Skip to main content

Security and Privacy in Big Data Lifetime: A Review

  • Conference paper
  • First Online:
Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10067))

Abstract

Due to the fast growth of emerging information technologies such as Internet of Things (IoT), cloud computing, Internet services, and social networking, an increasing interest in big data security and privacy is aroused. An entire lifetime of big data contains four phases: big data collection; transmission; processing and analytics; storage and management. However, the five salient features of big data: volume, variety, velocity, value, and veracity bring great challenges on protecting big data security and privacy during its whole lifetime. In this paper, we survey schemes and techniques that are applied to ensure big data security and privacy. Based on the literature review, we discuss open challenges and issues in this research area towards comprehensive protection on big data security and privacy in its lifetime.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gantz, J., John, Reinsel, D.: The digital universe in 2020: big data, bigger digital shadows, and biggest growth in the far east. In: IDC iView: IDC Analyze the Future, pp. 1–16 (2007)

    Google Scholar 

  2. Snijders, C., Matzat, U., Reips, U.D.: “Big data”: Big gaps of knowledge in the field of internet science. Int. J. Internet Sci. 7, 1–5 (2012)

    Google Scholar 

  3. De Mauro, A., Greco, M., Grimaldi, M.: A formal definition of Big Data based on its essential features. Libr. Rev. 65, 122–135 (2016)

    Article  Google Scholar 

  4. Tan, Z., Nagar, U.T., He, X., Nanda, P., Liu, R.P., Wang, S., Hu, J.: Enhancing big data security with collaborative intrusion detection. IEEE Cloud Computing 1, 27–33 (2014). IEEE

    Article  Google Scholar 

  5. Sung, S., Youn, C., Kong, E., and Ryou, J.: A distributed mobile cloud computing model for secure big data. In: 2016 International Conference on Information Networking (ICOIN), pp. 312–316. IEEE (2016)

    Google Scholar 

  6. Subashini, S., Kavitha, V.: A survey issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34, 1–11 (2011)

    Article  Google Scholar 

  7. Srinivas, S., Nair, A.: Security maturity in NoSQL database-are they secure enough to haul the modern IT applications? In: Advances in Computing, Communications and Informatics (ICACCI), pp. 739–744. IEEE (2015)

    Google Scholar 

  8. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: An update. SIGKDD Explor. 11, 10–18 (2009)

    Article  Google Scholar 

  9. Abawajy, J.H., Kelarev, A., Chowdhury, M.: Large iterative multitier ensemble classifiers for security of big data. IEEE Trans. Emerg. 2, 352–363 (2014). IEEE

    Google Scholar 

  10. Yao, A.C.: Protocol for secure computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundation of Computer Science, pp. 160–164. IEEE (1982)

    Google Scholar 

  11. Titze, D., Hofinger, H., and Schoo, P.: Using secure multiparty computation for collaborative information exchange. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1717–1722. IEEE (2013)

    Google Scholar 

  12. Laud, P.: A private lookup protocol with low online complexity for secure multiparty computation. In: Hui, L.C.K., Qing, S.H., Shi, E., Yiu, S.M. (eds.) ICICS 2014. LNCS, vol. 8958, pp. 143–157. Springer, Heidelberg (2015). doi:10.1007/978-3-319-21966-0_11

    Chapter  Google Scholar 

  13. Damgård, I., Nielsen, J.B.: Universally composable efficient multiparty computation from threshold homomorphic encryption. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 247–264. Springer, Heidelberg (2003). doi:10.1007/978-3-540-45146-4_15

    Chapter  Google Scholar 

  14. Jahan, I. Sharmy, N. N., Jahan, S., Ebha, F. A., and Lisa, N. J.: Design of a secure sum protocol using trusted third party system for secure multi-party computations. In: Information and Communication Systems (ICICS), 2015 6th International Conference on IEEE, pp. 136–141. IEEE (2015)

    Google Scholar 

  15. Gentry C.: A fully homomorphic encryption scheme. In: Dissertation Stanford University (2009)

    Google Scholar 

  16. Liu, W., Uluagac, A. S., Beyah, R.: MACA: a privacy-preserving multi-factor cloud authentication system utilizing big data. In: 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 518–523. IEEE (2014)

    Google Scholar 

  17. Rahmani, A., Amine, A., and Mohamed, R.H.: A multilayer evolutionary homomorphic encryption approach for privacy preserving over big data. In: Cyber-Enable Distributed Computing and Knowledge Discovery (CyberC), pp. 19–26. IEEE (2014)

    Google Scholar 

  18. Chabanne, H., Phan, D.H., Pointcheval, D.: Public traceability in traitor tracing schemes. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 542–558. Springer, Heidelberg (2005). doi:10.1007/11426639_32

    Chapter  Google Scholar 

  19. Baharon, M. R., Shi, Q., Llewellyn-Jones, D., and Merabti,M.: Secure rendering process in cloud computing. In: Eleventh Annual International Conference on Privacy, pp. 82–87. Security and Trust (PST) (2013)

    Google Scholar 

  20. Zhang, X., Dou, W., Pei, J., Nepal, S., Yang, C., Liu, C., Chen, J.: Proximity-Aware Local-Recoding anonymization with MapReduce for scalable big data privacy preservation in cloud. IEEE Trans. Comput. 64, 2293–2306 (2015). IEEE

    Article  MathSciNet  Google Scholar 

  21. Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving public auditing for data storage security in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp. 1–9, 14–19. IEEE (2010)

    Google Scholar 

  22. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A.V.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258, 371–386 (2014). ACM

    Article  Google Scholar 

  23. Liu, C., Ranjan, R., Yang, C., Zhang, X., Wang, L., Chen, J.: MuR-DPA: Top-Down levelled Multi-Replica Merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans. Comput. 64, 2609–2622 (2015). IEEE

    Article  MathSciNet  Google Scholar 

  24. Yang, K., Jia, X.: Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Trans. Parallel Distrib. Syst. 25, 1735–1744 (2014). IEEE

    Article  Google Scholar 

  25. Yang, K., Jia, X., Ren, K.: Secure and verifiable policy update outsourcing for big data access control in the cloud. IEEE Trans. Parall. Distrib. Syst. 26, 3461–3470 (2014). IEEE

    Article  Google Scholar 

  26. Shrivastva, K.M.P., Rizvi, M.A., Singh, S.: Big data privacy based on differential privacy a hope for big data. In: 2014 International Conference on Computation Intelligence and Communication Networks (CICN), pp. 776–781. IEEE (2014)

    Google Scholar 

Download references

Acknowledgments

This work is sponsored by the National Key Research and Development Program of China (grant 2016YFB0800704), the NSFC (grants 61672410 and U1536202), the 111 project (grants B08038 and B16037), the Ph.D. Programs Foundation of Ministry of Education of China (grant JY0300130104), the Project Supported by Natural Science Basic Research Plan in Shaanxi Province of China (Program No. 2016ZDJC-06), and Aalto University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zheng Yan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Chen, H., Yan, Z. (2016). Security and Privacy in Big Data Lifetime: A Review. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy and Anonymity in Computation, Communication and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10067. Springer, Cham. https://doi.org/10.1007/978-3-319-49145-5_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49145-5_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49144-8

  • Online ISBN: 978-3-319-49145-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics