Skip to main content

Security Integration in Big Data Life Cycle

  • Conference paper
  • First Online:
Advances in Computing and Data Sciences (ICACDS 2016)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 721))

Included in the following conference series:

  • 1753 Accesses

Abstract

We are living in a modern age, where technology is all around us. On single click user can do anything just like book a ticket, shopping, take an appointment to anyone, see medical reports, etc. Technology is so accessible because smart phones ownership. Large amount of data about users which is generated from various sources such as social networking sites, sensors devices, medical data etc. is called big data. With the increased use of big data, there arise many issues; especially security issues which may badly impact a person’s or an organization’s privacy. Yazan et al., presented threat and security attack model for big data security lifecycle. In this paper authors presents a critical review of the work and describes some security issues of big data. An approach to secure threat model for big data lifecycle has been proposed as a main contribution of the paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Alshboul, Y., et al.: Big data life cycle: threats and security model. Am. Conf. Inf. Syst., 1–7 (2015)

    Google Scholar 

  2. Shirudkar, K., et al.: Big data security. Int. J. Adv. Res. Comput. Sci. Softw. Eng., 1100–1109 (2015)

    Google Scholar 

  3. Puthal, D., et al.: A dynamic prime number based efficient security mechanism for big sensing data streams. In: IEEE International Conference on Trust, Security and Privacy in Computing and communications (IEEE TrustCom-2015), pp. 1–31 (2015)

    Google Scholar 

  4. Savant, V.G., et al.: Approaches to solve big data security issues and comparative study of cryptographic algorithms for data encryption. Int. J. Eng. Res. Gen. Sci. 3, 425–428 (2015)

    Google Scholar 

  5. Xu, L., et al.: Information security in big data: privacy and data mining. IEEE Access 5, 1149–1176 (2014)

    Google Scholar 

  6. Bhaya, W., et al.: A proactive DDoS attack detection approach using data mining cluster analysis. J. Next Gener. Inf. Technol. (JNIT) 5, 36–47 (2014)

    Google Scholar 

  7. Sharma, P., et al.: Securing big data Hadoop: a review of security issues, threats, and solution. Int. J. Comput. Sci. Inf. Technol. (IJCSIT) 5(2), 2126–2131 (2014)

    Google Scholar 

  8. Inukollu, V.N., et al.: Security issues associated with big data in cloud computing. Int. J. Netw. Secur. Appl. (IJNSA), 45–46 (2014)

    Google Scholar 

  9. Gantz, J., et al.: The digital universe in 2020: big data, bigger digital shadows, and biggest growth in the Far East. IDC Analyze the Future, pp. 1–16 (2012)

    Google Scholar 

  10. Machanavajjhala, A. et al.: Big privacy: protecting confidentiality in big data. XRDS: Crossroads ACM Mag. Stud. 19, 20–23 (2012)

    Article  Google Scholar 

  11. Levent, E., Eilertson, E., Lazarevic, A., Tan, P., Dokas, P., Srivastava, J., Kumar, V.: Detection and summarization of novel network attacks using data mining. Minnesota INtrusion Detection System (MINDS) Technical report (2003)

    Google Scholar 

  12. Malin, B.: Compromising privacy with trail re-identification: the REIDIT algorithms. Carnegie Mellon University, Center for Automated Learning and Discovery (2002)

    Google Scholar 

  13. Benantar, M., et al.: Method and system for maintaining client server security associations in a distributed computing system. US Patent (2000)

    Google Scholar 

  14. https://www.techopedia.com/definition/26217/insider-attack

  15. http://resources.infosecinstitute.com/insider-vs-outsider-threats-identify-and-prevent

  16. http://www.computerhope.com/jargon/u/unauacce.htm

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kanika .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Kanika, Agrawal, A., Khan, R.A. (2017). Security Integration in Big Data Life Cycle. In: Singh, M., Gupta, P., Tyagi, V., Sharma, A., Ă–ren, T., Grosky, W. (eds) Advances in Computing and Data Sciences. ICACDS 2016. Communications in Computer and Information Science, vol 721. Springer, Singapore. https://doi.org/10.1007/978-981-10-5427-3_21

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5427-3_21

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5426-6

  • Online ISBN: 978-981-10-5427-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics