Skip to main content

Managing Multimedia Big Data: Security and Privacy Perspective

  • Conference paper
  • First Online:
ICT Systems and Sustainability

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1077))

Abstract

Multimedia Big Data (MMBD) is growing day by day because data is created by everyone and for everything from mobile devices, digital camera, digital game, multimedia sensor, video lectures, and social networking sites, etc. It is observed that various organizations and businesses moving toward it and taking out the benefits from it. MMBD has its applications in various fields that containing social networking sites, science and research, business enterprises, surveillance image and video, health care industries, etc. Huge size of data is being transfered from the Internet in each second. Due to increase in MMBD, it is necessary to protect this data from external threats or malicious attacks which can affect privacy, integrity, and genuineness of information systems. Therefore, to protect the integrity, identity, and security of individual’s data from these unwanted malicious attacks, an effective security mechanism is much needed. In this paper, the author discussed about the current issues in MMBD and security approaches to deal with these issues and also, focus on multimedia big data security and privacy. It also enumerated the directions to be taken while using MMBD along with security measures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wang, Z., Mao, S., Yang, L., Tang, P.: A survey of multimedia big data. China Commun. 15(1), 155–176 (2018). http://www.eng.auburn.edu/~szm0001/papers/CNCOMM-2017-0044.final.pdf

    Article  Google Scholar 

  2. Zhu, W., Cui, P., Wang, Z., Hua, G.: Multimedia big data computing. IEEE MultiMedia 22(3), 96–106 (2015)

    Article  Google Scholar 

  3. Wang, X., Gao, L., Mao, S., Pandey, S.: CSI-based fingerprinting for indoor localization: a deep learning approach. IEEE Trans. Veh. Technol. 66(1), 763–776 (2017)

    Google Scholar 

  4. Zikopoulos, P., Parasuraman, K., Deutsch, T., Giles, J., Corrigan, D., et al.: Harness the Power of Big Data The IBM Big Data Platform. McGraw-Hill Professional, New York, NY (2012)

    Google Scholar 

  5. Davidson, J., Liebald, B., Liu, J., Nandy, P., Vleet, T.V., Gargi, U., Gupta, S., He, Y., Lambert, M., Livingston, B., et al.: The YouTube video recommendation system. In: Proceedings of the 4th ACM Conference on Recommender Systems. ACM, pp. 293–296 (2010)

    Google Scholar 

  6. Bian, J., Yang, Y., Chua, T.S.: Multimedia summarization for trending topics in microblogs. In: Proceedings of the 22nd ACM International Conference on Information and Knowledge Management. ACM, pp. 1807–1812 (2013)

    Google Scholar 

  7. Fleites, F., Wang, H., Chen, S.C.: TV shopping via multi-cue product detection. IEEE Trans. Emerg. Top Comput. 3, 161–171 (2015)

    Google Scholar 

  8. Chang, Y.F., Chen, C.S., Zhou, H.: Smart phone for mobile commerce. Comput. Stand. Interfaces, 31, 740–747 (2009)

    Article  Google Scholar 

  9. Ye, C., Xiong, Z., Ding, Y., Zhang, K.: Secure multimedia big data sharing in social networking using fingerprinting and encryption in the JPEG2000 compressed domain. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communication (TrustCom) (2014)

    Google Scholar 

  10. Tufekci, Z.: Big questions for social media big data: representativeness, validity and other methodological pitfalls. In: Proceedings of the Eighth International Conference on Weblogs and Social Media. Michigan, USA, pp. 505–514 (2014)

    Google Scholar 

  11. Smith, J.R.: Riding the multimedia big data wave. In: Proceedings of the 36th International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, Dublin, Ireland, pp. 1–2 (2013)

    Google Scholar 

  12. Toshiwal, R., Dastidar, K.G., Nath, A.: Big data security issues and challenges. Int. J. Innov. Res. Adv. Eng. 2 (2015)

    Google Scholar 

  13. Tri Do, T.M., Blom, J., Perez, D.G.: Smartphone usage in the wild: a large-scale analysis of applications and context. In: Proceedings of the 13th International Conference on Multimodal Interfaces, ACM, pp. 313–360 (2011)

    Google Scholar 

  14. Chen, M.: A hierarchical security model for multimedia big data. Int. J. Multimed. Data Eng. Manag. 5, 1–13 (2014)

    Article  Google Scholar 

  15. Zhu, W., Cui, P., Wang, Z., Hua, G.: Multimedia big data computing. IEEE Multimed. 22(3), 96–106 (2015)

    Article  Google Scholar 

  16. Tan, W., Yan, B., Li, K., Tian, Q.: Image retargeting for preserving robust local feature: application to mobile visual search. IEEE Trans. Multimed. 18, 128–137 (2016)

    Article  Google Scholar 

  17. Wang, X., Gao, L., Mao, S.: CSI phase fingerprinting for indoor localization with a deep learning approach. IEEE Internet Things J. 3(6), 1113–1123 (2016)

    Article  Google Scholar 

  18. Xiong, H.: Structure-based learning in sampling, representation and analysis for multimedia big data. In: Proceedings of 2015 IEEE International Conference on Multimedia Big Data (BigMM), Beijing, China, pp. 24–27 (2015)

    Google Scholar 

  19. Chezian, R.M., Bagyalakshmi, C.: A survey on cloud data security using encryption technique. Int. J. Adv. Res. Comput. Eng. Technol. 1(5) (2012)

    Google Scholar 

  20. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  Google Scholar 

  21. Gnanajeyaraman, R., Prasadh, K., Ramar: Audio encryption using higher dimensional chaotic map. Int. J. Recent Trends Eng. 1(2), 103 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajeev Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kapil, G., Ishrat, Z., Kumar, R., Agrawal, A., Khan, R.A. (2020). Managing Multimedia Big Data: Security and Privacy Perspective. In: Tuba, M., Akashe, S., Joshi, A. (eds) ICT Systems and Sustainability. Advances in Intelligent Systems and Computing, vol 1077. Springer, Singapore. https://doi.org/10.1007/978-981-15-0936-0_1

Download citation

Publish with us

Policies and ethics