Big Data Security And Privacy

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2019 by IJCTT Journal
Volume-67 Issue-5
Year of Publication : 2019
Authors : Muhammad Danish
  10.14445/22312803/IJCTT-V67I5P104

MLA

MLA Style:Muhammad Danish"Big Data Security And Privacy" International Journal of Computer Trends and Technology 67.5 (2019): 20-26.

APA Style: Muhammad Danish (2019). Big Data Security And Privacy International Journal of Computer Trends and Technology, 67(5), 20-26.

Abstract
Big knowledge (DATA) has emerged as a necessity within the gift world. Most of the persons are connected to at least one another through completely different modes of communications. Folks share data in numerous forms. The knowledge that connects folks is growing staggeringly in giant volume that is making security and privacy considerations. As massive knowledge technologies are rising at no time pace, it's conjointly making the house for security and privacy problems. Till these problems don't seem to be self-addressed properly, it's going to produce obstacles to the fulfillment of expected growth and opportunities and long-run success of massive knowledge. During this paper, we have a tendency to review the assorted domains of massive knowledge like tending, social media, net of things (IOT) and social networking for security and privacy connected problems. Thus protective its security is extremely vital and changing into a prime priority for several organizations. Sadly there's no single formula which will guarantee 100% of data security. Thus there's a desire for a group of benchmarks or standards to make sure the most effective security practices area unit adopted and an adequate level of security is earned. During this paper, authors introduce varied info security standards shortly and so give a comparative study for major info security standards.

Reference
[1]. Big Data Security And Privacy Sponsored by the National Science Foundation, The University of Texas at Dallas, September 16-17, 2014
[2]. Ira S. Rubinstein, 2013, Big Data The End of Privacy or a New Beginning?
[3]. U M Fayyad, ‗From Data Mining to Knowledge Discovery, An Overview,‘ in U M Fayyad, Advances in Knowledge Discovery and Data Mining 6 (Menlo Park: AAAI, 1996), cited in Tal Z Zarsky, ‗Mine Your Own Business! Making the Case for the Implications of the Data Mining of Personal Information in the Forum of Public Opinion‘ (2003) 5 Yale Journal of Law and Technology.
[4]. McKinsey Global Institute, 2011 ‗Big Data: The Next Frontier for Innovation, Competition, and Productivity‘.
[5]. John Markoff, 2012 ‗How Many Computers to Identify a Cat? 16,000‘ NY Times B1,
[6]. ShashiRekha .H., Dr. Chetana Prakash, Kavitha G., 2014 "Understanding Trust and Privacy of Big Data in Social Networks: A Brief Review "
[7]. Richard L Villars, Mathew East Wood, and Carl W. Olofson, 2011 ―Big Data what it is and why you should care‖.
[8]. Won Kim, Ok-ran Jeong, Sang-won lee. 2009 ―On social websites‖.
[9]. Harsh KupwadePatil and Ravi Seshadri, 2014 ‗Big data security and privacy issues in healthcare‘,
[10]. P. Institute, 2012 "Third Annual Benchmark Study on Patient Privacy and Data Security," Ponemon Institute LLC.
[11]. P. Middleton, P. Kjeldsen and J. Tully, 2013 "Forecast: The Internet of Things, Worldwide," Gartner.
[12]. M. Hanson, H. Powell, A. Barth, K. Ringgenberg, B. Calhoun, J. Aylor and J. Lach, 2009 "Body Area Sensor Networks: Challenges and Opportunities," Computer, pp. 58-65.
[13]. P. Groves, B. Kayyali, D. Knott and S. V. Kuiken, 2013 "The 'big data' revolution in healthcare," McKinsey & Company.
[14]. Boyd and K. Crawford. 2011 Six Provocations for Big Data. SSRN eLibrary.
[15]. Andrea Zanella, Nicola Bui, Angelo Castellani, Lorenzo Vangelista, Michele Zorzi, 2014 ―Internet of Things for Smart Cities‖ IEEE Internet Of Things Journal, Vol. 1, No. 1,
[16]. C. Perera et al., "Context-Aware Computing for the Internet of Things: A Survey," IEEE Comm. Surveys & Tutorials, vol. 16, no. 1, 2013, pp. 414–454
[17]. C.Perera R. Ranjan, Lizhe Wang; S.U. Khan, A.Y. Zomaya, 2015 ―Big Data Privacy in the Internet of Things Era‖, IT Pro May/June.
[18]. H. Sundmaeker et al., ―Vision and Challenges for Realizing the Internet of Things,‖ Cluster of European Research Projects on the Internet of Things, 2010, www.internet-of-things -research.eu/ pdf/IOT_Clusterbook_March_ 2010.pdf.
[19]. Delphine Christin, Pablo Sanchez Lopez, Andreas Reinhardt, Matthias Hollick and Michael Kauer‖ 2012 Share with Strangers: Privacy Bubble as user-centered privacy control for mobile content sharing applications "Elsevier.
[20]. Norshidah Mohamed, Eli Hawa Ahmad "Information Privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia
[21]. ―The Internet of Things.‖ Extracted on 18th March 2019, IT Glossary, Gartner: Retrieved from http://www.gartner.com/it-glossary/internet-of-things/Manyika, James, et al. ―Unlocking the potential of the Internet of Things.‖McKinsey Global Institute, June 2015: http://www.mckinsey.com/businessfunctions/digital-mckinsey/our-insights/the-internet-of-things-thevalue-of-digitizing-the-physical-world
[22]. ―There will be 24 billion IoT devices installed on Earth by 2020.‖ Business Insider, Extracted on 9 June 2016: http://www.businessinsider.com/there-will-be-34-billion-iot-devices-installed-on-earth-by-2020-2016-5
[23]. Schneier, Bruce. ―Data Is a Toxic Asset.‖ Schneier on Security, 4 March 2016: Retrieved from http://www.schneier.com/blog/archives/2016/03/data_is_a_toxic.html
[24]. Bauer, Harald, Burkacky, Ondrej, and Knochenhauer, Christian. ―Security in the Internet of Things.‖ McKinsey & Company, May 2017: http://www.mckinsey.com/industries/semiconductors/ourinsights/security-in-theinternet- of-things
[25]. Nuttall, Nathan, Goodness, Eric, Hung, Mark, and Geschickter, Chet. ―Survey Analysis: 2016 Internet of Things Backbone Survey.‖ Gartner, 5 January 2017: http://www.gartner.com/doc/3563218/survey-analysis-- internet-things
[26]. DAMA-DMBOK: Data Management Body of Knowledge (2nd Edition). Technics Publications, 2017: p. 17.
[27]. Huijbregts, Rick. ―Re-imagining business value in a digital world.‖ Cisco, May 2016.
[28]. ―The biggest security threats coming in 2017.‖ Wired, 2 January 2017: http://www.wired.com/2017/01/biggest-security-threats-coming-2017/
[29]. Doctorow, Cory. ―Winter Denial of Service attack knocks out heating in Finnish homes.‖ BoingBoing, 8 November 2016: http://boingboing. net/2016/11/08/winter-denial-of-service-attac.html
[30]. Banafa, Ahmed. ―Three Major Challenges Facing IoT.‖ SemiWiki.com, 25 May 2017: http://www.semiwiki.com/forum/content/6796-three-majorchallenges- facing-iot.html
[31]. Definitions based in part on the Wikipedia entry on data, at HTTP:// en.wikipedia.org/wiki/Data
[32]. ―Data Lifecycle Overview.‖ USGS website: http://www2.usgs.gov/datamanagement/why-dm/lifecycleoverview.php
[33]. Rubens, Arden. ―A Closer Look: OWASP Top 10 Application Security Risks.‖ CheckMarx, 22 May 2017: http://www.checkmarx.com/2017/05/22/ closer-look-owasp-top-10-application-security-risks/

Keywords
Big data, security, privacy, data knowledge, data sharing.