Skip to main content

A Survey on Security Issues in Big Data of Ubiquitous Network

  • Conference paper
  • First Online:
Book cover 5G for Future Wireless Networks (5GWN 2017)

Abstract

In the ubiquitous network, these many devices generate a huge amount of data. The sharp increase of the diverse devices has led to the various heterogeneous data types and the booming growth of the data, that is, the ubiquitous network will bring big data. Due to the heterogeneity and ubiquitous nature of ubiquitous networks, the big data of ubiquitous network faces a broad and growing range of security threats and challenges. Based on the basic knowledge of the big data of ubiquitous network, this paper analyzes the security threats in the process of data collection, storage, processing and application. System elaborated the big data of ubiquitous network encryption and integrity protection, access control, privacy protection, attack detection, security technology research status. The research direction and future development direction are also discussed in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Van den Elzen, S.V., Wijk, J.J.: Multivariate network exploration and presentation: from detail to overview via selections and aggregations. Vis. Comput. Graph. 20, 2310–2319 (2014)

    Article  Google Scholar 

  2. Xu, X.Q., He, G.N., Zhang, S.Q., Chen, Y., Xu, S.G.: On functionality separation for green mobile networks: concept study over LTE. Commun. Mag. 51, 82–90 (2013)

    Article  Google Scholar 

  3. Kushiro, N., Higuma, T., Nakata, M., Kubota, H., Sato, K.: Practical solution for constructing ubiquitous network in building and home control system consumer electronics. IEEE Trans. Consum. Electron. 53, 1387–1392 (2007)

    Article  Google Scholar 

  4. Saito, H., Kagami, O., Umehira, M., Kado, Y.: Wide area ubiquitous network: the network operator’s view of a sensor network. Commun. Mag. 46, 112–120 (2008)

    Article  Google Scholar 

  5. Zhang, H., Dong, Y., Cheng, J., Hossain, M., Leung, V.C.M.: Fronthauling for 5G LTE-U ultra dense cloud small cell networks. IEEE Wirel. Commun. 23, 48–53 (2016)

    Article  Google Scholar 

  6. Xu, L., Chen, Y., Chai, K.K.: Cooperative mobility load balancing in relay cellular networks. In: 2013 IEEE/CIC International Conference on Communications in China, Xi’an, pp. 141–146. IEEE Press (2013)

    Google Scholar 

  7. Xu, L., Cheng, X., Liu, Y.: Mobility load balancing aware radio resource allocation scheme for LTE-advanced cellular networks. In: IEEE International Conference on Communication Technology, Hangzhou, pp. 806–812. IEEE Press (2015)

    Google Scholar 

  8. Chung, Y.F., Tsai, M.Y., Wu, E.P., Chiang, D.L., Lee, C.C., Hsiao, T.C., Chen, T.S.: Bed site health care video-phone system. Appl. Mech. Mater. 284–287, 1636–1641 (2013)

    Article  Google Scholar 

  9. Hashem, I.A.T., Yaqoob, I., Anuar, N.B.: The rise of “big data” on cloud computing: review and open research issues. Inf. Syst. 47, 98–115 (2015)

    Article  Google Scholar 

  10. Guo, F., Wang, J.M., Li, D.Y.: Finger printing relational databases. In: ACM Symposium on Applied Computing, Dijon, pp. 487–492. ACM Press (2006)

    Google Scholar 

  11. Jiang, C.X., Sun, X.M., Yi, Y.Q., Yang, H.F.: Research on database public watermarking algorithm based on JADE algorithm. J. Syst. Simul. 18, 1781–1785 (2006)

    Google Scholar 

  12. Zhang, H., Xing, H., Cheng, J., Nallanathan, A., Leung, V.: Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming. IEEE Trans. Ind. Inf. 12, 1714–1725 (2016)

    Article  Google Scholar 

  13. Shen, C., Wang, Y.C., Liu, G.S.: Improved algorithm of multi-pattern matching for Chinese string. Acta Agron. Sin. 21, 27–32 (2002)

    Google Scholar 

  14. Zhao, J., Zheng, W., Wen, X., Zhang, H., Lu, Z., Jing, W.: Research on the resource allocation of OFDMA relay network based on secrecy ratio. J. Electron. Inf. Technol. 36, 2816–2821 (2014)

    Google Scholar 

  15. Zhao, J., Lu, Z., Wen, X., Zhang, H., He, S., Jing, W.: Resource management based on security satisfaction ratio with fairness-aware in two-way relay networks. Int. J. Distrib. Sens. Netw. 2015, 11 (2015)

    Google Scholar 

  16. Wang, T., An, B.Y., Peng, Z., Zhang, G.L., Zhong, B.N.: Blue card-green communications for exchanging information of mobile users. J. Comput. Inf. Syst. 10, 8153–8160 (2014)

    Google Scholar 

  17. Schell, R.: Security — a big question for big data. In: 2013 IEEE International Conference on Big Data, Santa Clara, p. 5. IEEE Press (2013)

    Google Scholar 

  18. Bowers, K.D., Luels, A., Oprea, A.: Hail: a high-availability and integrity layer for cloud storage. In: 16th ACM Conference on Computer and Communications Security, Chicago, pp. 187–198. ACM Press (2009)

    Google Scholar 

  19. Zhao, J., Feng, D.G., Yang, L.: CCA-secure type-based proxyre-encryption without pairings. Acta Electron. Sin. 39, 2513–2519 (2011)

    Google Scholar 

  20. Wu, X.X., Li, X.U., Zhang, X.W.: A certificateless proxyre-encryption scheme for cloud-based data sharing. In: 18th ACM Conference on Computer and Communications Security, Chicago, pp. 869–871. ACM Press (2011)

    Google Scholar 

  21. Liang, K., Liu, J.K., Wong, D.S., Susilo, W.: An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In: Kutyłowski, M., Vaidya, J. (eds.) ESORICS 2014, Part I. LNCS, vol. 8712, pp. 257–272. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-11203-9_15

    Google Scholar 

  22. Weng, J., Deng, R.H., Ding, X.H.: Conditional proxyre-encryption secure against chosen-ciphertext attack. In: ACM ASIACCS 2009, pp. 322–332 (2009)

    Google Scholar 

  23. Fang, L.M., Wang, J.D., Ge, C.P.: Fuzzy conditional proxyre-encryption. Sci. China Inf. Sci. 56, 1–13 (2015)

    Article  Google Scholar 

  24. Han, H., Wen, Y.G., Chua, T.S., Li, X.L.: Toward scalable systems for big data analytics: a technology tutorial. IEEE Access 2, 652–687 (2014)

    Article  Google Scholar 

  25. Yang, C., Liu, C., Nepal, S., Chen, J.: A time efficient approach for detecting errors in big sensor data on cloud. IEEE Trans. Parallel Distrib. Syst. 26, 329–339 (2015)

    Article  Google Scholar 

  26. Zhang, G.L., Wang, Z.N., Du, J.X., Wang, T., Jiang, Z.N.: A generalized visual aid system for teleoperation applied to satellite servicing. Int. J. Adv. Robot. Syst. 11, 1–7 (2014)

    Article  Google Scholar 

  27. Yi, X.M., Liu, F.M., Liu, J.C., Hai, J.: Building a network highway for big data: architecture and challenges. IEEE Netw. 28, 5–13 (2014)

    Article  Google Scholar 

  28. Liang, X., Cao, Z., Lin, H.: Attribute based proxy re-encryption with delegating capabilities. In: 4th International Symposium on Information, Computer and Communications Security, pp. 276–286. ACM Press, New York (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yinlong Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Huo, Y., Sun, Y., Fan, W., Cheng, X., Li, D., Liu, Y. (2018). A Survey on Security Issues in Big Data of Ubiquitous Network. In: Long, K., Leung, V., Zhang, H., Feng, Z., Li, Y., Zhang, Z. (eds) 5G for Future Wireless Networks. 5GWN 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 211. Springer, Cham. https://doi.org/10.1007/978-3-319-72823-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72823-0_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72822-3

  • Online ISBN: 978-3-319-72823-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics