Sarfraz, M.I., Haseeb, H., Basalamah, S., Ghafoor, A.: A framework for composition and enforcement of privacy-aware and context-driven authorization mechanism for multimedia big data. IEEE Trans. Multimedia 17(9), 1484–1494 (2015)

    Article  Google Scholar 

  9. Deng, B., Denman, S., Zachariadis, V., Issue, Y.J.: Estimating traffic delays and network speeds from low - frequency GPS taxis traces for urban transport modelling. EJTIR 15(4), 639–661 (2015)

    Google Scholar 

  10. Liu, C., Chen, J., Yang, L.T., Zhang, X., Yang, C., Ranjan, R., Kotagiri, R.: Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates. IEEE Trans. Paral. Distrib. Syst. 25(9), 2234–2244 (2014)

    Article  Google Scholar 

  11. Xiao, C., Wang, L., Jie1, Z., Chen, T.: A multi-level intelligent selective encryption control model for multimedia big data security in sensing system with resource constraints. In: 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing

    Google Scholar 

  12. Gonçalves, D., Bota2, J., Correia1, M.: Big data analytics for detecting host misbehavior in large logs, pp. 25–27, June 2016

    Google Scholar 

  13. Singh, D., Vishnu, C., Mohan, C.K.: Visual big data analytics for traffic monitoring in smart city. In: 2016 15th IEEE International Conference Machine Learning and Applications (ICMLA), pp. 18–20, December 2016

    Google Scholar 

  14. Ye, F., Qian, Y., Hu, R.Q.: An Identity-based security scheme for a big data driven cloud computing framework in smart grid. In: 2015 IEEE Global Communications Conference (GLOBECOM), pp. 6–10, December 2015

    Google Scholar 

  15. Geethakumari, G., Srivastava, A.: Big data analysis for implementation of enterprise data security. Int. J. Comput. Sci. Inf. Technol. Secur. (IJCSITS) 2(4), 742–746 (2012)

    Google Scholar 

  16. Cavallaro, G., Riedel, M., Richerzhagen, M., Benediktsson, J.A., Plaza, A.: On understanding big data impacts in remotely sensed image classification using support vector machine methods. IEEE J. Sel. Topics Appl. Earth Obser. 8(10), 4634–4646 (2015)

    Article  Google Scholar 

  17. Bordogna, G., Cuzzocrea, A.: Clustering geo-tagged the paperets for advanced big data analytics. In: 2016 IEEE International Congress Big Data (BigData Congress), 27 June–2 July 2016

    Google Scholar 

  18. Raja, H., Bajwa, W.U.: Cloud K-SVD: a collaborative dictionary learning algorithm for big, distributed data. IEEE Trans. Sig. Process. 64(1), 173–188 (2016)

    Article  Google Scholar 

  19. Raja, H., Bajwa, W.U.: Paper information: cloud K-SVD: a collaborative dictionary learning algorithm for big, distributed data. IEEE Trans. Sig. Process. 63(2) (2016)

    Google Scholar 

  20. Triguero, I., Galar, M., Merino, D., Maillo, J., Bustince, H., Herrera, F.: Evolutionary undersampling for extremely imbalanced big data classification under apache spark. In: 2016 IEEE Congress Evolutionary Computation (CEC), 24–29 July 2016

    Google Scholar 

  21. Abdullah, A., Othman, M., Sulaiman, M.N., Ibrahim, H., Othman, A.: Data discovery algorithm for scientific data grid environment. J. Parallel Distrib. Comput. Spec. Issue Des. Perfor. Netw. Super Clust. Grid-Comput. Part II 65(11), 1429–1434 (2005)

    Google Scholar 

  22. Wu, J., Ota, K., Dong, M., Li, J., Wang, H.: Big data analysis-based security situational awareness for smart grid. IEEE Trans. Big Data PP(99) (2016)

    Google Scholar 

  23. Yang, J., Liu, Z., Jia, C.: New data publishing framework in the big data environments. In: 2014 Ninth International Conference P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp. 8–10, November 2014

    Google Scholar 

  24. Sekar, K., Padmavathamma, M.: Comparative study of encryption algorithm over big data in cloud systems. In: 2016 3rd International Conference Computing for Sustainable Global Development (INDIACom), 16 – 18 March 2016

    Google Scholar 

  25. Gai1, K., Qiu, M., Zhao, H., Xiong, J.: Privacy-aware adaptive data encryption strategy of big data in cloud computing. In: 2016 IEEE 3rd International Conference Cyber Security and Cloud Computing (CSCloud), 25–27 June 2016

    Google Scholar 

  26. Yim, K.S.: Evaluation metrics of service-level reliability monitoring rules of a big data service. In: 2016 IEEE 27th International Symposium Software Reliability Engineering (ISSRE), 23–27 October 2016

    Google Scholar 

  27. Slavakis, K., Giannakis, G.B.: Online dictionary learning from big data using accelerated stochastic approximation algorithms. In: 2014 IEEE International Conference Acoustics, Speech and Signal Processing (ICASSP), 4–9 May 2014

    Google Scholar 

  28. Xu, L., Jiang, C., Ren, Y.: Information security in big data: privacy and data mining. IT Prof. 17(3), 1149–1176 (2015)

    Google Scholar 

  29. Ulfarsson, M.O., Palsson, F., Sigurdsson, J., Sveinsson, J.R.: Classification of big data with application to imaging genetics. Proc. IEEE 104(11), 2137–2154 (2016)

    Article  Google Scholar 

  30. Schmidt, M., Finze, R., Reutter, D., Menth, M.: Demo: resilient integration of distributed high-performance zones into the BelWue network using openflow. In: 2016 28th International Teletraffic Congress (ITC 28), 12–16 September 2016

    Google Scholar 

  31. Hinkka, M., Lehto, T., Heljanko, K.: Assessing big data SQL frameworks for analyzing event logs. In: 2016 24th Euromicro International Conference Parallel, Distributed, and Network-Based Processing (PDP), 17–19 February 2016

    Google Scholar 

  32. Cheung, M., Jie, Z.: Connection discovery using big data of user-shared images in social media. IEEE Trans. Multimedia 17(9), 1417–1428 (2015)

    Article  Google Scholar 

  33. Jhaveri, M., Jaheveri, D.: Big data authentication and authorization using SRP protocol. Int. J. Comput. Appl. 130(1), 26–29 (2015)

    Google Scholar 

  34. Lemoudden, M., El Ouahidi, B.: Managing cloud-generated logs using big data technologies. In: 2015 International Conference Wireless Networks and Mobile Communications (WINCOM), pp. 20–23, October 2015

    Google Scholar 

  35. Prakashbhai, P.A., Pandey, H.M.: Inference patterns from big data using aggregation, filtering and tagging- a survey. In: 2014 5th International Conference Confluence The Next Generation Information Technology Summit (Confluence), 25–26 September 2014

    Google Scholar 

  36. Koturwar, P., Girase, S., Mukhopadhyay, D.: A survey of classification techniques in the area of big data. IJIRT 2(10) (2014)

    Google Scholar 

  37. School of Traffic and Transportation Engineering, Changsha University of Science & Technology: Design of elevator monitoring platform on big data. In: 2016 International Conference Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII), 3–4 December 2016

    Google Scholar 

  38. Suthaharan, S.: Big data classification: problems and challenges in network intrusion prediction with machine learning. ACM SIGMETRICS Perform. Eval. Rev. 41(4), 70–73 (2014)

    Article  Google Scholar 

  39. Yakoubov, S., Gadepally, V., Schear, N., Shen, E., Yerukhimovich, A.: A survey of cryptographic approaches to securing big-data analytics in the cloud. In: 2014 IEEE High Performance Extreme Computing Conference (HPEC), 9–11 September 2014

    Google Scholar 

  40. Kiblawi, T., Khalifeh, A.: Disruptive innovations in cloud computing and their impact on business and technology. In: 2015 4th International Conference Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), 2–4 September 2015

    Google Scholar 

  41. Urkude, U.: Big data analysis by classification algorithm using flight data set. IJIRT 2(10), 188–190 (2016)

    Google Scholar 

  42. Ayma1, V.A., Ferreira1, R.S., Happ1, P.N., Oliveira1, D.A.B., Costa1, G.A.O.P., Feitosa1, R.Q., Plaza, A., Gamba, P.: On the architecture of a big data classification. In: 2015 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), 26–31 July 2015

    Google Scholar 

  43. Gadepally, V., Hancock, B., Kaiser, B., Kepner, J., Michaleas, P., Varia, M.: Computing on masked data: a high performance method for improving big data veracity. In: 2015 IEEE International Symposium Technologies for Homeland Security (HST), 14–16 April 2015

    Google Scholar 

  44. Bande, V.M., Pakle, G.K.: CSRS: customized service recommendation system for big data analysis using map reduce. In: International Conference Inventive Computation Technologies (ICICT), 26–27 August 2016

    Google Scholar 

  45. Wu, X., Zhu, X., Wu, G.-Q., Ding, P.: Data mining with big data. IEEE Trans. Knowl. Data Eng. 26(1), 97–107 (2014)

    Article  Google Scholar 

  46. Qin, X., Kelley, B., Saedy, M.: A fast map-reduce algorithm for burst errors in big data cloud storage. In: 2015 10th System of Systems Engineering Conference System of Systems Engineering Conference (SoSE), 2015, 17–20 May 2015

    Google Scholar 

  47. Gahi, Y., Guennoun, M., Mouftah, H.T.: Big data analytics: security and privacy challenges. In: 2016 IEEE Symposium Computers and Communication (ISCC), 27 –30 June 2016

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Balamurugan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Thangaraj, M., Balamurugan, S. (2017). Survey on Big Data Security Framework. In: Uden, L., Lu, W., Ting, IH. (eds) Knowledge Management in Organizations. KMO 2017. Communications in Computer and Information Science, vol 731. Springer, Cham. https://doi.org/10.1007/978-3-319-62698-7_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-62698-7_39

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-62697-0

  • Online ISBN: 978-3-319-62698-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics