International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 9 - Issue 2, February 2020 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Challenges, Issues, Security And Privacy Of Big Data

[Full Text]



Taran Singh Bharati



Big Data, Big Data Analytics, Cloud Computing, Security, Privacy, Attacks



Data about jeans, cancers, drugs, HIV, social networking sites etc. is very huge in size and the same can be treated as big data and human is trying to decode the biological data to uncover mysteries about the biological systems. Big data is attracts people from other disciplines also. The uses and applications of Big Data are increasing day by day and it is becoming famous in data scientists biological streams. Big data keeps enormous volume and the same is being produced at fast pace from different sources. On social media thousands of posts are generated per second. Its nature, sharing, storage management, and security and privacy are some crucial issues which are taken up for consideration in this paper. The issues are thoroughly discussed and analysed.



[1] Inukollu VN, Arsi S, Ravuri SR. Security issues associated with big data in cloud computing. International Journal of Network Security & Its Applications. 2014 May 1; 6 3):45.
[2] Terzi DS, Terzi R, Sagiroglu S. A survey on security and privacy issues in big data. In2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) 2015 Dec 14 (pp. 202-207). IEEE.
[3] Mora AC, Chen Y, Fuchs A, Lane A, Lu R, Manadhata P. Top ten big data security and privacy challenges. Cloud Security Alliance. 2012; 140.
[4] Kaisler S, Armour F, Espinosa JA, Money W. Big data: Issues and challenges moving forward. In2013 46th Hawaii International Conference on System Sciences 2013 Jan 7 (pp. 995-1004). IEEE.
[5] Matturdi B, Zhou X, Li S, Lin F. Big Data security and privacy: A review. China Communications. 2014 Apr; 11 (14):135-45.
[6] Patil HK, Seshadri R. Big data security and privacy issues in healthcare. In2014 IEEE international congress on big data 2014 Jun 27 (pp. 762-765). IEEE.
[7] Saurabh pandey, rashmi pandey, Medical (Healthcare) Big Data Security and Privacy Issues, International Journal of Scientific & Engineering Research Volume 9, Issue 2, feb-2018.
[8] Cavoukian A, Jonas J. Privacy by Design in the Age of Big Data. In Guide to Big Data Applications 2012 (pp. 29-48). Springer, Cham. Web site: www.ipc.on.ca, Privacy by Design: www.privacybydesign.ca
[9] Moura J, Serrão C. Security and privacy issues of big data. In Handbook of research on trends and future directions in big data and web intelligence 2015 (pp. 20-52). IGI Global.
[10] Lu R. Zhu H., Liu X. et al., towards efficient and privacy-preserving computing in Big Data era, IEEE Network, july-august, 2014 pp. 46-50.
[11] Gahi Y, Guennoun M, Mouftah HT. Big data analytics: Security and privacy challenges. In2016 IEEE Symposium on Computers and Communication (ISCC) 2016 Jun 27 (pp. 952-957). IEEE.
[12] Alguliyev R, Imamverdiyev Y. Big data: big promises for information security. In2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT) 2014 Oct 15 (pp. 1-4). IEEE.
[13] Jain P, Gyanchandani M, Khare N. Big data privacy: a technological perspective and review. Journal of Big Data. 2016 Dec; 3(1):25.
[14] Perera C, Ranjan R, Wang L, Khan SU, Zomaya AY. Big data privacy in the internet of things era. IT Professional. 2015 May; 17 (3):32-9.
[15] Zhang D. Big data security and privacy protection. In8th International Conference on Management and Computer Science (ICMCS 2018) 2018 Oct 20. Atlantis Press.
[16] Thayananthan V, Albeshri A. Big data security issues based on quantum cryptography and privacy with authentication for mobile data center. Procedia Computer Science. 2015 Jan 1; 50: 149-56.
[17] Yu S. Big privacy: Challenges and opportunities of privacy study in the age of big data. IEEE access. 2016; 4: 2751-63.
[18] Demchenko Y, Ngo C, de Laat C, Membrey P, Gordijenko D. Big security for big data: Addressing security challenges for the big data infrastructure. In Workshop on Secure Data Management 2013 Aug 30 (pp. 76-94). Springer, Cham.
[19] Hu J, Vasilakos AV. Energy big data analytics and security: challenges and opportunities. IEEE Transactions on Smart Grid. 2016 Sep;7(5):2423-36.
[20] Mehmood A, Natgunanathan I, Xiang Y, Hua G, Guo S. Protection of big data privacy. IEEE access. 2016; 4:1821-34.
[21] Gadepally V, Hancock B, Kaiser B, Kepner J, Michaleas P, Varia M, Yerukhimovich A. Computing on masked data to improve the security of big data. In2015 IEEE International Symposium on Technologies for Homeland Security (HST) 2015 Apr 14 (pp. 1-6). IEEE.
[22] Sharma PP, Navdeti CP. Securing big data hadoop: a review of security issues, threats and solution. Int. J. Comput. Sci. Inf. Technol. 2014; 5 (2):2126-31.
[23] Richards NM, King JH. Three paradoxes of big data. Stan. L. Rev. Online. 2013; 66: 41.
[24] Bharati, T. S. (2015). Enhanced Intrusion Detection System for Mobile Adhoc Networks using Mobile Agents with no Manager. International Journal of Computer Applications, 111(10).
[25] Bharati, T. S., & Kumar, R. (2015, March). Secure intrusion detection system for mobile adhoc networks. In Computing for Sustainable Global Development (INDIACom), 2015 2nd International Conference on (pp. 1257-1261). IEEE.
[26] Bharati, T. S., & Kumar, R. (2015). Intrusion Detection System for MANET using Machine Learning and State Transition Analysis. International Journal of Computer Engineering & Technology (IJCET), 6(12), 1-8.
[27] Bharati, T. S., & Kumar, R. (2016). Enhanced Key Distribution for Mobile Adhoc Networks. International Journal of Engineering Science, 6(4), 4184-4187.
[28] Bharati T. S. (2017). Agents to Secure MANETS. International Journal of Advanced Engineering and Research Development, 4(11), 1267-1273.
[29] Bharati T.S. (2018). MANETs and Its’ Security. International Journal of Computer Networks and Wireless Communication, 8(4), 166-171.
[30] Jaseena KU, David JM. Issues, challenges, and solutions: big data mining. CS & IT-CSCP. 2014 Dec 27; 4 (13):131-40.
[31] Abouelmehdi K, Beni-Hessane A, Khaloufi H. Big healthcare data: preserving security and privacy. Journal of Big Data. 2018 Dec 1; 5(1):1.
[32] Li N, Li T, Venkatasubramanian S. t-closeness: Privacy beyond k-anonymity and l-diversity. In2007 IEEE 23rd International Conference on Data Engineering 2007 Apr 15 (pp. 106-115). IEEE.
[33] Sweeney L. Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. 2002 Oct;10(05):571-88.
[34] Sweeney L. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. 2002 Oct;10(05):557-70.
[35] Samarati P. Protecting respondents identities in microdata release. IEEE transactions on Knowledge and Data Engineering. 2001 Nov;13(6):1010-27.
[36] Truta TM, Vinay B. Privacy protection: p-sensitive k-anonymity property. In22nd International Conference on Data Engineering Workshops (ICDEW'06) 2006 (pp. 94-94). IEEE.
[37] Xiao X, Tao Y. Anatomy: Simple and effective privacy preservation. InProceedings of the 32nd international conference on Very large data bases 2006 Sep 1 (pp. 139-150). VLDB Endowment.
[38] Xiao X, Tao Y. Personalized privacy preservation. InProceedings of the 2006 ACM SIGMOD international conference on Management of data 2006 Jun 27 (pp. 229-240). ACM.
[39] Machanavajjhala A, Gehrke J, Kifer D, Venkitasubramaniam M. l-diversity: Privacy beyond k-anonymity. In22nd International Conference on Data Engineering (ICDE'06) 2006 Apr 3 (pp. 24-24). IEEE.
[40] Iyengar VS. Transforming data to satisfy privacy constraints. InProceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining 2002 Jul 23 (pp. 279-288). ACM.
[41] Bayardo RJ, Agrawal R. Data privacy through optimal k-anonymization. In21st International conference on data engineering (ICDE'05) 2005 Apr 5 (pp. 217-228). IEEE.
[42] Sun X, Wang H, Li J, Truta TM, Li P. (p+, α)-sensitive k-anonymity: A new enhanced privacy protection model. In2008 8th IEEE International Conference on Computer and Information Technology 2008 Jul 8 (pp. 59-64). IEEE.
[43] Tassa T, Mazza A, Gionis A. k-Concealment: An Alternative Model of k-Type Anonymity. Trans. Data Privacy. 2012 Apr 1;5(1):189-222.
[44] Puthal D, Sahoo BP, Mishra S, Swain S. Cloud computing features, issues, and challenges: a big picture. In2015 International Conference on Computational Intelligence and Networks 2015 Jan 12 (pp. 116-123). IEEE.
[45] Bharati T.S. (Jun, 2019). Trust Based Security of MANETs. International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol. issue 8, ISSN 2278 3075, pp. 792-795.
[46] Bharati T.S. (Jun, 2019). Security and Privacy of Internet of Things. International Journal of Innovative Technology and Exploring Engineering (IJITEE) , 8(8), ISSN 2278 3075, pp 2740-2743.
[47] Bharati T.S. (Aug, 2019). Security Enhancement and Privacy Preserving of Big Data. International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol.8 issue 10, ISSN 2278 3075, pp 2740-2743.
[48] Bharati T.S. (Oct, 2019). Internet of Things (IoT): Criticam Review. International Journal of Scientific & Technology Research (IJSTR), vol.8 issue 10, ISSN 2277 8616, pp 227-232.

Author’s Profile
Author is B.Tech, Master of Engineering, and Ph.D. in Computer Stream from, Kanpur, Gwalior, and New Delhi respectively. He has more than 18+ years of experience. Currently he is working as senior Assistant Professor in the department of Computer Science, Jamia Millia Islamia, New Delhi.He has served at different positions in various universities and Engineering colleges. His area of interests includes Security, Theoretical Computer Science, Data Science etc.