Abstract
Securing big data is among the major challenges for information suppliers. Indeed, the lack of a robust methodological solution dedicated to the big data security makes the issues of privacy and personal data protection major research areas. In fact, many studies and works have dealt with the meeting between privacy and big information. Because of the huge volume of data that spread between social networks and clouds Application, we have to think about an approach that addresses enhancing data security in databases, specifically in the context of NoSQL environments. This paper introduces a new methodological approach for big data security based on data fragmentation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
- 3.
- 4.
References
Ciliani, V., De Capitani, S., Vimercati, D., Foresti, S.: Combining fragmentation and encryption to protect privacy in data storage. ACM 13(3), 1–30 (2010)
McKendrick, J., IOUG Enterprise Data Security Survey: Closing the Security Gap, the Independent Oracle Users Group (IOUG) Security report, November 2012
Cloud security appliance, the-expanded-top ten-big-data-security-privacy challenges, CSA White Paper (2010)
dos Santos, R.J.R.: enhancing data security in data warehousing, Ph.D. thesis in Information Sciences and Technology, supervised by Professor Jorge Bernardino and Professor Marco Vieira, The University of Coimbra, February 2014
Pesante, L.: Introduction to Information Security. Carnegie Mellon University, Pittsburgh (2008)
Zvarevash, K., Mutandavari, M., Gotora, T.: A survey of the security use cases in big data. Int. J. Innov. Res. Comput. Commun. Eng. 2(5), 4259–4266 (2014)
Oracle Corporation: New Big Data Appliance Security Features. Oracle White Paper, November, 2013
Tene, O., Polonetsky, J.: Privacy in the age of big data: a time for big decisions, 64 Stan. L. Rev. Online 63, 2 February 2012
Sood, K.S.: A combined approach to ensure data security in cloud computing. J. Netw. Comput. Appl. 35(6), 1831–2012 (2012)
Rekatsinas, T., Deshpande, A., Machanavajjhala, A.: A SPARSI: partitioning sensitive data amongst multiple adversaries. PVLDB 6(13), 1594–1605 (2013)
Moniruzzaman, A.B.M., Hossain, S.A.: NOSQL database: new era of databases for big data analytics- classification, characteristics and comparison. Int. J. Database Theory Appl. 6(4) (2013)
Vinogradov, S., yak, A.P.: Evaluation of data anonymization tools. In: The Fourth International Conference on Advances in Databases, Knowledge, and Data Applications (2012)
Navaz, S.: A.S., Prabhadevi, C., Sangeetha, V.: Data grid concepts for data security in distributed computing (0975 – 8887). Int. J. Comput. Appl. 61(13), 6–11 (2013)
Oracle Corporation, “Security and the Data Warehouse”, Oracle White Paper, April 2005
Oracle Corporation, Oracle Advanced Security Transparent Data Encryption Best Practices, Oracle White Paper, July 2010
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Heni, H., Gargouri, F. (2015). A Methodological Approach for Big Data Security: Application for NoSQL Data Stores. In: Arik, S., Huang, T., Lai, W., Liu, Q. (eds) Neural Information Processing. ICONIP 2015. Lecture Notes in Computer Science(), vol 9492. Springer, Cham. https://doi.org/10.1007/978-3-319-26561-2_80
Download citation
DOI: https://doi.org/10.1007/978-3-319-26561-2_80
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-26560-5
Online ISBN: 978-3-319-26561-2
eBook Packages: Computer ScienceComputer Science (R0)