A key review on security and privacy of big data: issues, challenges, and future research directions

被引:8
作者
Demiroll, Doygun [1 ]
Das, Resul [2 ]
Hanbay, Davut [3 ]
机构
[1] Bingo Univ, Dept Comp Programming, TR-12000 Bingol, Turkey
[2] Firat Univ, Dept Software Engn, TR-23119 Elazig, Turkey
[3] Inonu Univ, Dept Comp Engn, TR-44000 Malatya, Turkey
关键词
Big data analytics; Security; Privacy; Big data applications; ANALYTICS;
D O I
10.1007/s11760-022-02341-w
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Big data collection means collecting large volumes of data to have insight into better business decisions and greater customer satisfaction. Securing big data is difficult not just because of the large amount of data it handles, but also because of the continuous streaming of data, multiple types of data, and cloud-based data storage. Additionally, traditional security and privacy methods are insufficient due to large data volume, speed, and data from different sources. In this study, we focused on the security and privacy issues of big data. To this end, many related articles published in the literature have been extensively examined. Moreover, within the scope of big data, data security and privacy practices, current technologies, and methods are presented. Furthermore, we present an analysis of the security requirements of big data and the elimination of security vulnerabilities against cyber attacks.
引用
收藏
页码:1335 / 1343
页数:9
相关论文
共 41 条
[1]   Time-series clustering - A decade review [J].
Aghabozorgi, Saeed ;
Shirkhorshidi, Ali Seyed ;
Teh Ying Wah .
INFORMATION SYSTEMS, 2015, 53 :16-38
[2]   Improving MapReduce privacy by implementing multi-dimensional sensitivity-based anonymization [J].
Al-Zobbi M. ;
Shahrestani S. ;
Ruan C. .
Al-Zobbi, Mohammed (m.alzobbi@westernsydney.edu.au), 2017, SpringerOpen (04)
[3]   SoftSwitch: a centralized honeypot-based security approach using software-defined switching for secure management of VLAN networks [J].
Baykara, Muhammet ;
Das, Resul .
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2019, 27 (05) :3309-3325
[4]   Editorial: Introduction to Data Security and Privacy [J].
Bertino, Elisa .
DATA SCIENCE AND ENGINEERING, 2016, 1 (03) :125-126
[5]  
Box P., 2020, XSS PAYLOAD DATASET
[6]   An efficient and scalable privacy preserving algorithm for big data and data streams [J].
Chamikara, M. A. P. ;
Bertok, P. ;
Liu, D. ;
Camtepe, S. ;
Khalil, I .
COMPUTERS & SECURITY, 2019, 87
[7]   Efficient privacy preservation of big data for accurate data mining [J].
Chamikara, M. A. P. ;
Bertok, P. ;
Liu, D. ;
Camtepe, S. ;
Khalil, I .
INFORMATION SCIENCES, 2020, 527 :420-443
[8]   Efficient data perturbation for privacy preserving and accurate data stream mining [J].
Chamikara, M. A. P. ;
Bertok, P. ;
Liu, D. ;
Camtepe, S. ;
Khalil, I .
PERVASIVE AND MOBILE COMPUTING, 2018, 48 :1-19
[9]   Enhancing big data security through integrating XSS scanner into fog nodes for SMEs gain [J].
Chaudhary, Pooja ;
Gupta, Brij B. ;
Chang, Xiaojun ;
Nedjah, Nadia ;
Chui, Kwok Tai .
TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE, 2021, 168
[10]   Data-intensive applications, challenges, techniques and technologies: A survey on Big Data [J].
Chen, C. L. Philip ;
Zhang, Chun-Yang .
INFORMATION SCIENCES, 2014, 275 :314-347