With the advent of a range of data-driven avenues and explosion of data, research in the field of big data has become an important thoroughfare. Big data produces exceptional amounts of data points, which give greater insights that determine sensational research, better business decisions, and greater value for customers. To accomplish these endings, establishments need to be able to handle the data while including measures for using sensitive private information efficiently and quickly, and thus the implementation of security issue creates a vigorous role. End-point devices create the main factors for observance of the big data. Processing, storage, and other necessary responsibilities have to be performed with the help of input data, which is generated by the end-points. Therefore, an association should make sure to use an authentic and valid end-point security. Due to large amounts of data generation, it is quite impossible to maintain regular checks by most of the establishments. Therefore, periodic observation and performing security checks can be utmost promising in real time. On the other hand, cloud-based storage has enabled data mining and collection. However, this big data and cloud storage incorporation have introduced concerns for data secrecy and security threats. This volume intends to deliberate some of the latest research findings regarding the security issues and mechanisms for big data. The volume comprises seven wellversed chapters on the subject. The introductory chapter provides a brief and concise overview of the subject matter with reference to the characteristics of big data, the inherent security concerns, and mechanisms for ensuring data integrity. Chapter 2 deals with the motivation for this research that came from lack of practical applications of block chain technology, its history, and the principle of how it functions within the digital identity and importance of EDU certificate transparency and challenges in their sharing. In the theoretical part of the chapter, a comparison of the "classical" identity and digital identity is set out, which is described through examples of personal identity cards and e-citizen systems. Then, following the introduction into block chain technology and describing the method of achieving consensus and transaction logging, the principle of smart contracts is described, which provide the ability to enter code or even complete applications and put them into block chains, enabling automation of a multitude of processes. The chapter also explains common platforms through examples that are described as business models that use block chain as a platform for developing their processes based on digital identity. Chapter 3 describes the anomaly detection procedure in cloud database metric. Each and every big data source or big database needs a security metric monitoring. The monitoring software collects various metrics with the help of custom codes, plugging, and so on. The chapter describes the approach of modifying the normal metric thresholding to anomaly det...