Big Data Key Challenges

被引:0
作者
Alotaibi, Sultan [1 ]
机构
[1] Umm Al Qura Univ, Coll Comp & Informat Syst, Mecca 24381, Saudi Arabia
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2022年 / 22卷 / 04期
关键词
Access Control; Big data; Privacy; Authentication; DATA PRIVACY;
D O I
10.22937/IJCSNS.2022.22.4.40
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The big data term refers to the great volume of data and complicated data structure with difficulties in collecting, storing, processing, and analyzing these data. Big data analytics refers to the operation of disclosing hidden patterns through big data. This information and data set cloud to be useful and provide advanced services. However, analyzing and processing this information could cause revealing and disclosing some sensitive and personal information when the information is contained in applications that are correlated to users such as location-based services, but concerns are diminished if the applications are correlated to general information such as scientific results. In this work, a survey has been done over security and privacy challenges and approaches in big data. The challenges included here are in each of the following areas: privacy, access control, encryption, and authentication in big data. Likewise, the approaches presented here are privacy-preserving approaches in big data, access control approaches in big data, encryption approaches in big data, and authentication approaches in big data.
引用
收藏
页码:340 / 350
页数:11
相关论文
共 21 条
  • [1] An access control mechanism for large scale data dissemination systems
    Bertino, E
    Ferrari, E
    Pitoura, E
    [J]. ELEVENTH INTERNATIONAL WORKSHOP ON RESEARCH ISSUES IN DATA ENGINEERING, PROCEEDINGS: DOCUMENT MANAGEMENT FOR DATA INTENSIVE BUSINESS AND SCIENTIFIC APPLICATIONS, 2001, : 43 - 50
  • [2] Privacy Preserving Data Analytics for Smart Homes
    Chakravorty, Antorweep
    Wlodarczyk, Tomasz
    Rong, Chunming
    [J]. IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, : 23 - 27
  • [3] Chen X, 2013, IEEE INT SYMP CIRC S, P441, DOI 10.1109/ISCAS.2013.6571875
  • [4] An Approach to Protect the Privacy of Cloud Data from Data Mining Based Attacks
    Dev, Himel
    Sen, Tanmoy
    Basak, Madhusudan
    Ali, Mohammed Eunus
    [J]. 2012 SC COMPANION: HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS (SCC), 2012, : 1106 - 1115
  • [5] Dinh T. T. A., 2012, ARXIV PREPRINT ARXIV
  • [6] Dong C., 2013, P 20 ACM C COMP COMM, P789
  • [7] A Survey of Big Data Security and Privacy Preserving
    Fang, Wei
    Wen, Xue Zhi
    Zheng, Yu
    Zhou, Ming
    [J]. IETE TECHNICAL REVIEW, 2017, 34 (05) : 544 - 560
  • [8] Huang XL, 2014, IEEE CONF COMPUT, P512, DOI 10.1109/INFCOMW.2014.6849284
  • [9] Jain P, 2017, INT J COMPUT SCI NET, V17, P148
  • [10] Kumar A, 2012, 2012 6TH INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION SCIENCE, SERVICE SCIENCE AND DATA MINING (ISSDM2012), P162