Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Review Article

Big Data Security Issues from the Perspective of IoT and Cloud Computing: A Review

Author(s): Soumya Ray*, Kamta Nath Mishra and Sandip Dutta

Volume 14, Issue 7, 2021

Published on: 23 February, 2020

Page: [2057 - 2078] Pages: 22

DOI: 10.2174/2666255813666200224092717

Price: $65

Abstract

Background: The data is one of the prime assets in today’s world. The continuous data generation ultimately creates a huge volume of data that cannot be processed or stored by a normal relational database management system. This problem is addressed by a new concept: Big Data. Apart from the size of data, security and privacy of data are the more challenging issues in Big data technology.

Objective: The primary objective of the research is to identify the potential security threats of different big data computing technologies and provide a defense mechanism to mitigate the issues.

Methods: To identify the security issues, different existing big data systems are thoroughly analysed and observed. Security systems are completely dependent on the system architecture. This can be a single architecture (dependent on one computing technology) or multi architecture type (dependent on multiple computing technologies). The internal mechanism of different technologies is observed and how the attacks change the behavioural pattern of the systems is the main backbone of the research. Based on the behaviour of dissimilar attacks, a comprehensive defense mechanism is identified. Security and privacy challenges of mobile healthcare are also considered as a case study.

Results: The complete lists of big data computing security threats in different layers of the systems are identified. Through this research, the remedial measures of the different attacks are found. The security challenges of mobile healthcare technology and its predictive measurements are sorted out. The changes of big data security systems behaviour based on its architecture are of the major findings of this research.

Conclusion: The integration of mobile healthcare along with Internet of Things (IoT) and blockchain computing can enhance the system level and hence security threats can be minimized.

Keywords: Big data components, block-chain computing, defence mechanism of attacks, mobile healthcare, security attacks, Zettabyte (ZB).

Graphical Abstract

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy