Please use this identifier to cite or link to this item:
https://doi.org/10.3934/math.2019.3.860
Title: | Big data security challenges and strategies | Authors: | Venkatraman, S. Venkatraman, R. |
Keywords: | Big data Blockchain technology Cloud computing Data analytics Privacy issues Security risks |
Issue Date: | 2019 | Publisher: | American Institute of Mathematical Sciences | Citation: | Venkatraman, S., Venkatraman, R. (2019). Big data security challenges and strategies. AIMS Mathematics 4 (3) : 860-879. ScholarBank@NUS Repository. https://doi.org/10.3934/math.2019.3.860 | Rights: | Attribution 4.0 International | Abstract: | Big data, a recently popular term that refers to a massive collection of very large and complex data sets, is facing serious security and privacy challenges. Due to the typical characteristics of big data, namely velocity, volume and variety associated with large-scale cloud infrastructures and the Internet of Things (IoT), traditional security and privacy mechanisms are inadequate and unable to cope with the rapid data explosion in such a complex distributed computing environment. With big data analytics being widely used by businesses and government for decision making, security risk mitigation plays an important role in big data infrastructures worldwide. Traditional security mechanisms have failed to cope with the scalability, interoperability and adaptability of contemporary technologies that are required for big data. This paper takes an exploratory initial step using first principles to address this gap in literature. Firstly, we establish the current trends in big data comprehensively by identifying eleven Vs as important dimensions of big data, which form the contributing factors having an impact on the impending security problem. Next, we map the eleven Vs to the three phases of big data life cycle in order to unearth the major security and privacy challenges of big data. Finally, the paper provides four practical strategies adapted from contemporary technologies such as data provenance, encryption and access control, data mining and blockchain, identifying their associated real implementation examples. This work would pave way for future research investigations in this important big data security arena. © 2019 the Author(s), licensee AIMS Press. | Source Title: | AIMS Mathematics | URI: | https://scholarbank.nus.edu.sg/handle/10635/206375 | ISSN: | 2473-6988 | DOI: | 10.3934/math.2019.3.860 | Rights: | Attribution 4.0 International |
Appears in Collections: | Elements Staff Publications |
Show full item record
Files in This Item:
File | Description | Size | Format | Access Settings | Version | |
---|---|---|---|---|---|---|
10_3934_math_2019_3_860.pdf | 1.19 MB | Adobe PDF | OPEN | None | View/Download |
This item is licensed under a Creative Commons License