Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3378904.3378907acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbdetConference Proceedingsconference-collections
research-article

Security Challenges for Big Data and IoT

Published: 09 April 2020 Publication History

Abstract

Recently, two terms, namely Big Data and Internet of Things (IoT) have gained popularity individually. However, their interconnections are not fully explored and understood. It is expected that the fusion of Big Data and IoT would create many complex systems for smart cities. While the data from IoT lies in Big Data, the scale of operations are completely different in terms of providing the required real-time analytics for such smart systems. Even though NoSQL databases and other next generation solutions could be deployed to achieve real-time responses, the major security challenges need to be understood as mission critical and sensitive data intertwines Big Data and IoT. In this paper, we identify the security challenges shared by the closely-knit Big Data and IoT in three main risk areas: i) NoSQL security vulnerabilities, ii) mobile IoT (M-IoT) security and privacy constraints and iii) encryption key security threats. We perform a comparative study of security vulnerabilities of NoSQL databases and identify the security and privacy constraints of M-IoT networks. Encryption key attacks for resource constrained IoT devices are also illustrated mathematically. Overall, this paper explores new research directions in these prime areas of security and privacy that would result in solution opportunities for a meaningful fusion of Big Data and IoT for a smart environment.

References

[1]
Silva, C.R., and Rodrigues E.M.T. 2017. Privacy In Big Data: Overview And Research Agenda, Electronic Journal of Management & System, 12(4), 491--505.
[2]
Cai, H., Xu, B., Jiang, L., and Vasilakos, A.V. 2016. IoT-Based Big Data Storage Systems in Cloud Computing: Perspectives and Challenges. IEEE Internet of Things Journal, 4, 75--87.
[3]
Jung, J. J. 2017. Computational Collective Intelligence with Big Data: Challenges and Opportunities. Future Generation Computer Systems, 66, 87--88.
[4]
Lv, Z., Song, H., Basanta-Val, P., Steed, A., and Jo, M. 2017. Next-Generation Big Data Analytics: State of the Art, Challenges, and Future Research Topics. IEEE Transactions on Industrial Informatics, 13, 1891--1899.
[5]
Sun, Y., Song, H., Jara, A.J. and Bie R. 2016. Internet of things and big data analytics for smart and connected communities. IEEE Access. 4, 766--773.
[6]
Kumar, N. Vasilakos, A. V. and Rodrigues, J. J. 2017. A multi-tenant cloud-based DC nano grid for self-sustained smart buildings in smart cities, IEEE Communications Magazine, 55(3), 14--21.
[7]
Hung, M. 2017. IoT's Challenges and Opportunities in 2017: A Gartner Trend Insight Report, Gartner Report, USA.
[8]
Deka G. C. 2019. Cloud Database Security Issues and Challenges. In I. Management Association (Ed.), Cloud Security: Concepts, Methodologies, Tools, and Applications (pp. 165--187). Hershey, PA: IGI Global.
[9]
Marsh R, Belguith S. and Dargahi T. 2019. IoT Database Forensics: An Investigation on HarperDB Security. ICFNDS '19 Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, Paris, France.
[10]
Ahmad K., Alam M. S. and Udzir N. 2019. Security of NoSQL Database Against Intruders. Recent Patents on Engineering. 13(1), 5--12.
[11]
Venkatraman S., Fahd S., Kaspi S., and Venkatraman R. 2016. SQL Versus NoSQL Movement with Big Data Analytics, International Journal of Information Technology and Computer Science, 8(12), 59--66.
[12]
Dadapeer, N.M. Indravasan, & Adarsh G. 2016. A Survey on Security of NoSQL Databases, International Journal of Innovative Research in Computer and Communication Engineering, 4(4), 5249--5254.
[13]
Okman L., Gal-Oz N., Gonen Y., Gudes E. & Abramov J. 2011. Security Issues in NoSQL. TrustCom IEEE Conference on International Conference on Trust, Security and Privacy in Computing and Communications, 7, 541--547.
[14]
Ghazi Y, Masood R., Rauf A., Shibli A., and Hassan O. 2016. DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases. EURASIP Journal on Information Security, 2016, 1--17.
[15]
NIST, 2018.Big Data Interoperability Framework: Volume 6, Reference Architecture, NIST, USA.
[16]
Kang, Y., Park, I., Rhee, J., & Lee, Y. 2016. MongoDB-Based Repository Design for IoT-Generated RFID/Sensor Big Data. IEEE Sensors Journal, 16, 485--497.
[17]
Kibiwott, K.P., Zhao, Y., Kogo, J., and Zhang, F. 2019. Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing, Mathematical Biosciences & Engineering, 16(5), 3561--3594.
[18]
Venkatraman, S. and Overmars, A. 2019. New Method of Prime Factorisation-Based Attacks on RSA Authentication in IoT. Cryptography 3(3), 20.
[19]
Beach, C.; Krachunov, S.; Pope, J.; Fafoutis, X.; Piechocki, R.J.; Craddock, I.; Casson, A.J. An ultra low power personalizable wrist worn ECG monitor integrated with IoT infrastructure. IEEE Access 2018, 6, 44010--44021.
[20]
Gomes, T.; Salgado, F.; Pinto, S.; Cabral, J.; Tavares, A. A 6LoWPAN accelerator for Internet of Things endpoint devices. IEEE Internet Things J. 2018, 5, 371--377.
[21]
Li, S.; Da Xu, L.; Zhao, S. 5G internet of things: A survey. J. Ind. Inf. Integr. 2018, 10, 1--9.
[22]
Ahmadi, H.; Arji, G.; Shahmoradi, L.; Safdari, R.; Nilashi, M.; Alizadeh, M. The application of internet of things in healthcare: A systematic literature review and classification. Univer. Access Inf. Soc. 2018, 1--33.
[23]
Mishra, A.K.; Tripathy, A.K.; Puthal, D.; Yang, L.T. Analytical model for Sybil attack phases in internet of things. IEEE Internet Things J. 2019, 6, 379--387.
[24]
Tang, W.; Zhang, K.; Zhang, D.; Ren, J.; Zhang, Y.; Shen, X.S. Fog-Enabled Smart Health: Toward Cooperative and Secure Healthcare Service Provision. IEEE Commun. Mag. 2019, 57, 42--48.
[25]
Stergiou, C.; Psannis, K.E.; Kim, B.G.; Gupta, B. Secure integration of IoT and cloud computing. Future Gener. Comput. Syst. 2018, 78, 964--975.
[26]
Mutlag, A.A.; Ghani, M.K.A.; Arunkumar, N.; Mohamed, M.A.; Mohd, O. Enabling technologies for fog computing in healthcare IoT systems. Future Gener. Comput. Syst. 2019, 90, 62--78.
[27]
You, I.; Leu, F.Y. Comments on "SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks". IEEE Syst. J. 2018, 12, 1038--1041.

Cited By

View all
  • (2023)ODCS: On-Demand Hierarchical Consistent Synchronization Approach for the IoTElectronics10.3390/electronics1222470812:22(4708)Online publication date: 20-Nov-2023
  • (2022)An exploratory study of rethinking user experience in the internet of thingsComputing10.1007/s00607-022-01111-3105:1(1-12)Online publication date: 5-Aug-2022
  • (2021)Commercial hypervisor-based task sandboxing mechanisms are unsecured? But we can fix it!Journal of Systems Architecture: the EUROMICRO Journal10.1016/j.sysarc.2021.102114116:COnline publication date: 1-Jun-2021
  • Show More Cited By

Index Terms

  1. Security Challenges for Big Data and IoT

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    BDET '20: Proceedings of the 2020 2nd International Conference on Big Data Engineering and Technology
    January 2020
    126 pages
    ISBN:9781450376839
    DOI:10.1145/3378904
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Natl University of Singapore: National University of Singapore
    • Southwest Jiaotong University

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 09 April 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Big data
    2. IoT
    3. NoSQL
    4. attacks
    5. challenges
    6. factorization
    7. security

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    BDET 2020

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)78
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 26 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)ODCS: On-Demand Hierarchical Consistent Synchronization Approach for the IoTElectronics10.3390/electronics1222470812:22(4708)Online publication date: 20-Nov-2023
    • (2022)An exploratory study of rethinking user experience in the internet of thingsComputing10.1007/s00607-022-01111-3105:1(1-12)Online publication date: 5-Aug-2022
    • (2021)Commercial hypervisor-based task sandboxing mechanisms are unsecured? But we can fix it!Journal of Systems Architecture: the EUROMICRO Journal10.1016/j.sysarc.2021.102114116:COnline publication date: 1-Jun-2021
    • (2021)Application of Machine Learning Algorithms in Ensuring Information Security of the Internet of Things in Water TransportSafety in Aviation and Space Technologies10.1007/978-3-030-85057-9_45(543-557)Online publication date: 2-Nov-2021

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media