2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) 2015
DOI: 10.1109/icitst.2015.7412089
|View full text |Cite
|
Sign up to set email alerts
|

A survey on security and privacy issues in big data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
60
0
2

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 121 publications
(62 citation statements)
references
References 17 publications
0
60
0
2
Order By: Relevance
“…Big data in a Hadoop contains sensitive information related to financial data, corporate information, personal information and many such confidential data of clients, customers and employees. Hence, optimum protection of such data and ensuring that it remains free from any encroachment or tampering is of utmost significance [6][7][8][9][10][11].…”
Section: Related Work A) Hadoop Securitymentioning
confidence: 99%
“…Big data in a Hadoop contains sensitive information related to financial data, corporate information, personal information and many such confidential data of clients, customers and employees. Hence, optimum protection of such data and ensuring that it remains free from any encroachment or tampering is of utmost significance [6][7][8][9][10][11].…”
Section: Related Work A) Hadoop Securitymentioning
confidence: 99%
“…Work-based on Data Security is discussed in this section. According to the Terzi [32] work, network traffic should be expressed in code with suitable standards, access to devices should be checked, employees should be authorized to access systems, analysis should be done on anonymized data sending and receiving should be made for the secure channel to prevent data drip, and network should be observed for threats. Kacha [33] work describes principal issues related to data security that is raised by cloud environment are classified into three categories: (1) data security issues raised by single cloud characteristics, (2) data security issues raised by data lifecycle in cloud computing, (3) data security issues associated with data security attributes (confidentiality, integrity, and availability).…”
Section: Data Securitymentioning
confidence: 99%
“…Additionally, data can be manipulated and misinterpreted according to the predispositions of those who are handling and manipulating data for making predictive intelligence (Katwala, 2018;Terzi, Terzi, & Sagiroglu, 2015). An example of such bias is given by Hacker (2018) regarding the use of SIS in predictive medical intelligence.…”
Section: The Wonga Case: Use Of Leaky Datamentioning
confidence: 99%