skip to main content
10.1145/3386723.3387841acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnissConference Proceedingsconference-collections
research-article

Big Data security and privacy techniques

Published:18 May 2020Publication History

ABSTRACT

Nowadays Information technologies have caused irreversible changes in many parts of our society. This development reached its climax with the advent of 'Big Data', whose economic and social benefits should not be neglected. However, 'Big Data' inherently threatens security as well as the founding pillars of personal data law, and for this reason many techniques are invented in parallel with the development of big data.

in this article we will present what Big Data is, the challenges it faces in terms of privacy and security, as well as privacy and security techniques for Big Data at the level of anonymization encryption and Differential Privacy, by describing, analyzing, and comparing these methods

References

  1. Min Xiao*, Mingxin Wang*, Xuejiao Liu t and Junmei Sun, "Efficient Distributed Access Control for Big Data in Clouds" IEEE Conference on Computer Communications Workshops, 2015Google ScholarGoogle Scholar
  2. C.Yongshun, D. Wang "Cloud computing based big data ecosystem and requirements" the 7th Chine Cloud Computing conference, 2015Google ScholarGoogle Scholar
  3. Rudi Bruchez « NoSQL Les bases de données et le Big Data » 2015Google ScholarGoogle Scholar
  4. M.kantarcioglu, E.Ferrari "Research challenges at the Intersection of Big Data, Security and Privacy February 2019Google ScholarGoogle Scholar
  5. Stefane Fermigier, "BIG DATA & OPEN SOURCE:UNE CONVERGENCE INÉVITABLE" 10 déc. 2012Google ScholarGoogle Scholar
  6. M.Meingast, T.Roosta, S.Sastry "Security and Privacy Issues with Health Care Information Technology" Annual International Conference of the IEEE Engineering in Medicine and Biology Society 2006Google ScholarGoogle Scholar
  7. Karen R. Sollins « IoT Big Data Security and Privacity Versus Innovation "IEEE Internet of Things Journal, 2019Google ScholarGoogle Scholar
  8. J.François, « livre blanc Données massives - Big Data Impact et attentes pour la normalisation» Comité stratégique information et communication numérique Juin 2015Google ScholarGoogle Scholar
  9. K. Shirudkar, D. Motwani "Big-Data Security " International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 3, March 2015Google ScholarGoogle Scholar
  10. Cloud Security Alliance Top Ten Big Data Security And Privacy Challenges "by CSA Big Data Working GroupGoogle ScholarGoogle Scholar
  11. Somchart Fugkeaw, Hiroyuki Sato, "Privacy-Preserving Access Control Model for Big Data Cloud", 2015Google ScholarGoogle Scholar
  12. V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-Based Encryption for Fine-grained Access Control of Encrypted Data. In Proc. of CCS'06, Alexandria, Virginia, USA, 2006Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Bethencourt, J., Sahai, A. And Waters, B., Ciphertext-policy Attributebased Encryption, IEEE Symposium of Security and privacy, Oakland, CA, USA, May 20-23, Los Alamitos, 2007.Google ScholarGoogle Scholar
  14. Kan Yang, Xiaohua Jia, Kui Ren, Bo Zhang, Ruitao Xie: Expressive, "Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage". IEEE Trans. Parallel Distrib. Syst. 25(7): 1735--1744 (2014).Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. L. Zhou, V. Varadharajan, and M. Hitchens, Enforcing Role-based Access Control for Secure Data Storage in the Cloud, The Computer Journal, Vol. 54 No.10, 2011.Google ScholarGoogle Scholar
  16. Wenrong Zeng, Yuhao Yang, Bo Luo, Access Control for Big Data using Data Content, IEEE International Conference on Big Data, 2013.Google ScholarGoogle Scholar
  17. A. Abou El Kalam, R. Elbaida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miège, C. Saurel, G. Trouessin, "Organization-based access control", IEEE 4th International Workshop on Policies for Distributed Systems and Networks (Policy'03), Côme, Italie, 4-6 juin 2003, pp. 120--131. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=1206966Google ScholarGoogle Scholar
  18. A. Abou El Kalam, A. Baina, Y. Deswarte, M. Kaaniche, "PolyOrBAC: A Security Framework for Critical Infrastructures", International Journal of Critical Infrastructure Protection (IJCIP), vol. 2(4), Décembre 2009, 37pp, LNCS, http://dx.doi.org/10.1016/j.ijcip.2009.08.005Google ScholarGoogle Scholar
  19. I. Pasquier, A. Abou El Kalam, A. Ait ouahman, M. Demontfort, "SmartOrBAC A new access control model for Internet of Things", The 14th International Conference on Cryptology and Network Security (CANS 2015) 10-12 December 2015, Morocco, Marrakesh, Lecture Notes in Computer Science (LNCS), Springer,Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    NISS '20: Proceedings of the 3rd International Conference on Networking, Information Systems & Security
    March 2020
    528 pages
    ISBN:9781450376341
    DOI:10.1145/3386723

    Copyright © 2020 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 18 May 2020

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader