Please use this identifier to cite or link to this item: https://doi.org/10.3934/math.2019.3.860
DC FieldValue
dc.titleBig data security challenges and strategies
dc.contributor.authorVenkatraman, S.
dc.contributor.authorVenkatraman, R.
dc.date.accessioned2021-11-16T05:10:20Z
dc.date.available2021-11-16T05:10:20Z
dc.date.issued2019
dc.identifier.citationVenkatraman, S., Venkatraman, R. (2019). Big data security challenges and strategies. AIMS Mathematics 4 (3) : 860-879. ScholarBank@NUS Repository. https://doi.org/10.3934/math.2019.3.860
dc.identifier.issn2473-6988
dc.identifier.urihttps://scholarbank.nus.edu.sg/handle/10635/206375
dc.description.abstractBig data, a recently popular term that refers to a massive collection of very large and complex data sets, is facing serious security and privacy challenges. Due to the typical characteristics of big data, namely velocity, volume and variety associated with large-scale cloud infrastructures and the Internet of Things (IoT), traditional security and privacy mechanisms are inadequate and unable to cope with the rapid data explosion in such a complex distributed computing environment. With big data analytics being widely used by businesses and government for decision making, security risk mitigation plays an important role in big data infrastructures worldwide. Traditional security mechanisms have failed to cope with the scalability, interoperability and adaptability of contemporary technologies that are required for big data. This paper takes an exploratory initial step using first principles to address this gap in literature. Firstly, we establish the current trends in big data comprehensively by identifying eleven Vs as important dimensions of big data, which form the contributing factors having an impact on the impending security problem. Next, we map the eleven Vs to the three phases of big data life cycle in order to unearth the major security and privacy challenges of big data. Finally, the paper provides four practical strategies adapted from contemporary technologies such as data provenance, encryption and access control, data mining and blockchain, identifying their associated real implementation examples. This work would pave way for future research investigations in this important big data security arena. © 2019 the Author(s), licensee AIMS Press.
dc.publisherAmerican Institute of Mathematical Sciences
dc.rightsAttribution 4.0 International
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/
dc.sourceScopus OA2019
dc.subjectBig data
dc.subjectBlockchain technology
dc.subjectCloud computing
dc.subjectData analytics
dc.subjectPrivacy issues
dc.subjectSecurity risks
dc.typeReview
dc.contributor.departmentINSTITUTE OF SYSTEMS SCIENCE
dc.description.doi10.3934/math.2019.3.860
dc.description.sourcetitleAIMS Mathematics
dc.description.volume4
dc.description.issue3
dc.description.page860-879
Appears in Collections:Elements
Staff Publications

Show simple item record
Files in This Item:
File Description SizeFormatAccess SettingsVersion 
10_3934_math_2019_3_860.pdf1.19 MBAdobe PDF

OPEN

NoneView/Download

Google ScholarTM

Check

Altmetric


This item is licensed under a Creative Commons License Creative Commons