Security and Privacy Challenges in Big Data Environment

Author(s):  
M. Manikandakumar ◽  
E. Ramanujam

In this information era, big data is revolutionizing business. The data are generated by each and every user from servers, terminals, smart phones, appliances, satellites, and a range of other sensors on vehicles: military, agriculture, and the like. Anything the end users does online can be traced, stored, and analyzed. It is also possible to analyze from various diverse sources such as social media postings, credit card or e-cash purchases, internet searches, mobile phone locations, etc. Users are willing to provide their private information, linked to their real-life identities, in exchange for faster or better digital services. But, the companies yet may not have the fundamental rights of the user from a security perspective. More risks are associated with big data security. The main purpose of this chapter is to explore the security concerns and privacy issues in big data environments.

Author(s):  
M. Manikandakumar ◽  
E. Ramanujam

In this information era, big data is revolutionizing business. The data are generated by each and every user from servers, terminals, smart phones, appliances, satellites, and a range of other sensors on vehicles: military, agriculture, and the like. Anything the end users does online can be traced, stored, and analyzed. It is also possible to analyze from various diverse sources such as social media postings, credit card or e-cash purchases, internet searches, mobile phone locations, etc. Users are willing to provide their private information, linked to their real-life identities, in exchange for faster or better digital services. But, the companies yet may not have the fundamental rights of the user from a security perspective. More risks are associated with big data security. The main purpose of this chapter is to explore the security concerns and privacy issues in big data environments.


Author(s):  
Dr. J. Padmavathi ◽  
Sirvi Ashok Kumar Mohanlal

Today Social Media is an integral part of many people’s lives. Most of us are users of one or many of these such as Facebook, Twitter, Instagram, LinkedIn etc. Social media networks are the most common platform to communicate with our friends, family and share thoughts, photos, videos and lots of other information in the common area of interest. Privacy has become an important concern in social networking sites. Users are not aware of the privacy risks involved on social media sites and they share their sensitive information on social network sites. While these platforms are free and offer unrestricted access to their services, they puzzle the users with many issues such as privacy, security, data harvesting, content censorship, leaking personal information etc. This paper aims at analyzing, the major users of social media networks, namely, the college students. It was intended to assess the extent the consumers’ are aware of the risks of free usage and how to mitigate against these privacy issues.


Author(s):  
Eralda Caushaj ◽  
Huirong Fu ◽  
Ishwar Sethi ◽  
Haissam Badih ◽  
Dion Watson ◽  
...  

The importance of wireless cellular communication in our daily lives has grown considerably in the last decade. The smartphones are widely used nowadays, besides voice communication; the authors routinely use them to access the internet, conduct monetary transactions, send text messages and query a lot of useful information regarding the location of specific places of interest. The use of smartphones in their day-to-day communication raises many unresolved security and privacy issues. In this paper they identify relevant security attacks in Wireless Cellular Network. The authors conduct experiments in four different platforms such as Iphone, Android, Windows and Blackberry. The packets captured through Wireshark for approximately 24 minutes, giving them a lot of information regarding security and privacy issues involving the users. A lot of useful apps installed and used by the end-users have serious issues in terms of privacy and the information exposed. Which is the better platform comparing all four and what exactly do they expose from the user’s information? What are the threats and countermeasures that the users should be aware of? The aim of the authors’ paper is to give answers to the above questions based on the data captured by conducting real-life scenarios.


2021 ◽  
Vol 8 (5) ◽  
pp. 73-83
Author(s):  
Ibrahim A. Atoum ◽  
◽  
Ismail M. Keshta ◽  

Big data has been used by different companies to deliver simple products and provide enhanced customer insights through predictive technology such as artificial intelligence. Big data is a field that mainly deals with the extraction and systemic analysis of large data sets to help businesses discover trends. Today, many companies use Big Data to facilitate growth in different functional areas as well as expand their ability to handle large customer databases. Big data has grown the demand for information management experts such that many software companies are increasingly investing in firms that specialize in data management and analytics. Nevertheless, the issue of data protection or privacy is a threat to big data management. This article presents some of the major concerns surrounding the application and use of Big Data about challenges of security and privacy of data stored on technological devices. The paper also discusses some of the current studies being undertaken aimed at addressing security and privacy issues in Big Data.


Author(s):  
José Moura ◽  
Carlos Serrão

This chapter revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy. It is a pertinent aspect to be addressed because users share more and more personal data and content through their devices and computers to social networks and public clouds. So, a secure framework to social networks is a very hot topic research. This last topic is addressed in one of the two sections of the current chapter with case studies. In addition, the traditional mechanisms to support security such as firewalls and demilitarized zones are not suitable to be applied in computing systems to support Big Data. SDN is an emergent management solution that could become a convenient mechanism to implement security in Big Data systems, as we show through a second case study at the end of the chapter. This also discusses current relevant work and identifies open issues.


Author(s):  
M. Govindarajan

Security and privacy issues are magnified by the volume, variety, and velocity of big data, such as large-scale cloud infrastructures, diversity of data sources and formats, the streaming nature of data acquisition and high volume inter-cloud migration. In the past, big data was limited to very large organizations such as governments and large enterprises that could afford to create and own the infrastructure necessary for hosting and mining large amounts of data. These infrastructures were typically proprietary and were isolated from general networks. Today, big data is cheaply and easily accessible to organizations large and small through public cloud infrastructure. The purpose of this chapter is to highlight the big data security and privacy challenges and also presents some solutions for these challenges, but it does not provide a definitive solution for the problem. It rather points to some directions and technologies that might contribute to solve some of the most relevant and challenging big data security and privacy issues.


2018 ◽  
Vol 20 (1) ◽  
Author(s):  
Sibulela Mgudlwa ◽  
Tiko Iyamu

Background: In the last decade, social media users across the world have crossed 1 billion, making it one of the fastest growing sources of big data. Also, people needing healthcare continue to increase in every society. Through accessibility, communication and interaction between health practitioners and patients, this type of ever-growing, social media subscriber–based platform can be of significant use in improving healthcare delivery to society. However, users encounter serious challenges in their attempts to make use of social media and big data for health-related services. The challenges are primarily caused by factors such as integration, complexity, security and privacy. The challenges are mainly owing to the sensitive nature of the healthcare environment, as a result of personalisation and privacy of information. Objectives: The objectives of the study were to examine and gain a better understanding of the complexities that are associated with the use of social media and healthcare big data, through influencing factors, and to develop a framework that can be used to improve health-related services to the patients. Methods: The interpretivist approach was employed, within which qualitative data were collected. This included documents and existing literature in the areas of social media and healthcare big data. To have a good spread of both previous and current state of events within the phenomena being studied, literature published between 2006 and 2016 were gathered. The data were interpretively analysed. Results: Based on the analysis of the data, factors of influence were found, which were used to develop a model. The model illustrates how the factors of influence can enable and at the same time constrain the use of social media for healthcare services. The factors were interpreted from which a framework was developed. The framework is intended to guide integration of social media with healthcare big data through which service delivery to patients can be improved. Conclusion: This study can be used to guide integration of social media with healthcare big data by health facilities in the communities. The study contributes to healthcare workers’ awareness on how social media can possibly be used to improve the services that they provide to the needy. Also, the study will benefit information systems and technologies and academic domains, particularly from the health services’ perspective.


Sign in / Sign up

Export Citation Format

Share Document