CFP last date
20 December 2024
Reseach Article

A Proposed Multilayered Framework for Security and Privacy in Big Data

by Danish Bilal Ansari, Muhammad Abdul Khaliq
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 3
Year of Publication: 2022
Authors: Danish Bilal Ansari, Muhammad Abdul Khaliq
10.5120/ijca2022921989

Danish Bilal Ansari, Muhammad Abdul Khaliq . A Proposed Multilayered Framework for Security and Privacy in Big Data. International Journal of Computer Applications. 184, 3 ( Mar 2022), 20-31. DOI=10.5120/ijca2022921989

@article{ 10.5120/ijca2022921989,
author = { Danish Bilal Ansari, Muhammad Abdul Khaliq },
title = { A Proposed Multilayered Framework for Security and Privacy in Big Data },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2022 },
volume = { 184 },
number = { 3 },
month = { Mar },
year = { 2022 },
issn = { 0975-8887 },
pages = { 20-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number3/32314-2022921989/ },
doi = { 10.5120/ijca2022921989 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:20:32.988318+05:30
%A Danish Bilal Ansari
%A Muhammad Abdul Khaliq
%T A Proposed Multilayered Framework for Security and Privacy in Big Data
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 3
%P 20-31
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this day and age, Big Data is extensively used among numerous organizations. From gathering and storing sensitive data to performing analytics, Big Data plays a fundamental role in any organizational growth in various social and economic areas. With data secrecy, a huge volume of data creates different security and privacy concerns that lead to several threats and vulnerabilities. Conventional methodologies for secured data are no longer applicable when applied in the perspective of Big Data. This paper presents a detailed overview of Big Data characteristics regarding V’s and provides an insight into the analytics. It also addresses the security and privacy risks and proposed a multilayered framework to address and mitigate these challenges.

References
  1. Rusi, https://www.rusi.org/downloads/assets/rusi bigdata report 2013.pdf.
  2. Elisa Bertino, “Big Data – Security and Privacy”, 2015 IEEE International Congress on Big Data
  3. http://mylio.com/true-stories/next/how-many-digital-photos-will-be-taken-2017-repost
  4. http://www.internetlivestats.com/google-search-statistics/
  5. Xu, J. S., Zhang, E., Huang, C. -H., Chen, L. H. L., &Celik, N. (2014). Efficient multi-fidelity simulation optimization. Proceedings of 2014 winter simulation conference. GA: Savanna
  6. https://www.macrotrends.net/stocks/charts/AMZN/amazon/revenue
  7. Uthayasankar Sivarajah, Muhammad Mustafa Kamal, Zahir Irani, VishanthWeerakkody, “Critical analysis of Big Data challenges and analytical methods”, Journal of Business Research 70 (2017) 263–286
  8. T.K. Das, P. Mohan Kumar, “Big Data Analytics: A Framework for Unstructured Data Analysis”, International Journal of Engineering and Technology.
  9. Apache Hadoop, “What Is Apache Hadoop?”, https://hadoop.apache.org/, Accessed on 1-Nov-2019.
  10. Abdul Ghaffar Shoro, Tariq Rahim Soomro, “Big Data Analysis: Ap Spark Perspective”, Global Journal of Computer Science and Technology: C Software & Data Engineering.
  11. R. Cattell, (2010) "Scalable SQL and NoSQL Data Stores," ACM SIGMODRecord, vol. 39.
  12. L. Xu and W. Shi, "Security Theories and Practices for Big Data", Big Data Concepts, Theories, and Applications, 2016, pp. 157-192.
  13. S. Sudarsan, R. Jetley and S. Ramaswamy, "Security and Privacy of Big Data", Studies in Big Data, 2015, pp. 121-136.
  14. "Types of Network Attacks against Confidentiality, Integrity and Availability", Omnisecu.com, 2019. [Online]. Available: http://www.omnisecu.com/ccna-security/types-of-network-attacks.php. Accessed on 19-Dec-2019.
  15. Apache Cassandra Project, http://cassandra.apache.org/.
  16. A. Lakshman and P. Malik, “Cassandra: a decentralized structured storage system,” Operating Sys. Review, vol. 44, no. 2, pp. 35–40, 2010.
  17. https://www.guru99.com/what-is-big-data.html
  18. https://www.gartner.com/en/information-technology/glossary/identity-and-access-management-iam
  19. V. Reena Catherine, A. ShajinNargunam, Encryption Techniques to Ensure Data Confidentiality in Cloud, International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol 8, no. 11, 2019.
  20. https://en.wikipedia.org/wiki/Role-based_access_control
  21. https://en.wikipedia.org/wiki/File_integrity_monitoring
  22. Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010)
  23. Siddiqa, A., Karim, A. &Gani, A. Big data storage technologies: a survey, Frontiers of Information Technology & Electronic Engineering, vol 18, pp. 1040–1070(2017)
  24. W. Xindong, Z. Xingquan, W. Gong-Qing, et al. Data Mining with Big Data, IEEE T. Knowl. Data En., 26 (2014), 97–107.
  25. Stergiou C.L., Plageras A.P., Psannis K.E., Gupta B.B. (2020) Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network. In: Gupta B., Perez G., Agrawal D., Gupta D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham
  26. Rajabion, Lila &Shaltooki, Abdusalam&Taghikhah, Masoud &Ghasemi, Amirhossein &Badfar, Arshad. (2019). Healthcare big data processing mechanisms: The role of cloud computing. International Journal of Information Management. 49. 271-289.
  27. S. Bahulikar, "Security measures for the big data, virtualization and the cloud infrastructure," 2016 1st India International Conference on Information Processing (IICIP), Delhi, 2016, pp. 1-4.
  28. N. Chitransh, C. Mehrotra and A. S. Singh, "Risk for big data in the cloud," 2017 International Conference on Computing, Communication and Automation (ICCCA), Greater Noida, 2017, pp. 277-282
  29. C. Liu, C. Yang, X. Zhang, et al. External integrity verification for outsourced big data in cloud and IoT: a big picture, Future Gener. Comp. Sy., 49 (2015), 58–67.
  30. S. Arora, M. Kumar, P. Johri and S. Das, "Big heterogeneous data and its security: A survey," 2016 International Conference on Computing, Communication and Automation (ICCCA), Noida, 2016, pp. 37-40.
  31. I. de la Torre-Díez, B. Garcia-Zapirain, M. Lopez-Coronado, et al. Proposing telecardiology services on cloud for different medical institutions: a model of reference, Telemedicine and e-Health, 23 (2017), 654–661.
  32. Mishra K.N., Chakraborty C. (2020) A Novel Approach Towards Using Big Data and IoT for Improving the Efficiency of m-Health Systems. In: Gupta D., Hassanien A., Khanna A. (eds) Advanced Computational Intelligence Techniques for Virtual Reality in Healthcare. Studies in Computational Intelligence, vol 875. Springer, Cham
  33. S. Agarwal, M. Gupta and A. Sharma, "Big Data Privacy Issues & Solutions," 2019 Fifth International Conference on Image Information Processing (ICIIP), Shimla, India, 2019, pp. 225-228.
  34. K. R. Sollins, "IoT Big Data Security and Privacy Versus Innovation," in IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1628-1635, April 2019.
  35. J. Moreno, E. B. Fernandez, M. A. Serrano and E. Fernández-Medina, "Secure Development of Big Data Ecosystems," in IEEE Access, vol. 7, pp. 96604-96619, 2019.
  36. J. Andrew, J. Karthikeyan and J. Jebastin, "Privacy Preserving Big Data Publication On Cloud Using Mondrian Anonymization Techniques and Deep Neural Networks," 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), Coimbatore, India, 2019, pp. 722-727.
Index Terms

Computer Science
Information Sciences

Keywords

Big Data Security and Privacy Challenges Multilayered Framework Big Data V’s Big Data Analytics