Issues in security and privacy of big data

Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.

2021 ◽  
Vol 14 (1) ◽  
pp. 11
Author(s):  
Yunusa Simpa Abdulsalam ◽  
Mustapha Hedabou

Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of the pay-as-you-go price model. However, outsourcing information and business applications to the cloud or a third party raises security and privacy concerns, which have become critical in adopting cloud implementation and services. Researchers and affected organisations have proposed different security approaches in the literature to tackle the present security flaws. The literature also provides an extensive review of security and privacy issues in cloud computing. Unfortunately, the works provided in the literature lack the flexibility in mitigating multiple threats without conflicting with cloud security objectives. The literature has further focused on only highlighting security and privacy issues without providing adequate technical approaches to mitigate such security and privacy threats. Conversely, studies that offer technical solutions to security threats have failed to explain how such security threats exist. This paper aims to introduce security and privacy issues that demand an adaptive solution approach without conflicting with existing or future cloud security. This paper reviews different works in the literature, taking into account its adaptiveness in mitigating against future reoccurring threats and showing how cloud security conflicts have invalidated their proposed models. The article further presents the security threats surrounding cloud computing from a user perspective using the STRIDE approach. Additionally, it provides an analysis of different inefficient solutions in the literature and offers recommendations in terms of implementing a secure, adaptive cloud environment.


2017 ◽  
Vol 2 (3) ◽  
pp. 1
Author(s):  
Hanane Bennasar ◽  
Mohammad Essaaidi ◽  
Ahmed Bendahmane ◽  
Jalel Benothmane

Cloud computing cyber security is a subject that has been in top flight for a long period and even in near future. However, cloud computing permit to stock up a huge number of data in the cloud stockage, and allow the user to pay per utilization from anywhere via any terminal equipment. Among the major issues related to Cloud Computing security, we can mention data security, denial of service attacks, confidentiality, availability, and data integrity. This paper is dedicated to a taxonomic classification study of cloud computing cyber-security. With the main objective to identify the main challenges and issues in this field, the different approaches and solutions proposed to address them and the open problems that need to be addressed.


2020 ◽  
Vol 198 ◽  
pp. 04030
Author(s):  
Dai Yanyan ◽  
Chen Meng

With the development of new technologies such as artificial intelligence, big data, and cloud computing, the “intelligent airport” is considered to be an effective means to solve or alleviate the current industry problems such as large-scale airport business, the large number of operating entities, and the complicated operation conditions. This paper is about the collaboration between universities and enterprises based on the concept of service design. Relying on big data and cloud computing technology, this paper addresses the problems of airport service robots in inquiries, blind spots of security inspection, and full monomer smart navigation diffluence, combined with the basic technology of service robot artificial intelligence and the third-party interface to design solutions to effectively solve the problems of process.


2017 ◽  
Vol 7 (2) ◽  
Author(s):  
Dicky R. M. Nainggolan

<p><em><strong>Abstract</strong> – Data are the prominent elements in scientific researches and approaches. Data Science methodology is used to select and to prepare enormous numbers of data for further processing and analysing. Big Data technology collects vast amount of data from many sources in order to exploit the information and to visualise trend or to discover a certain phenomenon in the past, present, or in the future at high speed processing capability. Predictive analytics provides in-depth analytical insights and the emerging of machine learning brings the data analytics to a higher level by processing raw data with artificial intelligence technology. Predictive analytics and machine learning produce visual reports for decision makers and stake-holders. Regarding cyberspace security, big data promises the opportunities in order to prevent and to detect any advanced cyber-attacks by using internal and external security data.</em></p><p><br /><em><strong>Keywords</strong>: Big Data, Cyber Security, Data Science, Intelligence, Predictive Analytics</em></p><p><br /><em><strong>Abstrak</strong> – Data merupakan unsur terpenting dalam setiap penelitian dan pendekatan ilmiah. Metodologi sains data digunakan untuk memilah, memilih dan mempersiapkan sejumlah data untuk diproses dan dianalisis. Teknologi big data mampu mengumpulkan data dengan sangat banyak dari berbagai sumber dengan tujuan untuk mendapatkan informasi dengan visualisasi tren atau menyingkapkan pengetahuan dari suatu peristiwa yang terjadi baik dimasa lalu, sekarang, maupun akan datang dengan kecepatan pemrosesan data sangat tinggi. Analisis prediktif memberikan wawasan analisis lebih dalam dan kemunculan machine learning membawa analisis data ke tingkat yang lebih tinggi dengan bantuan teknologi kecerdasan buatan dalam tahap pemrosesan data mentah. Analisis prediktif dan machine learning menghasilkan laporan berbentuk visual untuk pengambil keputusan dan pemangku kepentingan. Berkenaan dengan keamanan siber, big data menjanjikan kesempatan dalam rangka untuk mencegah dan mendeteksi setiap serangan canggih siber dengan memanfaatkan data keamanan internal dan eksternal.</em></p><p><br /><strong>Kata Kunci</strong>: Analisis Prediktif, Big Data, Intelijen, Keamanan Siber, Sains Data</p>


2017 ◽  
Vol 7 (2) ◽  
Author(s):  
Dicky R. M. Nainggolan

<p><strong>Abstrak</strong> – Data merupakan unsur terpenting dalam setiap penelitian dan pendekatan ilmiah. Metodologi sains data digunakan untuk memilah, memilih dan mempersiapkan sejumlah data untuk diproses dan dianalisis. Teknologi big data mampu mengumpulkan data dengan sangat banyak dari berbagai sumber dengan tujuan untuk mendapatkan informasi dengan visualisasi tren atau menyingkapkan pengetahuan dari suatu peristiwa yang terjadi baik dimasa lalu, sekarang, maupun akan datang dengan kecepatan pemrosesan data sangat tinggi. Analisis prediktif memberikan wawasan analisis lebih dalam dan kemunculan machine learning membawa analisis data ke tingkat yang lebih tinggi dengan bantuan teknologi kecerdasan buatan dalam tahap pemrosesan data mentah. Analisis prediktif dan machine learning menghasilkan laporan berbentuk visual untuk pengambil keputusan dan pemangku kepentingan. Berkenaan dengan keamanan siber, big data menjanjikan kesempatan dalam rangka untuk mencegah dan mendeteksi setiap serangan canggih siber dengan memanfaatkan data keamanan internal dan eksternal.</p><p><br /><strong>Kata Kunci</strong>: analisis prediktif, big data, intelijen, keamanan siber, sains data</p><p><strong><em>Abstract</em> </strong>– Data are the prominent elements in scientific researches and approaches. Data Science methodology is used to select and to prepare enormous numbers of data for further processing and analysing. Big Data technology collects vast amount of data from many sources in order to exploit the information and to visualise trend or to discover a certain phenomenon in the past, present, or in the future at high speed processing capability. Predictive analytics provides in-depth analytical insights and the emerging of machine learning brings the data analytics to a higher level by processing raw data with artificial intelligence technology. Predictive analytics and machine learning produce visual reports for decision makers and stake-holders. Regarding cyberspace security, big data promises the opportunities in order to prevent and to detect any advanced cyber-attacks by using internal and external security data.</p><p><br /><strong><em>Keywords</em></strong>: big data, cyber security, data science, intelligence, predictive analytics</p>


2016 ◽  
Vol 5 (1) ◽  
Author(s):  
Sinta Dewi

<p align="center"><strong><em>Abstract</em></strong></p><p><em>The increasing use of internet technology has spawned new challenges to the protection of privacy and personal data, especially with the increasing practice of collection, use and dissemination of personal data of a person. The lack of specific instruments and regulations will cause of the weakness of the privacy and data personal protection mechanism, especially in the use of cloud computing technology. Cloud computing is a technology that uses the internet and central remote servers to maintain or manage user data. It allows users to use applications without installation so that personal files can be accessed anywhere and anytime through internet access. This technology enables efficiencies by centralizing storage, processing and data memory. However, on the other hand, cloud computing has raised a new legal issue is how could the personal data of the user of cloud computing be protected from a wide range of abuses by the provider of cloud computing and the third party. This legal issue become very significant because if a personal data of the user of cloud computing is misused by the provider or the third party, then it is contrary to human rights, namely the protection of privacy and personal data which has been protected by international, regional, and national instruments. So far, Indonesia has not been having regulation that specifically protect its citizens from the personal data abuse whether committed by governments, private companies or  individuals. Therefore, this study aims to create the concept of adequate regulation in order to provide protection for user of cloud computing services in Indonesia.</em></p><p><strong><em>Keywords</em></strong><em>: protection, privacy, personal data, cloud computing.</em></p><p align="center"><strong>Abstrak</strong></p><p>Meningkatnya pemanfaatan teknologi internet melahirkan tantangan baru dalam perlindungan atas privasi dan data pribadi, terutama dengan semakin meningkatnya praktik pengumpulan, pemanfaatan dan penyebaran data pribadi seseorang. Ketertinggalan instrumen dan regulasi menjadi salah satu pemicu lemahnya mekanisme proteksi terhadap privasi dan data pribadi khususnya dalam penggunaan teknologi <em>cloud computing</em>. <em>Cloud computing </em>adalah teknologi yang menggunakan internet dan server pusat yang jauh untuk menjaga atau mengelola data pengguna. <em>Cloud computing </em>membantu pengguna untuk menggunakan aplikasi tanpa melakukan instalasi sehingga file pribadi dapat diakses di manapun dan kapanpun melalui akses internet. Teknologi ini memungkinkan efisiensi dengan memusatkan penyimpanan, pemrosesan dan memori data. Namun demikian, di sisi lain, <em>cloud computing </em>telah menimbulkan permasalahan hukum baru yaitu bagaimana data pribadi pengguna cloud computing terlindungi dari berbagai macam pengungkapan dan pendistribusian oleh penyedia jasa cloud computing terhadap pihak ketiga. Permasalahan hukum ini menjadi sangat signifikan karena jika data pribadi seseorang disalahgunakan oleh pihak penyedia data atau pihak ketiga, maka hal ini bertentangan dengan hak dasar manusia yaitu perlindungan terhadap privasi dan data pribadi seseorang yang telah dilindungi oleh instrumen internasional, regional dan nasional. Indonesia hingga saat ini belum memiliki regulasi yang secara khusus melindungi warga negara dari praktik pemanfatan data pribadi yang sewenang wenang, baik yang dilakukan oleh pemerintah, perusahaan swasta maupun individu. Oleh sebab itu, penelitian ini bertujuan untuk menciptakan konsep pengaturan yang memadai dalam rangka memberikan perlindungan bagi pengguna jasa cloud computing di Indonesia.</p><p><strong>Kata kunci</strong>: perlindungan, privasi, data pribadi, <em>cloud computing</em>.</p>


Cloud Computing is a robust, less cost, and an effective platform for providing services. Nowadays, it is applied in various services such as consumer business or Information Technology (IT) carried over the Internet. This cloud computing has some risks of security because, the services which are required for its effective compilation is outsources often by the third party providers. This makes the cloud computing more hard to maintain and monitor the security and privacy of data and also its support. This sudden change in the process of storing data towards the cloud computing technology improved the concerns about different issues in security and also the various threats present in this cloud storage. In the concept of security in cloud storage, various threats and challenges are noted by recent researchers. Hence, an effective framework of providing security is required. The main aim of this paper is to analyze various issues in securing the cloud data threats present in the cloud storage and to propose a novel methodology to secure it. This paper also identifies the most crucial components that can be incorporated in the already existing security measures while designing the storage systems based on cloud. This study also provides us to identify all the available solutions for the challenges of security and privacy in cloud storage.


Sign in / Sign up

Export Citation Format

Share Document