Abstract
In the ubiquitous network, these many devices generate a huge amount of data. The sharp increase of the diverse devices has led to the various heterogeneous data types and the booming growth of the data, that is, the ubiquitous network will bring big data. Due to the heterogeneity and ubiquitous nature of ubiquitous networks, the big data of ubiquitous network faces a broad and growing range of security threats and challenges. Based on the basic knowledge of the big data of ubiquitous network, this paper analyzes the security threats in the process of data collection, storage, processing and application. System elaborated the big data of ubiquitous network encryption and integrity protection, access control, privacy protection, attack detection, security technology research status. The research direction and future development direction are also discussed in this paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Van den Elzen, S.V., Wijk, J.J.: Multivariate network exploration and presentation: from detail to overview via selections and aggregations. Vis. Comput. Graph. 20, 2310–2319 (2014)
Xu, X.Q., He, G.N., Zhang, S.Q., Chen, Y., Xu, S.G.: On functionality separation for green mobile networks: concept study over LTE. Commun. Mag. 51, 82–90 (2013)
Kushiro, N., Higuma, T., Nakata, M., Kubota, H., Sato, K.: Practical solution for constructing ubiquitous network in building and home control system consumer electronics. IEEE Trans. Consum. Electron. 53, 1387–1392 (2007)
Saito, H., Kagami, O., Umehira, M., Kado, Y.: Wide area ubiquitous network: the network operator’s view of a sensor network. Commun. Mag. 46, 112–120 (2008)
Zhang, H., Dong, Y., Cheng, J., Hossain, M., Leung, V.C.M.: Fronthauling for 5G LTE-U ultra dense cloud small cell networks. IEEE Wirel. Commun. 23, 48–53 (2016)
Xu, L., Chen, Y., Chai, K.K.: Cooperative mobility load balancing in relay cellular networks. In: 2013 IEEE/CIC International Conference on Communications in China, Xi’an, pp. 141–146. IEEE Press (2013)
Xu, L., Cheng, X., Liu, Y.: Mobility load balancing aware radio resource allocation scheme for LTE-advanced cellular networks. In: IEEE International Conference on Communication Technology, Hangzhou, pp. 806–812. IEEE Press (2015)
Chung, Y.F., Tsai, M.Y., Wu, E.P., Chiang, D.L., Lee, C.C., Hsiao, T.C., Chen, T.S.: Bed site health care video-phone system. Appl. Mech. Mater. 284–287, 1636–1641 (2013)
Hashem, I.A.T., Yaqoob, I., Anuar, N.B.: The rise of “big data” on cloud computing: review and open research issues. Inf. Syst. 47, 98–115 (2015)
Guo, F., Wang, J.M., Li, D.Y.: Finger printing relational databases. In: ACM Symposium on Applied Computing, Dijon, pp. 487–492. ACM Press (2006)
Jiang, C.X., Sun, X.M., Yi, Y.Q., Yang, H.F.: Research on database public watermarking algorithm based on JADE algorithm. J. Syst. Simul. 18, 1781–1785 (2006)
Zhang, H., Xing, H., Cheng, J., Nallanathan, A., Leung, V.: Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming. IEEE Trans. Ind. Inf. 12, 1714–1725 (2016)
Shen, C., Wang, Y.C., Liu, G.S.: Improved algorithm of multi-pattern matching for Chinese string. Acta Agron. Sin. 21, 27–32 (2002)
Zhao, J., Zheng, W., Wen, X., Zhang, H., Lu, Z., Jing, W.: Research on the resource allocation of OFDMA relay network based on secrecy ratio. J. Electron. Inf. Technol. 36, 2816–2821 (2014)
Zhao, J., Lu, Z., Wen, X., Zhang, H., He, S., Jing, W.: Resource management based on security satisfaction ratio with fairness-aware in two-way relay networks. Int. J. Distrib. Sens. Netw. 2015, 11 (2015)
Wang, T., An, B.Y., Peng, Z., Zhang, G.L., Zhong, B.N.: Blue card-green communications for exchanging information of mobile users. J. Comput. Inf. Syst. 10, 8153–8160 (2014)
Schell, R.: Security — a big question for big data. In: 2013 IEEE International Conference on Big Data, Santa Clara, p. 5. IEEE Press (2013)
Bowers, K.D., Luels, A., Oprea, A.: Hail: a high-availability and integrity layer for cloud storage. In: 16th ACM Conference on Computer and Communications Security, Chicago, pp. 187–198. ACM Press (2009)
Zhao, J., Feng, D.G., Yang, L.: CCA-secure type-based proxyre-encryption without pairings. Acta Electron. Sin. 39, 2513–2519 (2011)
Wu, X.X., Li, X.U., Zhang, X.W.: A certificateless proxyre-encryption scheme for cloud-based data sharing. In: 18th ACM Conference on Computer and Communications Security, Chicago, pp. 869–871. ACM Press (2011)
Liang, K., Liu, J.K., Wong, D.S., Susilo, W.: An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In: Kutyłowski, M., Vaidya, J. (eds.) ESORICS 2014, Part I. LNCS, vol. 8712, pp. 257–272. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-11203-9_15
Weng, J., Deng, R.H., Ding, X.H.: Conditional proxyre-encryption secure against chosen-ciphertext attack. In: ACM ASIACCS 2009, pp. 322–332 (2009)
Fang, L.M., Wang, J.D., Ge, C.P.: Fuzzy conditional proxyre-encryption. Sci. China Inf. Sci. 56, 1–13 (2015)
Han, H., Wen, Y.G., Chua, T.S., Li, X.L.: Toward scalable systems for big data analytics: a technology tutorial. IEEE Access 2, 652–687 (2014)
Yang, C., Liu, C., Nepal, S., Chen, J.: A time efficient approach for detecting errors in big sensor data on cloud. IEEE Trans. Parallel Distrib. Syst. 26, 329–339 (2015)
Zhang, G.L., Wang, Z.N., Du, J.X., Wang, T., Jiang, Z.N.: A generalized visual aid system for teleoperation applied to satellite servicing. Int. J. Adv. Robot. Syst. 11, 1–7 (2014)
Yi, X.M., Liu, F.M., Liu, J.C., Hai, J.: Building a network highway for big data: architecture and challenges. IEEE Netw. 28, 5–13 (2014)
Liang, X., Cao, Z., Lin, H.: Attribute based proxy re-encryption with delegating capabilities. In: 4th International Symposium on Information, Computer and Communications Security, pp. 276–286. ACM Press, New York (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Huo, Y., Sun, Y., Fan, W., Cheng, X., Li, D., Liu, Y. (2018). A Survey on Security Issues in Big Data of Ubiquitous Network. In: Long, K., Leung, V., Zhang, H., Feng, Z., Li, Y., Zhang, Z. (eds) 5G for Future Wireless Networks. 5GWN 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 211. Springer, Cham. https://doi.org/10.1007/978-3-319-72823-0_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-72823-0_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72822-3
Online ISBN: 978-3-319-72823-0
eBook Packages: Computer ScienceComputer Science (R0)