Survey on big data security in various applications

  • Authors

    • Ambica Sethy
    • Abhishek Ray
    https://doi.org/10.14419/ijet.v7i4.21722
  • The present era has become a digital world, which has been serving the mankind in each and every sector. Due to this, a lot of varied data is used and stored across the digital world. To handle this tremendous varied data, the concept of big data plays a vital role. Data and big data are two sides of a single coin. Digitization has been made possible along with the growth of data through Big data. This leads to creation of many security concerns in Big Data applications. This paper presents a review on some of the existing security and privacy issues on different big data application domains and triggered some new additional V’s like visualization plus vulnerability, which has been correlated with the security and privacy issues on those domains. This paper also focuses on that application area which has not taken security and privacy issues of big data into consideration. We have also found some new issues that could become possible threats for the protective data in various applications.

  • References

    1. [1] (2015) [Online]. Available: http://www.gartner.com/it-glossary/bigdata.

      [2] Yang Q (2015). Introduction to the ieee transactions on big data. IEEE transactions on big data. (1):2-15.

      [3] Sagiroglu S, Sinanc D (2013). Big data: A review. Proceedings of the IEEE International Conference on InCollaboration Technologies and Systems (CTS), (pp. 42-47).

      [4] Chin WL, Li W, Chen HH (2017). Energy big data security threats in IoT-based smart grid communications. IEEE Communications Magazine. 55(10):70-5. https://doi.org/10.1109/MCOM.2017.1700154.

      [5] Nelson B, Olovsson T (2016). Security and privacy for big data: A systematic literature review. Proceedings of the IEEE International Conference on InBig Data (Big Data), (pp. 3693-3702).

      [6] Joshi N, Kadhiwala B (2017). Big data security and privacy issues—A survey. IEEE. InPower and Advanced Computing Technologies (i-PACT), 2017 Innovations in 2017 Apr 21 (pp. 1-5).

      [7] Wu X, Zhu X, Wu GQ, Ding W (2014). Data mining with big data. IEEE transactions on knowledge and data engineering. (1):97-107.

      [8] Ye H, Cheng X, Yuan M, Xu L, Gao J, Cheng C (2016). A survey of security and privacy in big data. Proceedings of the IEEE 16th International Symposium on InCommunications and Information Technologies (ISCIT), (pp. 268-272).

      [9] Sahi MA, Abbas H, Saleem K, Yang X, Derhab A, Orgun MA, Iqbal W, Rashid I, Yaseen A (2018). Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions. Ieee Access. 2018; 6: 464-78. https://doi.org/10.1109/ACCESS.2017.2767561.

      [10] Pearson S, Benameur A (2010). Privacy, security and trust issues arising from cloud computing. Proceedings of the IEEE Second International Conference on InCloud Computing Technology and Science (CloudCom), (pp. 693-702).

      [11] Patil HK, Seshadri R. Big data security and privacy issues in healthcare. InBig Data (BigData Congress), 2014 IEEE International Congress on 2014 Jun 27 (pp. 762-765). IEEE.

      [12] Chandra S, Ray S, Goswami RT (2017). Big Data Security in Healthcare: Survey on Frameworks and Algorithms. Proceedings of the IEEE 7th International Conference on InAdvance Computing Conference (IACC), (pp. 89-94).

      [13] Rao S, Suma SN, Sunitha M (2015). Security solutions for big data analytics in healthcare. Proceedings of the IEEE Second International Conference on InAdvances in Computing and Communication Engineering (ICACCE), (pp. 510-514).

      [14] Wang S, Bonomi L, Dai W, Chen F, Cheung C, Bloss CS, Cheng S, Jiang X (2016). Big data privacy in biomedical research. IEEE Transactions on Big Data. (1):1-.

      [15] Asghar MR, Lee T, Baig MM, Ullah E, Russello G, Dobbie G (2017). A Review of Privacy and Consent Management in Healthcare: A Focus on Emerging Data Sources. arXiv preprint arXiv:1711.00546.

      [16] Bates DW, Saria S, Ohno-Machado L, Shah A, Escobar G (2014). Big data in health care: using analytics to identify and manage high-risk and high-cost patients. Health Affairs. 33(7):1123-31. https://doi.org/10.1377/hlthaff.2014.0041.

      [17] Feng X, Onafeso B, Liu E (2015). Investigating big data healthcare security issues with Raspberry Pi. Proceedings of the IEEE International Conference on InComputer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), (pp. 2329-2334).

      [18] Wang S, Bonomi L, Dai W, Chen F, Cheung C, Bloss CS, Cheng S, Jiang X (2016). Big data privacy in biomedical research. IEEE Transactions on Big Data. (1):1-.

      [19] Gao Y, Wang Z, Ji C, Xiao P, Qin J, Li Z (2017). Design and implementation of a mobile-health call system based on scalable kNN query. Proceedings of the IEEE 19th International Conference on Ine-Health Networking, Applications and Services (Healthcom), (pp. 1-6).

      [20] Patel K, Patel B, Mishra M, Patel N (2017). Privacy issues in big data. Proceedings of the IEEE 2nd International Conference on InConvergence in Technology (I2CT), (pp. 259-264).

      [21] Khanduja V, Arora A, Garg S (2017). Applications of big data in real world: It's not what you know. It's what you do with what you know. Proceedings of the International Conference on InComputing, Communication and Automation (ICCCA), (pp. 159-163). IEEE.

      [22] Lin Z, Sun D, Li Z, Tang M (2017). Research on the dynamic change of terrorist organization cooperation from the big data perspective. Proceedings of the IEEE 2nd International Conference on InBig Data Analysis (ICBDA), (pp. 363-367).

      [23] Demchenko Y, Grosso P, De Laat C, Membrey P (2013). Addressing big data issues in scientific data infrastructure. Proceedings of the IEEE International Conference on InCollaboration Technologies and Systems (CTS), (pp. 48-55).

      [24] Camargo JE, Torres CA, Martínez OH, Gómez FA (2016). A big data analytics system to analyze citizens' perception of security. Proceedings of the IEEE International Conference on InSmart Cities Conference (ISC2), (pp. 1-5).

      [25] Lu ZW (2016). Research about New Media Security Technology Base on Big Data Era. Proceedings of the IEEE 14th Intl Conf on InDependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), (pp. 933-936).

      [26] Shen W, Yin B, Cheng Y, Cao X, Li Q (2017). Privacy-preserving mobile crowd sensing for big data applications. Proceedings of the IEEE International Conference on InCommunications (ICC), (pp. 1-6).

      [27] Kshetri N (2014). Big data׳ s impact on privacy, security and consumer welfare. Telecommunications Policy. 38(11):1134-45. https://doi.org/10.1016/j.telpol.2014.10.002.

      [28] Zhang M, Chen C, Wo T, Xie T, Bhuiyan MZ, Lin X (2017). SafeDrive: online driving anomaly detection from large-scale vehicle data. IEEE Transactions on Industrial Informatics. (4):2087-96. https://doi.org/10.1109/TII.2017.2674661.

      [29] Jain H, Jain R (2017). Big data in weather forecasting: Applications and challenges. Proceedings of the IEEE International Conference on InBig Data Analytics and Computational Intelligence (ICBDAC), (pp. 138-142).

      [30] Chen Y, Li X (2017). Research on big data application in intelligent safety supervision. Proceedings of the IEEE 2nd International Conference on InBig Data Analysis (ICBDA), (pp. 473-477).

      [31] Janssen M, van den Hoven J. Big and Open Linked Data (BOLD) in government: A challenge to transparency and privacy?

      [32] Puthal D, Nepal S, Ranjan R, Chen J (2017). A dynamic prime number based efficient security mechanism for big sensing data streams. Journal of Computer and System Sciences. 83(1):22-42. https://doi.org/10.1016/j.jcss.2016.02.005.

      [33] Hardy K, Maurushat A (2017). Opening up government data for Big Data analysis and public benefit. Computer Law & Security Review. 33(1):30-7. https://doi.org/10.1016/j.clsr.2016.11.003.

      [34] Zhao J, Wang Y, Xia Y (2016). Analysis of Information Security of Electric Power Big Data and Its Countermeasures. Proceedings of the IEEE 12th International Conference on InComputational Intelligence and Security (CIS), (pp. 243-248).

      [35] Tonni SM, Rahman MZ, Parvin S, Gawanmeh A (2017). Securing big data efficiently through microaggregation technique. Proceedings of the IEEE 37th International Conference on InDistributed Computing Systems Workshops (ICDCSW), (pp. 125-130).

      [36] Terzi DS, Terzi R, Sagiroglu S (2017). Big data analytics for network anomaly detection from netflow data. Proceedings of the IEEE International Conference on InComputer Science and Engineering (UBMK), (pp. 592-597).

      [37] Palaiokrassas G, Charlaftis V, Litke A, Varvarigou T (2017). Recommendation service for big data applications in smart cities. Proceedings of the IEEE International Conference on InHigh Performance Computing & Simulation (HPCS), (pp. 217-223).

      [38] Ancy S, Cornelius K (2017). A predictive model for kidney failure E-health. Proceedings of the IEEE Third International Conference on InSensing, Signal Processing and Security (ICSSS), (pp. 497-502).

      [39] Zaki T, Uddin MS, Hasan MM, Islam MN (2017). Security threats for big data: A study on Enron e-mail dataset. Proceedings of the IEEE International Conference on InResearch and Innovation in Information Systems (ICRIIS), (pp. 1-6).

      [40] Cockcroft S, Russell M (2018). Big data opportunities for accounting and finance practice and research. Australian Accounting Review. https://doi.org/10.1111/auar.12218.

      [41] Martin KD, Borah A, Palmatier RW (2017). Data privacy: Effects on customer and firm performance. Journal of Marketing. 81(1):36-58. https://doi.org/10.1509/jm.15.0497.

      [42] Reardon J, Basin D, Capkun S (2013). Sok: Secure data deletion. InSecurity and Privacy (SP), 2013 IEEE Symposium on 2013 May 19 (pp. 301-315). IEEE.

  • Downloads

  • How to Cite

    Sethy, A., & Ray, A. (2018). Survey on big data security in various applications. International Journal of Engineering & Technology, 7(4), 3478-3484. https://doi.org/10.14419/ijet.v7i4.21722