Please use this identifier to cite or link to this item: https://doi.org/10.3934/math.2019.3.860
Title: Big data security challenges and strategies
Authors: Venkatraman, S.
Venkatraman, R. 
Keywords: Big data
Blockchain technology
Cloud computing
Data analytics
Privacy issues
Security risks
Issue Date: 2019
Publisher: American Institute of Mathematical Sciences
Citation: Venkatraman, S., Venkatraman, R. (2019). Big data security challenges and strategies. AIMS Mathematics 4 (3) : 860-879. ScholarBank@NUS Repository. https://doi.org/10.3934/math.2019.3.860
Rights: Attribution 4.0 International
Abstract: Big data, a recently popular term that refers to a massive collection of very large and complex data sets, is facing serious security and privacy challenges. Due to the typical characteristics of big data, namely velocity, volume and variety associated with large-scale cloud infrastructures and the Internet of Things (IoT), traditional security and privacy mechanisms are inadequate and unable to cope with the rapid data explosion in such a complex distributed computing environment. With big data analytics being widely used by businesses and government for decision making, security risk mitigation plays an important role in big data infrastructures worldwide. Traditional security mechanisms have failed to cope with the scalability, interoperability and adaptability of contemporary technologies that are required for big data. This paper takes an exploratory initial step using first principles to address this gap in literature. Firstly, we establish the current trends in big data comprehensively by identifying eleven Vs as important dimensions of big data, which form the contributing factors having an impact on the impending security problem. Next, we map the eleven Vs to the three phases of big data life cycle in order to unearth the major security and privacy challenges of big data. Finally, the paper provides four practical strategies adapted from contemporary technologies such as data provenance, encryption and access control, data mining and blockchain, identifying their associated real implementation examples. This work would pave way for future research investigations in this important big data security arena. © 2019 the Author(s), licensee AIMS Press.
Source Title: AIMS Mathematics
URI: https://scholarbank.nus.edu.sg/handle/10635/206375
ISSN: 2473-6988
DOI: 10.3934/math.2019.3.860
Rights: Attribution 4.0 International
Appears in Collections:Elements
Staff Publications

Show full item record
Files in This Item:
File Description SizeFormatAccess SettingsVersion 
10_3934_math_2019_3_860.pdf1.19 MBAdobe PDF

OPEN

NoneView/Download

Google ScholarTM

Check

Altmetric


This item is licensed under a Creative Commons License Creative Commons