Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security

被引:69
作者
Rawat, Danda B. [1 ]
Doku, Ronald [1 ]
Garuba, Moses [1 ]
机构
[1] Howard Univ, Data Sci & Cybersecur Ctr DSC2, Dept Elect Engn & Comp Sci, Washington, DC 20059 USA
基金
美国国家科学基金会;
关键词
Big Data; Computer security; Electronic mail; Tools; Botnet; Market research; Big data security; big data driven security; IDS; IPS; data analytics; PRIVACY;
D O I
10.1109/TSC.2019.2907247
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
''Knowledge is power" is an old adage that has been found to be true in today's information age. Knowledge is derived from having access to information. The ability to gather information from large volumes of data has become an issue of relative importance. Big Data Analytics (BDA) is the term coined by researchers to describe the art of processing, storing and gathering large amounts of data for future examination. Data is being produced at an alarming rate. The rapid growth of the Internet, Internet of Things (IoT) and other technological advances are the main culprits behind this sustained growth. The data generated is a reflection of the environment it is produced out of, thus we can use the data we get out of systems to figure out the inner workings of that system. This has become an important feature in cybersecurity where the goal is to protect assets. Furthermore, the growing value of data has made big data a high value target. In this paper, we explore recent research works in cybersecurity in relation to big data. We highlight how big data is protected and how big data can also be used as a tool for cybersecurity. We summarize recent works in the form of tables and have presented trends, open research challenges and problems. With this paper, readers can have a more thorough understanding of cybersecurity in the big data era, as well as research trends and open challenges in this active research area.
引用
收藏
页码:2055 / 2072
页数:18
相关论文
共 142 条
[1]  
Abouelmehdi K, 2016, INT CONF MULTIMED, P731, DOI 10.1109/ICMCS.2016.7905621
[2]  
Achana RA, 2015, 2015 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE), P546, DOI 10.1109/WIECON-ECE.2015.7443990
[3]  
Adluru Pradeep., 2015, SYSTEMS APPL TECHNOL, P1, DOI DOI 10.1109/LISAT.2015.7160211
[4]   A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Usinga Fog Computing Facility With Pairing-Based Cryptography [J].
Al Hamid, Hadeal Abdulaziz ;
Rahman, Sk Md Mizanur ;
Hossain, M. Shamim ;
Almogren, Ahmad ;
Alamri, Atif .
IEEE ACCESS, 2017, 5 :22313-22328
[5]  
Al Mamun A, 2017, 2017 FOURTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), P93, DOI 10.1109/SDS.2017.7939147
[6]  
Al-Shomrani A, 2017, 2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC), P70, DOI 10.1109/Anti-Cybercrime.2017.7905266
[7]  
Alaa Kadhim F., 2017, 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT), P80, DOI 10.1109/NTICT.2017.7976119
[8]  
Alajrami, 2016, 2016 IEEE CAN C EL C, P1
[9]  
ALMUHAMMADI S, 2017, PROC IEEE 7 ANN COMP, P1
[10]  
Alsubaihi S., 2016, Performance Computing and Communications Conference (IPCCC) Poster, 2016 IEEE 35th International, P1