International Journal of

ADVANCED AND APPLIED SCIENCES

EISSN: 2313-3724, Print ISSN: 2313-626X

Frequency: 12

line decor
  
line decor

 Volume 8, Issue 5 (May 2021), Pages: 73-83

----------------------------------------------

 Original Research Paper

 Title: Big data management: Security and privacy concerns

 Author(s): Ibrahim A. Atoum *, Ismail M. Keshta

 Affiliation(s):

 Computer and Information Sciences Department, College of Applied Sciences, AlMaarefa University, Riyadh, Saudi Arabia

  Full Text - PDF          XML

 * Corresponding Author. 

  Corresponding author's ORCID profile: https://orcid.org/0000-0002-9259-7937

 Digital Object Identifier: 

 https://doi.org/10.21833/ijaas.2021.05.009

 Abstract:

Big data has been used by different companies to deliver simple products and provide enhanced customer insights through predictive technology such as artificial intelligence. Big data is a field that mainly deals with the extraction and systemic analysis of large data sets to help businesses discover trends. Today, many companies use Big Data to facilitate growth in different functional areas as well as expand their ability to handle large customer databases. Big data has grown the demand for information management experts such that many software companies are increasingly investing in firms that specialize in data management and analytics. Nevertheless, the issue of data protection or privacy is a threat to big data management. This article presents some of the major concerns surrounding the application and use of Big Data about challenges of security and privacy of data stored on technological devices. The paper also discusses some of the current studies being undertaken aimed at addressing security and privacy issues in Big Data. 

 © 2021 The Authors. Published by IASE.

 This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

 Keywords: Big data, Internet of things, Big data analytics, Big data privacy

 Article History: Received 6 November 2020, Received in revised form 27 January 2021, Accepted 28 January 2021

 Acknowledgment 

The authors would like to acknowledge the support provided by AlMaarefa University while conducting this research work.

 Compliance with ethical standards

 Conflict of interest: The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.

 Citation:

  Atoum IA and Keshta IM (2021). Big data management: Security and privacy concerns. International Journal of Advanced and Applied Sciences, 8(5): 73-83

 Permanent Link to this page

 Figures

 No Figure

 Tables

 No Table 

----------------------------------------------

 References (25)

  1. Alharthi A, Krotov V, and Bowman M (2017). Addressing barriers to big data. Business Horizons, 60(3): 285-292. https://doi.org/10.1016/j.bushor.2017.01.002   [Google Scholar]
  2. Anshari M, Almunawar MN, Lim SA, and Al-Mudimigh A (2019). Customer relationship management and big data enabled: Personalization and customization of services. Applied Computing and Informatics, 15(2): 94-101. https://doi.org/10.1016/j.aci.2018.05.004   [Google Scholar]
  3. Atoum I and Al-Jarallah NA (2019). Big data analytics for value-based care: Challenges and opportunities. International Journal of Advanced Trends in Computer Science and Engineering, 8(6): 3012-3016. https://doi.org/10.30534/ijatcse/2019/55862019   [Google Scholar]
  4. Choksi K, Dalal N, Gupte MK, and Jivani A (2015). Security and privacy challenges in big data. International Journal of Latest Trends in Engineering and Technology, 7(3): 313-318. https://doi.org/10.21172/1.73.543   [Google Scholar]
  5. Davenport T, Guha A, Grewal D, and Bressgott T (2020). How artificial intelligence will change the future of marketing. Journal of the Academy of Marketing Science, 48(1): 24-42. https://doi.org/10.1007/s11747-019-00696-0   [Google Scholar]
  6. El-Yahyaoui A and El Kettani MD (2017). A verifiable fully homomorphic encryption scheme to secure big data in cloud computing. In the International Conference on Wireless Networks and Mobile Communications (WINCOM), IEEE, Rabat, Morocco: 1-5. https://doi.org/10.1109/WINCOM.2017.8238186   [Google Scholar]
  7. Goodrich MT, Tamassia R, and Goldwasser MH (2014). Data structures and algorithms in Java. John Wiley and Sons, Hoboken, USA.   [Google Scholar]
  8. Govindarajan M (2019). Challenges for big data security and privacy. In: Khosrow-Pour DBAM (Ed.), Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics: 57-66. http://doi:10.4018/978-1-5225-7598-6.ch005   [Google Scholar]
  9. Hardjono T, Shrier DL, and Pentland A (2019). Trusted data: A new framework for identity and data sharing. MIT Connection Science and Engineering, Cambridge, USA. https://doi.org/10.7551/mitpress/12439.001.0001   [Google Scholar]
  10. Jain P, Gyanchandani M, and Khare N (2016). Big data privacy: A technological perspective and review. Journal of Big Data, 3: 25. https://doi.org/10.1186/s40537-016-0059-y   [Google Scholar]
  11. Lekshmy PL and Rahiman MA (2020). A sanitization approach for privacy preserving data mining on social distributed environment. Journal of Ambient Intelligence and Humanized Computing, 11: 2761–2777. https://doi.org/10.1007/s12652-019-01335-w   [Google Scholar]
  12. Martin KD, Borah A, and Palmatier RW (2017). Data privacy: Effects on customer and firm performance. Journal of Marketing, 81(1): 36-58. https://doi.org/10.1509/jm.15.0497   [Google Scholar]
  13. Martinez-Mosquera D, Luján-Mora S, Navarrete R, Mayorga TC, and Vivanco Herrera HR (2019). An approach to big data modeling for key-value NoSQL databases. Iberian Journal of Information Systems and Technologies, E19: 519-530.   [Google Scholar]
  14. Moura J and Serrão C (2015). Security and privacy issues of big data. In: Zaman N, Seliaman ME, Hassan MF, and Márquez FPG (Eds.), Handbook of research on trends and future directions in big data and web intelligence: 20-52. IGI Global, Pennsylvania, USA.   [Google Scholar]
  15. Nasereddin HH and Darwesh AJ (2020). An object oriented programming on encrypted database system (CryptDB). Journal of Talent Development and Excellence, 12(1): 5140-5146.   [Google Scholar]
  16. Pape S and Stankovic J (2019). An insight into decisive factors in cloud provider selection with a focus on security. In: Katsikas S, Cuppens F, Cuppens N, Lambrinoudakis C, Kalloniatis C, Garcia-Alfaro J (Eds.), Computer security: 287-306. Springer, Cham, Switzerland.   [Google Scholar]
  17. Perera C, Ranjan R, Wang L, Khan SU, and Zomaya AY (2015). Big data privacy in the internet of things era. IT Professional, 17(3): 32-39. https://doi.org/10.1109/MITP.2015.34   [Google Scholar]
  18. Reis T, Bornschlegl MX, and Hemmje ML (2020). Big data analysis, AI, and visualization workshop: Road mapping infrastructures for artificial intelligence supporting advanced visual big data analysis. In the International Conference on Advanced Visual Interfaces, Association for Computing Machinery, Salerno, Italy: 1-2. https://doi.org/10.1145/3399715.3400860   [Google Scholar]
  19. Remiche JM, Aubert J, Mayer N, and Petrocelli D (2019). Evaluation of cloud computing offers through security risks. In the 8th International Conference on Cloud Computing and Services Science, Funchal, Madeira Island, Portugal: 338-345. https://doi.org/10.5220/0006665703380345   [Google Scholar]
  20. Sardi A, Sorano E, Cantino V, and Garengo P (2020). Big data and performance measurement research: Trends, evolution and future opportunities. Measuring Business Excellence. https://doi.org/10.1108/MBE-06-2019-0053   [Google Scholar]
  21. Singh C (2020). Phishing website detection based on machine learning: A survey. In the 6th International Conference on Advanced Computing and Communication Systems, IEEE, Coimbatore, India: 398-404. https://doi.org/10.1109/ICACCS48705.2020.9074400   [Google Scholar]
  22. Suoniemi S, Meyer-Waarden L, Munzel A, Zablah AR, and Straub D (2020). Big data and firm performance: The roles of market-directed capabilities and business strategy. Information and Management, 57(7): 103365. https://doi.org/10.1016/j.im.2020.103365   [Google Scholar]
  23. Viceconti M, Hunter P, and Hose R (2015). Big data, big knowledge: Big data for personalized healthcare. IEEE Journal of Biomedical and Health Informatics, 19(4): 1209-1215. https://doi.org/10.1109/JBHI.2015.2406883   [Google Scholar] PMid:26218867
  24. Wu Y, Huang H, Wu N, Wang Y, Bhuiyan MZA, and Wang T (2020). An incentive-based protection and recovery strategy for secure big data in social networks. Information Sciences, 508: 79-91. https://doi.org/10.1016/j.ins.2019.08.064   [Google Scholar]
  25. Yu S (2016). Big privacy: Challenges and opportunities of privacy study in the age of big data. IEEE Access, 4: 2751-2763. https://doi.org/10.1109/ACCESS.2016.2577036   [Google Scholar]