Abstract
Due to the fast growth of emerging information technologies such as Internet of Things (IoT), cloud computing, Internet services, and social networking, an increasing interest in big data security and privacy is aroused. An entire lifetime of big data contains four phases: big data collection; transmission; processing and analytics; storage and management. However, the five salient features of big data: volume, variety, velocity, value, and veracity bring great challenges on protecting big data security and privacy during its whole lifetime. In this paper, we survey schemes and techniques that are applied to ensure big data security and privacy. Based on the literature review, we discuss open challenges and issues in this research area towards comprehensive protection on big data security and privacy in its lifetime.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gantz, J., John, Reinsel, D.: The digital universe in 2020: big data, bigger digital shadows, and biggest growth in the far east. In: IDC iView: IDC Analyze the Future, pp. 1–16 (2007)
Snijders, C., Matzat, U., Reips, U.D.: “Big data”: Big gaps of knowledge in the field of internet science. Int. J. Internet Sci. 7, 1–5 (2012)
De Mauro, A., Greco, M., Grimaldi, M.: A formal definition of Big Data based on its essential features. Libr. Rev. 65, 122–135 (2016)
Tan, Z., Nagar, U.T., He, X., Nanda, P., Liu, R.P., Wang, S., Hu, J.: Enhancing big data security with collaborative intrusion detection. IEEE Cloud Computing 1, 27–33 (2014). IEEE
Sung, S., Youn, C., Kong, E., and Ryou, J.: A distributed mobile cloud computing model for secure big data. In: 2016 International Conference on Information Networking (ICOIN), pp. 312–316. IEEE (2016)
Subashini, S., Kavitha, V.: A survey issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34, 1–11 (2011)
Srinivas, S., Nair, A.: Security maturity in NoSQL database-are they secure enough to haul the modern IT applications? In: Advances in Computing, Communications and Informatics (ICACCI), pp. 739–744. IEEE (2015)
Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: An update. SIGKDD Explor. 11, 10–18 (2009)
Abawajy, J.H., Kelarev, A., Chowdhury, M.: Large iterative multitier ensemble classifiers for security of big data. IEEE Trans. Emerg. 2, 352–363 (2014). IEEE
Yao, A.C.: Protocol for secure computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundation of Computer Science, pp. 160–164. IEEE (1982)
Titze, D., Hofinger, H., and Schoo, P.: Using secure multiparty computation for collaborative information exchange. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1717–1722. IEEE (2013)
Laud, P.: A private lookup protocol with low online complexity for secure multiparty computation. In: Hui, L.C.K., Qing, S.H., Shi, E., Yiu, S.M. (eds.) ICICS 2014. LNCS, vol. 8958, pp. 143–157. Springer, Heidelberg (2015). doi:10.1007/978-3-319-21966-0_11
Damgård, I., Nielsen, J.B.: Universally composable efficient multiparty computation from threshold homomorphic encryption. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 247–264. Springer, Heidelberg (2003). doi:10.1007/978-3-540-45146-4_15
Jahan, I. Sharmy, N. N., Jahan, S., Ebha, F. A., and Lisa, N. J.: Design of a secure sum protocol using trusted third party system for secure multi-party computations. In: Information and Communication Systems (ICICS), 2015 6th International Conference on IEEE, pp. 136–141. IEEE (2015)
Gentry C.: A fully homomorphic encryption scheme. In: Dissertation Stanford University (2009)
Liu, W., Uluagac, A. S., Beyah, R.: MACA: a privacy-preserving multi-factor cloud authentication system utilizing big data. In: 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 518–523. IEEE (2014)
Rahmani, A., Amine, A., and Mohamed, R.H.: A multilayer evolutionary homomorphic encryption approach for privacy preserving over big data. In: Cyber-Enable Distributed Computing and Knowledge Discovery (CyberC), pp. 19–26. IEEE (2014)
Chabanne, H., Phan, D.H., Pointcheval, D.: Public traceability in traitor tracing schemes. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 542–558. Springer, Heidelberg (2005). doi:10.1007/11426639_32
Baharon, M. R., Shi, Q., Llewellyn-Jones, D., and Merabti,M.: Secure rendering process in cloud computing. In: Eleventh Annual International Conference on Privacy, pp. 82–87. Security and Trust (PST) (2013)
Zhang, X., Dou, W., Pei, J., Nepal, S., Yang, C., Liu, C., Chen, J.: Proximity-Aware Local-Recoding anonymization with MapReduce for scalable big data privacy preservation in cloud. IEEE Trans. Comput. 64, 2293–2306 (2015). IEEE
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving public auditing for data storage security in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp. 1–9, 14–19. IEEE (2010)
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A.V.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258, 371–386 (2014). ACM
Liu, C., Ranjan, R., Yang, C., Zhang, X., Wang, L., Chen, J.: MuR-DPA: Top-Down levelled Multi-Replica Merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans. Comput. 64, 2609–2622 (2015). IEEE
Yang, K., Jia, X.: Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Trans. Parallel Distrib. Syst. 25, 1735–1744 (2014). IEEE
Yang, K., Jia, X., Ren, K.: Secure and verifiable policy update outsourcing for big data access control in the cloud. IEEE Trans. Parall. Distrib. Syst. 26, 3461–3470 (2014). IEEE
Shrivastva, K.M.P., Rizvi, M.A., Singh, S.: Big data privacy based on differential privacy a hope for big data. In: 2014 International Conference on Computation Intelligence and Communication Networks (CICN), pp. 776–781. IEEE (2014)
Acknowledgments
This work is sponsored by the National Key Research and Development Program of China (grant 2016YFB0800704), the NSFC (grants 61672410 and U1536202), the 111 project (grants B08038 and B16037), the Ph.D. Programs Foundation of Ministry of Education of China (grant JY0300130104), the Project Supported by Natural Science Basic Research Plan in Shaanxi Province of China (Program No. 2016ZDJC-06), and Aalto University.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Chen, H., Yan, Z. (2016). Security and Privacy in Big Data Lifetime: A Review. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy and Anonymity in Computation, Communication and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10067. Springer, Cham. https://doi.org/10.1007/978-3-319-49145-5_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-49145-5_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49144-8
Online ISBN: 978-3-319-49145-5
eBook Packages: Computer ScienceComputer Science (R0)