Abstract
We are living in a modern age, where technology is all around us. On single click user can do anything just like book a ticket, shopping, take an appointment to anyone, see medical reports, etc. Technology is so accessible because smart phones ownership. Large amount of data about users which is generated from various sources such as social networking sites, sensors devices, medical data etc. is called big data. With the increased use of big data, there arise many issues; especially security issues which may badly impact a person’s or an organization’s privacy. Yazan et al., presented threat and security attack model for big data security lifecycle. In this paper authors presents a critical review of the work and describes some security issues of big data. An approach to secure threat model for big data lifecycle has been proposed as a main contribution of the paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Alshboul, Y., et al.: Big data life cycle: threats and security model. Am. Conf. Inf. Syst., 1–7 (2015)
Shirudkar, K., et al.: Big data security. Int. J. Adv. Res. Comput. Sci. Softw. Eng., 1100–1109 (2015)
Puthal, D., et al.: A dynamic prime number based efficient security mechanism for big sensing data streams. In: IEEE International Conference on Trust, Security and Privacy in Computing and communications (IEEE TrustCom-2015), pp. 1–31 (2015)
Savant, V.G., et al.: Approaches to solve big data security issues and comparative study of cryptographic algorithms for data encryption. Int. J. Eng. Res. Gen. Sci. 3, 425–428 (2015)
Xu, L., et al.: Information security in big data: privacy and data mining. IEEE Access 5, 1149–1176 (2014)
Bhaya, W., et al.: A proactive DDoS attack detection approach using data mining cluster analysis. J. Next Gener. Inf. Technol. (JNIT) 5, 36–47 (2014)
Sharma, P., et al.: Securing big data Hadoop: a review of security issues, threats, and solution. Int. J. Comput. Sci. Inf. Technol. (IJCSIT) 5(2), 2126–2131 (2014)
Inukollu, V.N., et al.: Security issues associated with big data in cloud computing. Int. J. Netw. Secur. Appl. (IJNSA), 45–46 (2014)
Gantz, J., et al.: The digital universe in 2020: big data, bigger digital shadows, and biggest growth in the Far East. IDC Analyze the Future, pp. 1–16 (2012)
Machanavajjhala, A. et al.: Big privacy: protecting confidentiality in big data. XRDS: Crossroads ACM Mag. Stud. 19, 20–23 (2012)
Levent, E., Eilertson, E., Lazarevic, A., Tan, P., Dokas, P., Srivastava, J., Kumar, V.: Detection and summarization of novel network attacks using data mining. Minnesota INtrusion Detection System (MINDS) Technical report (2003)
Malin, B.: Compromising privacy with trail re-identification: the REIDIT algorithms. Carnegie Mellon University, Center for Automated Learning and Discovery (2002)
Benantar, M., et al.: Method and system for maintaining client server security associations in a distributed computing system. US Patent (2000)
http://resources.infosecinstitute.com/insider-vs-outsider-threats-identify-and-prevent
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kanika, Agrawal, A., Khan, R.A. (2017). Security Integration in Big Data Life Cycle. In: Singh, M., Gupta, P., Tyagi, V., Sharma, A., Ă–ren, T., Grosky, W. (eds) Advances in Computing and Data Sciences. ICACDS 2016. Communications in Computer and Information Science, vol 721. Springer, Singapore. https://doi.org/10.1007/978-981-10-5427-3_21
Download citation
DOI: https://doi.org/10.1007/978-981-10-5427-3_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5426-6
Online ISBN: 978-981-10-5427-3
eBook Packages: Computer ScienceComputer Science (R0)