Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security

Author:

V. Manjunatha1,Hegde Shreedhara N1,Mohd Rosely Nur Fatin Liyana2

Affiliation:

1. Dayananda Sagar Academy of Technology andManagementCollege Bangalore, India

2. Faculty of Data Science and Information Technology, INTI International University, Nilai, Malaysia

Abstract

In the age of information, the proverb "knowledge is power" has been shown to be true. admission to, which ultimately leads to knowledge acquisition. The relevance of the ability to glean knowledge from vast amounts of facts has increased. To describe the process of distributing, storing, and gathering enormous amounts of data for future analysis, researchers coined the term "big data analytics" (BDA). Data is generated at an alarming rate. The Internet of Things (IoT), the net's explosive expansion, and other technological advancements are the main forces behind this long-term growth. Since the information generated reflects the environment in which it is formed, the use of information gleaned from systems to understand the inner workings of those systems. The goal of protecting assets has been developed into a crucial component of cybersecurity. Additionally, big data now has the status of a high-value target due to the growing value of data. Current cybersecurity research in relation to big data has been reported here to explore big data security and its potential use as a cybersecurity tool. This gives trends, open research projects, and challenges along with a summary of current studies in the form of tables. In addition to current advancements and unanswered questions in this area of active research, this research work also provides readers a more thorough understanding of safety in the big data era.

Publisher

INTI International University

Reference12 articles.

1. A. A. A. A. Abdulla and J. M. Zain. Big data security and privacy: A survey and a layered taxonomy. Big Data Research, 32:100383, 2023, 10.1109/ISCIT.2016.7751634

2. A. A. Cárdenas, J. Ferrante, and A. M. Masri. Big data in security. IEEE Security & Privacy, 13(6):8–11, 2018.

3. Z. Chen, Y. Xiang, Y. Zhou, and D. Wu. Big data security and privacy protection in smart city. China Communications, 15(2):124–143, 2018, 10.1007/s11432-017-9229-2

4. H. Gupta and N. R. Chaudhary. Big data analytics for cybersecurity: A review. Wireless Personal Communications, 101(1):345–368, 2018, 10.1109/ICSCAN.2018.8541263

5. A. K. Jain and J. Mao. Artificial intelligence and big data in cybersecurity. IEEE Cloud Computing, 5(1):26–31, 2018. 10.1109/MCC.2017.4721440

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3