DOI QR코드

DOI QR Code

Big Data Security and Privacy: A Taxonomy with Some HPC and Blockchain Perspectives

  • Received : 2021.07.05
  • Published : 2021.07.30

Abstract

The amount of Big Data generated from multiple sources is continuously increasing. Traditional storage methods lack the capacity for such massive amounts of data. Consequently, most organizations have shifted to the use of cloud storage as an alternative option to store Big Data. Despite the significant developments in cloud storage, it still faces many challenges, such as privacy and security concerns. This paper discusses Big Data, its challenges, and different classifications of security and privacy challenges. Furthermore, it proposes a new classification of Big Data security and privacy challenges and offers some perspectives to provide solutions to these challenges.

Keywords

References

  1. Baig, M. I.; Shuib, L.; Yadegaridehkordi, E. "Big data adoption: State of the art and research challenges," Inf. Process. Manag. 2019, vol. 56, no. 6, p. 1046495.
  2. Padgavankar, M. H.; Gupta, S. R. "Big data storage and challenges," Int. J. Comput. Sci. Inf. Technol. 2014, vol. 5, no. 2, pp. 2218-2223 .
  3. Bao, R. Chen, Z.; Obaidat, M. S. "Challenges and techniques in Big data security and privacy: A review," Secure. Priv. 2018, vol. 1, no. 4, p. e13. https://doi.org/10.1002/spy2.13
  4. Yang, P.; Xiong, N.; Ren, J. "Data Security and Privacy Protection for Cloud Storage: A Survey," IEEE Access, 2020, vol. 8, pp. 131723-131740. https://doi.org/10.1109/ACCESS.2020.3009876
  5. Woodie, Alex. "Global DataSphere to Hit 175 Zettabytes by 2025, IDC Says". Datanami. 2018.
  6. Subbalakshmi, S.; Madhavi, K. "Security challenges of Big Data storage in Cloud environment: A Survey," Int. J. Appl. Eng. Res. 2018, vol. 13, no. 17, pp. 13237-13244.
  7. Venkatraman, S.; Venkatraman, R. "Big data security challenges and strategies," AIMS Math. 2019, vol. 4, no.3, pp. 860-879. https://doi.org/10.3934/math.2019.3.860
  8. Akingbade, L. O. "Cloud Storage problems, benefits and solutions provided by Data De-duplication", International Journal of Engineering and Innovative Technology.2016,(5),6, 70-77.
  9. Sun, P. J. "Privacy protection and data security in cloud computing: a survey, challenges, and solutions," IEEE Access. 2019, vol. 7, pp. 147420-147452. https://doi.org/10.1109/ACCESS.2019.2946185
  10. Venkatraman, S.; Venkatraman, R. "Big data security challenges and strategies" AIMS Math. 2019, vol. 4, no. 3, pp. 860-879. https://doi.org/10.3934/math.2019.3.860
  11. Alaoui, I. E.; Gahi, Y.; Messoussi, R. "Full consideration of Big Data characteristics in sentiment analysis context," in 2019 IEEE 4th International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), 2019, pp. 126-130.
  12. Panimalar, A.; Shree, V.; Kathrine, V. "The 17 V's Of Big Data," Int. Res. J. Eng. Technol. 2017, vol. 4, no. 09, pp. 329-333.
  13. Desai, P. V. "A survey on big data applications and challenges," in 2018 second international conference on inventive communication and computational technologies (ICICCT), 2018, pp. 737-740.
  14. Shi, P.; Cui, Y.; Xu, K.; Zhang, M.; Ding, L. "Data Consistency Theory and Case Study for Scientific Big Data," Information.2019, vol. 10, no. 4, p. 137. https://doi.org/10.3390/info10040137
  15. Ramasamy A.; Chowdhury, S. "Big Data Quality Dimensions: A Systematic Literature Review," J. Inf. Syst. Technol. Manag. 2020, vol. 17.
  16. Yang, P.; Xiong, N.; Ren, J. "Data Security and Privacy Protection for Cloud Storage: A Survey," IEEE Access, 2020, vol. 8, pp. 131723-131740. https://doi.org/10.1109/ACCESS.2020.3009876
  17. Espinosa, J. A.; Kaiser, S.; Armour, F.; Money, W. "Big Data Redux: New Issues and Challenges Moving Forward", In Proceedings of the 52nd Hawaii International Conference on System Sciences.2019.
  18. Khare, S.; Totaro, M. "Big Data in IoT," in 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), 2019, pp. 1-7.
  19. Bertino, E.; Ferrari, E. "Big data security and privacy," in A Comprehensive Guide through the Italian Database Research over the Last 25 Years, Springer. 2018, pp. 425-439.
  20. BigDataWorkingGroup, "Expanded Top Ten Big Data Security and Privacy Challenges," 2013. [Online]. Available:https://downloads.cloudsecurityalliance.org/initiatives/bdwg/Expanded_Top_Ten_Big_Data_Security_and_Privacy_Challenges.pdf.[Accessed: 27-Feb2016].
  21. Joshi, N.; Kadhiwala, B. "Big data security and privacy issues-A survey," in 2017 Innovations in Power and Advanced Computing Technologies (i-PACT), 2017, pp. 1-5.
  22. Terzi, D. S.; Terzi, R.; Sagiroglu, S. "A survey on security and privacy issues in big data" in 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), 2015, pp. 202-207.
  23. Almarhabi, K.; Jambi, K.; Eassa, F.; Batarfi, O. "Survey on access control and management issues in cloud and BYOD environment,".2017, Vol.6, pg. 44-54.
  24. Reddy, Y. B. "Access control mechanisms in Big Data processing," Softw. Eng. Appl. Adv. Power Energy Syst. 2015, pp. 2015-2829.
  25. Xiao, Z.; Xiao, Y. "Achieving accountable MapReduce in cloud computing," Futur. Gener. Comput. Syst. 2014, vol. 30, pp. 1-13. https://doi.org/10.1016/j.future.2013.07.001
  26. Centonze, P.; Kim, D. Y.; Kim, S. "Security and privacy frameworks for access control big data systems," Comput. Mater. Contin. 2019, vol. 59, no. 2, pp. 361-374. https://doi.org/10.32604/cmc.2019.06223
  27. Kumar, T. K. A.; Liu, H.; Thomas, J. P.; Hou, X. "Content sensitivity based access control framework for Hadoop," Digit. Commun. Networks. 2017, vol. 3, no. 4, pp. 213-225. https://doi.org/10.1016/j.dcan.2017.07.007
  28. Gupta, M.; Patwa, F.; Sandhu, R. "An attribute-based access control model for secure big data processing in Hadoop ecosystem," in Proceedings of the Third ACM Workshop on Attribute-Based Access Control, 2018, pp. 13-24.
  29. Wang, M.; Wang, J.; Guo, L.; Harn, L. "Inverted XML access control model based on ontology semantic dependency," Comput. Mater. Contin. 2018, vol. 55, no. 3, pp. 465-482.
  30. Li, L. J. "Secured Cloud Storage Scheme Based On Blockchain," in 2019 IEEE 2nd International Conference on Electronic Information and Communication Technology (ICEICT), 2019, pp. 137-142.
  31. Fan, K.; Lou, S.; Su, R.; Li, H.; Yang, Y. "Secure and private key management scheme in big data networking," Peer-to-Peer Netw. 2018, Appl., vol. 11, no. 5, pp. 992-999. https://doi.org/10.1007/s12083-017-0579-z
  32. Zikratov, I.; Kuzmin, A.; Akimenko, V.; Niculichev, V.; Yalansky, L. "Ensuring data integrity using Blockchain technology," in 2017 20th Conference of Open Innovations Association (FRUCT), 2017, pp. 534-539.
  33. Sowmiya, M.; Adimoolam, M. "Secure cloud storage model with hidden policy attribute-based access control," in 2014 International Conference on Recent Trends in Information Technology, 2014, pp. 1-6.
  34. Maesa, D. D. F.; Mori, P.; Ricci, L. "Blockchain-based access control," in IFIP international conference on distributed applications and interoperable systems, 2017, pp. 206-220.
  35. Xue, J.; Xu, C.; Zhang, Y. Private Blockchain-Based Secure Access Control for Smart Home Systems. KSII Trans. Internet Inf. Syst. 2018, 12, 6057-6078. https://doi.org/10.3837/tiis.2018.12.024
  36. Nelson B.; Olovsson, T. "Security and privacy for big data: A systematic literature review," in 2016 IEEE international conference on big data (big data), 2016, pp. 3693-3702.
  37. Zhang, W.; Lin, Y.; Xiao, S.; Wu, J.; Zhou, S. "Privacy-Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing," in IEEE Transactions on Computers. 2016, vol. 65, no. 5, pp. 1566- 1577. https://doi.org/10.1109/TC.2015.2448099
  38. Wan Z.; Deng, R. H. "VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data," in IEEE Transactions on Dependable and Secure Computing.2016, vol. PP, no. 99, pp. 1-1.
  39. Jiang, X.; Yu, J.; Kong, F.; Cheng, X.; Hao, R. "A Novel Privacy Preserving Keyword Search Scheme over Encrypted Cloud Data," 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), Krakow. 2015, pp. 836-839.
  40. Javier Alvarez et al, "Efficient development of high performance data analytics in Python", Future Generation Computer Systems. October 2020,Volume 111 , Pages 570-581. https://doi.org/10.1016/j.future.2019.09.051
  41. N. Deepa et al, "sA Survey on Blockchain for Big Data: Approaches, Opportunities, and Future Directions", availableon:https://www.researchgate.net/publication/344066677_A_Survey_on_Blockchain_for_Big_Data_Approaches_Opportunities_and_Future_Directions.
  42. Geoffrey Charles Fox et al, ≪Contributions to High-Performance Big Data Computing",Technical report,available on: https://www.researchgate.net/publication/328090399_ Contributions_to_High-Performance_Big_Data_ Computing.
  43. S. Riaz, A. H. Khan, M. Haroon, S. Latif, and S. Bhatti, "Big data security and privacy: Current challenges and future research perspective in cloud environment" in 2020 International Conference on Information Management and Technology (ICIMTech), 2020, pp. 977-982.