Nothing Special   »   [go: up one dir, main page]

Skip to main content

A Methodological Approach for Big Data Security: Application for NoSQL Data Stores

  • Conference paper
  • First Online:
Neural Information Processing (ICONIP 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9492))

Included in the following conference series:

Abstract

Securing big data is among the major challenges for information suppliers. Indeed, the lack of a robust methodological solution dedicated to the big data security makes the issues of privacy and personal data protection major research areas. In fact, many studies and works have dealt with the meeting between privacy and big information. Because of the huge volume of data that spread between social networks and clouds Application, we have to think about an approach that addresses enhancing data security in databases, specifically in the context of NoSQL environments. This paper introduces a new methodological approach for big data security based on data fragmentation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    http://www.ibm.com/systems/data/flash/lv/pdf/venkateshSadayappan_IBMForum2013.pdf.

  2. 2.

    https://cloudsecurityalliance.org/media/news/csareleases-the-expanded-top-ten-big-data-security-privacychallenges/.

  3. 3.

    http://searchdatamanagement.techtarget.com/definition/NoSQL-Not-Only-SQL.

  4. 4.

    http://docs.mongodb.org/ecosystem/tools/administration-interfaces/

References

  1. Ciliani, V., De Capitani, S., Vimercati, D., Foresti, S.: Combining fragmentation and encryption to protect privacy in data storage. ACM 13(3), 1–30 (2010)

    Google Scholar 

  2. McKendrick, J., IOUG Enterprise Data Security Survey: Closing the Security Gap, the Independent Oracle Users Group (IOUG) Security report, November 2012

    Google Scholar 

  3. Cloud security appliance, the-expanded-top ten-big-data-security-privacy challenges, CSA White Paper (2010)

    Google Scholar 

  4. dos Santos, R.J.R.: enhancing data security in data warehousing, Ph.D. thesis in Information Sciences and Technology, supervised by Professor Jorge Bernardino and Professor Marco Vieira, The University of Coimbra, February 2014

    Google Scholar 

  5. Pesante, L.: Introduction to Information Security. Carnegie Mellon University, Pittsburgh (2008)

    Google Scholar 

  6. Zvarevash, K., Mutandavari, M., Gotora, T.: A survey of the security use cases in big data. Int. J. Innov. Res. Comput. Commun. Eng. 2(5), 4259–4266 (2014)

    Google Scholar 

  7. Oracle Corporation: New Big Data Appliance Security Features. Oracle White Paper, November, 2013

    Google Scholar 

  8. Tene, O., Polonetsky, J.: Privacy in the age of big data: a time for big decisions, 64 Stan. L. Rev. Online 63, 2 February 2012

    Google Scholar 

  9. Sood, K.S.: A combined approach to ensure data security in cloud computing. J. Netw. Comput. Appl. 35(6), 1831–2012 (2012)

    Article  Google Scholar 

  10. Rekatsinas, T., Deshpande, A., Machanavajjhala, A.: A SPARSI: partitioning sensitive data amongst multiple adversaries. PVLDB 6(13), 1594–1605 (2013)

    Google Scholar 

  11. Moniruzzaman, A.B.M., Hossain, S.A.: NOSQL database: new era of databases for big data analytics- classification, characteristics and comparison. Int. J. Database Theory Appl. 6(4) (2013)

    Google Scholar 

  12. Vinogradov, S., yak, A.P.: Evaluation of data anonymization tools. In: The Fourth International Conference on Advances in Databases, Knowledge, and Data Applications (2012)

    Google Scholar 

  13. Navaz, S.: A.S., Prabhadevi, C., Sangeetha, V.: Data grid concepts for data security in distributed computing (0975 – 8887). Int. J. Comput. Appl. 61(13), 6–11 (2013)

    Google Scholar 

  14. Oracle Corporation, “Security and the Data Warehouse”, Oracle White Paper, April 2005

    Google Scholar 

  15. Oracle Corporation, Oracle Advanced Security Transparent Data Encryption Best Practices, Oracle White Paper, July 2010

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Houyem Heni .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Heni, H., Gargouri, F. (2015). A Methodological Approach for Big Data Security: Application for NoSQL Data Stores. In: Arik, S., Huang, T., Lai, W., Liu, Q. (eds) Neural Information Processing. ICONIP 2015. Lecture Notes in Computer Science(), vol 9492. Springer, Cham. https://doi.org/10.1007/978-3-319-26561-2_80

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26561-2_80

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26560-5

  • Online ISBN: 978-3-319-26561-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics