[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3281375.3281393acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmedesConference Proceedingsconference-collections
short-paper

Toward big data analysis to improve enterprise information security

Published: 25 September 2018 Publication History

Abstract

In recent years, big data and cloud computing are considered key trends of modern computer technology. Extracting valuable information is the key purpose of analyzing big data that needs to be secured in order to avoid any potential risks. Most cloud systems applications contain sensitive data, such as; financial, legal and private information. Therefore, threats on such data may put cloud systems holding this data at high risk. The demand on securing cloud systems applications has been increasing rapidly; however, big data protection is still a challenge. This paper proposes a new methodology to protect big data during analysis by classifying data before any action such as moving, copying or processing take place. Big data files are classified according to the criticality level of their contents into three categories from the most to the least sensitive: restricted, confidential and public. Based on big data classification, the encryption algorithm AES 128 is applied on confidential big data, while the encryption algorithm AES 256 is applied on the restricted big data files. The experimental results show that our method enhances the performance of big data analysis systems and outperforms other approaches in the literature.

References

[1]
Al-Shomrani, A., Fathy, F. and Jambi, K., 2017, March. Policy enforcement for big data security. The 2nd International Conference on Anti-Cyber Crimes (ICACC), 2017, (pp. 70--74). IEEE
[2]
Paryasto, M., Alamsyah, A. and Rahardjo, B., 2014, May. Big-data security management issues. The 2nd International Conference on In Information and Communication Technology (ICoICT), 2014 (pp. 59--63). IEEE
[3]
ISO/IEC 27002:2013 Last Accessed : 21/06/2018.
[4]
https://en.wikipedia.org/wiki/Metadata. Last Accessed: 05/07/2018
[5]
https://hadoop.apache.org/docs/r1.2.1/mapred_tutorial.html .Last Accessed:2/7/2018
[6]
M. Mohurle, and V. Panchbhai, July 2016, Review on realization of AES encryption and decryption with power and area optimization. In Power Electronics, IEEE International Conference on Intelligent Control and Energy Systems (ICPEICES), (pp. 1--3).
[7]
A. M Borkar, R. V. Kshirsagar, and M. V Vyawahare, 2011, April. FPGA implementation of AES algorithm. In Electronics Computer Technology (ICECT), 2011 3rd International Conference on (Vol. 3, pp. 401--405). IEEE.
[8]
G. Raj, R. C. Kesireddi, and S. Gupta., 2015, September. Enhancement of security mechanism for confidential data using AES-128, 192 and 256bit encryption in cloud. In Next Generation Computing Technologies (NGCT), 2015 1st International Conference on (pp. 374--378). IEEE.
[9]
S. H Kim, N. U. Kim, and T. M. Chung, 2013, December. Attribute relationship evaluation methodology for big data security. In IT Convergence and Security (ICITCS), 2013 International Conference on (pp. 1--4). IEEE.
[10]
C. Tankard, 2012. Big data security. Network security, 2012(7), pp.5--8.
[11]
Y. Gahi, M. Guennoun, and H. T. Mouftah, 2016, June. Big Data Analytics: Security and privacy challenges. In Computers and Communication (ISCC), 2016 IEEE Symposium on (pp. 952--957). IEEE.
[12]
T. Zaki, M.S. Uddin, M.M. Hasan, and M.N. Isla, 2017, July. Security threats for big data: A study on Enron e-mail dataset. In Research and Innovation in Information Systems (ICRIIS), 2017 International Conference on (pp. 1--6). IEEE.
[13]
N. Chaudhariand S. Srivastava, 2016, April. Big data security issues and challenges. In Computing, Communication and Automation (ICCCA), 2016 International Conference on (pp. 60--64). IEEE.
[14]
S. H. Kim, J.H. Eom, and T.M. Chung, 2013, June. Big data security hardening methodology using attributes relationship. In Information Science and Applications (ICISA), 2013 International Conference on (pp. 1--2). IEEE.
[15]
V. Gadepally, B. Hancock, B. Kaiser, J. Kepner, P. Michaleas, M. Varia, and A. Yerukhimovich, 2015, April. Computing on masked data to improve the security of big data. In Technologies for Homeland Security (HST), 2015 IEEE International Symposium on (pp. 1--6). IEEE.
[16]
S. Alouneh, A. En-Nouaary and A. Agarwal, "Securing MPLS Networks with Multi-path Routing," Fourth International Conference on Information Technology (ITNG'07), Las Vegas, NV, 2007, pp. 809--814.

Cited By

View all
  • (2024)Bridging the Digital Divide: Securing Information and Computer Systems in an Unequal WorldImplications of Information and Digital Technologies for Development10.1007/978-3-031-66986-6_6(77-90)Online publication date: 1-Aug-2024
  • (2023)Security Protocols and Mechanisms for Sharing Near-Real-Time Environmental Data with Multiple Audiences During DisastersProceedings of the Future Technologies Conference (FTC) 2023, Volume 210.1007/978-3-031-47451-4_15(214-224)Online publication date: 1-Nov-2023
  • (2019)An Integrated Methodology for Big Data Classification and Security for Improving Cloud Systems Data MobilityIEEE Access10.1109/ACCESS.2018.28900997(9153-9163)Online publication date: 2019

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
MEDES '18: Proceedings of the 10th International Conference on Management of Digital EcoSystems
September 2018
253 pages
ISBN:9781450356220
DOI:10.1145/3281375
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 September 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. data classification
  2. encryption
  3. threats

Qualifiers

  • Short-paper

Conference

MEDES '18

Acceptance Rates

MEDES '18 Paper Acceptance Rate 29 of 77 submissions, 38%;
Overall Acceptance Rate 267 of 682 submissions, 39%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Bridging the Digital Divide: Securing Information and Computer Systems in an Unequal WorldImplications of Information and Digital Technologies for Development10.1007/978-3-031-66986-6_6(77-90)Online publication date: 1-Aug-2024
  • (2023)Security Protocols and Mechanisms for Sharing Near-Real-Time Environmental Data with Multiple Audiences During DisastersProceedings of the Future Technologies Conference (FTC) 2023, Volume 210.1007/978-3-031-47451-4_15(214-224)Online publication date: 1-Nov-2023
  • (2019)An Integrated Methodology for Big Data Classification and Security for Improving Cloud Systems Data MobilityIEEE Access10.1109/ACCESS.2018.28900997(9153-9163)Online publication date: 2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media