ABSTRACT
Nowadays Information technologies have caused irreversible changes in many parts of our society. This development reached its climax with the advent of 'Big Data', whose economic and social benefits should not be neglected. However, 'Big Data' inherently threatens security as well as the founding pillars of personal data law, and for this reason many techniques are invented in parallel with the development of big data.
in this article we will present what Big Data is, the challenges it faces in terms of privacy and security, as well as privacy and security techniques for Big Data at the level of anonymization encryption and Differential Privacy, by describing, analyzing, and comparing these methods
- Min Xiao*, Mingxin Wang*, Xuejiao Liu t and Junmei Sun, "Efficient Distributed Access Control for Big Data in Clouds" IEEE Conference on Computer Communications Workshops, 2015Google Scholar
- C.Yongshun, D. Wang "Cloud computing based big data ecosystem and requirements" the 7th Chine Cloud Computing conference, 2015Google Scholar
- Rudi Bruchez « NoSQL Les bases de données et le Big Data » 2015Google Scholar
- M.kantarcioglu, E.Ferrari "Research challenges at the Intersection of Big Data, Security and Privacy February 2019Google Scholar
- Stefane Fermigier, "BIG DATA & OPEN SOURCE:UNE CONVERGENCE INÉVITABLE" 10 déc. 2012Google Scholar
- M.Meingast, T.Roosta, S.Sastry "Security and Privacy Issues with Health Care Information Technology" Annual International Conference of the IEEE Engineering in Medicine and Biology Society 2006Google Scholar
- Karen R. Sollins « IoT Big Data Security and Privacity Versus Innovation "IEEE Internet of Things Journal, 2019Google Scholar
- J.François, « livre blanc Données massives - Big Data Impact et attentes pour la normalisation» Comité stratégique information et communication numérique Juin 2015Google Scholar
- K. Shirudkar, D. Motwani "Big-Data Security " International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 3, March 2015Google Scholar
- Cloud Security Alliance Top Ten Big Data Security And Privacy Challenges "by CSA Big Data Working GroupGoogle Scholar
- Somchart Fugkeaw, Hiroyuki Sato, "Privacy-Preserving Access Control Model for Big Data Cloud", 2015Google Scholar
- V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-Based Encryption for Fine-grained Access Control of Encrypted Data. In Proc. of CCS'06, Alexandria, Virginia, USA, 2006Google ScholarDigital Library
- Bethencourt, J., Sahai, A. And Waters, B., Ciphertext-policy Attributebased Encryption, IEEE Symposium of Security and privacy, Oakland, CA, USA, May 20-23, Los Alamitos, 2007.Google Scholar
- Kan Yang, Xiaohua Jia, Kui Ren, Bo Zhang, Ruitao Xie: Expressive, "Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage". IEEE Trans. Parallel Distrib. Syst. 25(7): 1735--1744 (2014).Google ScholarDigital Library
- L. Zhou, V. Varadharajan, and M. Hitchens, Enforcing Role-based Access Control for Secure Data Storage in the Cloud, The Computer Journal, Vol. 54 No.10, 2011.Google Scholar
- Wenrong Zeng, Yuhao Yang, Bo Luo, Access Control for Big Data using Data Content, IEEE International Conference on Big Data, 2013.Google Scholar
- A. Abou El Kalam, R. Elbaida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miège, C. Saurel, G. Trouessin, "Organization-based access control", IEEE 4th International Workshop on Policies for Distributed Systems and Networks (Policy'03), Côme, Italie, 4-6 juin 2003, pp. 120--131. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=1206966Google Scholar
- A. Abou El Kalam, A. Baina, Y. Deswarte, M. Kaaniche, "PolyOrBAC: A Security Framework for Critical Infrastructures", International Journal of Critical Infrastructure Protection (IJCIP), vol. 2(4), Décembre 2009, 37pp, LNCS, http://dx.doi.org/10.1016/j.ijcip.2009.08.005Google Scholar
- I. Pasquier, A. Abou El Kalam, A. Ait ouahman, M. Demontfort, "SmartOrBAC A new access control model for Internet of Things", The 14th International Conference on Cryptology and Network Security (CANS 2015) 10-12 December 2015, Morocco, Marrakesh, Lecture Notes in Computer Science (LNCS), Springer,Google Scholar
Recommendations
Privacy Security Status and Countermeasures in the Era of Big Data
BDET 2021: 2021 the 3rd International Conference on Big Data Engineering and Technology (BDET)Big data is a data set which contains a lot of information and has high value. In recent years, big data technology is gradually popularized and applied, which brings great convenience to people. But it also leads to many problems, one of which is the ...
Big data and big risk: a four-factor framework for big data security and privacy
Big data refers to a very large volume of data with possibly varied and complex structure. With growing data processing and data analytic techniques, big data provides significant benefits to organisations and individuals by improving productivity and ...
Privacy Preserving Unstructured Big Data Analytics
Big data analytics has created opportunities for researchers to process huge amount of data but created a big threat to privacy of individual. Data processed by big data analytics platforms may have personal information which need to be taken care of ...
Comments