A Review on Big Data Analytics between Security and Privacy Issue
DOI:
https://doi.org/10.25007/ajnu.v11n3a1446Keywords:
Big Data, Privacy Issue, Cyber Security, Data Science, AnalysisAbstract
Because of technology, a large number of portable devices, and the great use of networks and the need for them in education, industry, and politics. This widespread has led to the emergence of a huge amount of data, and securing this data has become a very important matter. Big data refers to a very large number of data collected from different sources, this huge amount of data gives us deep insight and the benefit of this is to improve the decision-making process and thus lead to better customer service. Securing this huge amount of data (big data) is very difficult. Because of the large number of data and the continuous flow of this data that's come from different sources. Big data is a term that refers to a large, diverse, and complex amount of data. Big data analytics is a sophisticated and advanced technology used to analyze large, different, and diverse data in order to understand this type of data. However, there are many issues when using and analyzing big data, including the problem of security and privacy. This paper focuses on security and privacy problems and focuses on the biggest privacy issue Big data. The aim of this paper is to study the aspects of security and privacy and to make a comparison of the most important data security methods and the biggest privacy issues.
Downloads
References
Khan, M., & Ansari, M. D. (2019). Security and privacy issue of big data over the cloud computing: a comprehensive analysis. IJRTE-Scopus Indexed, 7(6s), 413-417.
Jain, P., Gyanchandani, M., & Khare, N. (2016). Big data privacy: a technological perspective and review. Journal of Big Data, 3(1), 1-25.
Asaad, R. R. (2021). Penetration Testing: Wireless Network Attacks Method on Kali Linux OS. Academic Journal of Nawroz University, 10(1), 7–12. https://doi.org/10.25007/ajnu.v10n1a998
Mishra, A. D., & Singh, Y. B. (2016, April). Big data analytics for security and privacy challenges. In 2016 International Conference on Computing, Communication and Automation (ICCCA) (pp. 50-53). IEEE.
Salinas, S., Chen, X., Ji, J., & Li, P. (2016). A tutorial on secure outsourcing of large-scale computations for big data. IEEE Access, 4, 1406-1416.
Mishra, A. D., & Singh, Y. B. (2016, April). Big data analytics for security and privacy challenges. In 2016 International Conference on Computing, Communication and Automation (ICCCA) (pp. 50-53). IEEE.
Wibowo, S., & Sumari, A. D. W. (2020). The Utilization of Blockchain for Enhancing Big Data Security and Veracity. In Combating Security Challenges in the Age of Big Data (pp. 157-187). Springer, Cham.
Zaki, A. K. (2014). NoSQL databases: new millennium database for big data, big users, cloud computing and its security challenges. International Journal of Research in Engineering and Technology (IJRET), 3(15), 403-409.
Tran, H. Y., & Hu, J. (2019). Privacy-preserving big data analytics a comprehensive survey. Journal of Parallel and Distributed Computing, 134, 207-218.
Asaad, R. R. (2019). Güler and Linaro et al Model in an Investigation of the Neuronal Dynamics using noise Comparative Study. Academic Journal of Nawroz University, 8(3), 10–16. https://doi.org/10.25007/ajnu.v8n3a360
Zeng, W., Yang, Y., & Luo, B. (2013, October). Access control for big data using data content. In 2013 IEEE International Conference on Big Data (pp. 45-47). IEEE.
Marchal, S., Jiang, X., State, R., & Engel, T. (2014, June). A big data architecture for large scale security monitoring. In 2014 IEEE International Congress on Big Data (pp. 56-63). IEEE.
Yu, S. (2016). Big privacy: Challenges and opportunities of privacy study in the age of big data. IEEE access, 4, 2751-2763.
Rajab Asaad, R., & Masoud Abdulhakim, R. (2021). The Concept of Data Mining and Knowledge Extraction Techniques. Qubahan Academic Journal, 1(2), 17–20. https://doi.org/10.48161/qaj.v1n2a43
Ram Mohan Rao, P., Murali Krishna, S., & Siva Kumar, A. P. (2018). Privacy preservation techniques in big data analytics: a survey. Journal of Big Data, 5(1), 1-12.
Sedayao, J., Bhardwaj, R., & Gorade, N. (2014, June). Making big data, privacy, and anonymization work together in the enterprise: experiences and issues. In 2014 IEEE International Congress on Big Data (pp. 601-607). IEEE.
Asaad, R. R., Ahmad, H. B., & Ali, R. I. (2020). A Review: Big Data Technologies with Hadoop Distributed Filesystem and Implementing M/R. Academic Journal of Nawroz University, 9(1), 25–33. https://doi.org/10.25007/ajnu.v9n1a530
Cui, B., Zhang, B., & Wang, K. (2017, July). A data masking scheme for sensitive big data based on format-preserving encryption. In 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC) (Vol. 1, pp. 518-524). IEEE.
Asaad, R. R., Abdurahman, S. M., & Hani, A. A. (2017). Partial Image Encryption using RC4 Stream Cipher Approach and Embedded in an Image. Academic Journal of Nawroz University, 6(3), 40–45. https://doi.org/10.25007/ajnu.v6n3a76
Devins, C., Felin, T., Kauffman, S., & Koppl, R. (2017). The law and big data. Cornell JL & Public Policy, 27, 357.
Laptev, N., Zeng, K., & Zaniolo, C. (2013, April). Very fast estimation for result and accuracy of big data analytics: The EARL system. In 2013 IEEE 29th International Conference on Data Engineering (ICDE) (pp. 1296-1299). IEEE.
Rajab Asaad, R. (2021). Review on Deep Learning and Neural Network Implementation for Emotions Recognition . Qubahan Academic Journal, 1(1), 1–4. https://doi.org/10.48161/qaj.v1n1a25
Gillis, T. B., & Spiess, J. L. (2019). Big data and discrimination. The University of Chicago Law Review, 86(2), 459-488.
Kalyvas, J. R., & Overly, M. R. (2014). Big Data: A business and legal guide. CRC Press.
Abdulfattah, G. M., Ahmad, M. N., & Asaad, R. R. A RELIABLE BINARIZATION METHOD FOR OFFLINE SIGNATURE SYSTEM BASED ON UNIQUE SIGNER’S PROFILE.
Mehmood, A., Natgunanathan, I., Xiang, Y., Hua, G., & Guo, S. (2016). Protection of big data privacy. IEEE access, 4, 1821-1834.
Scholtes, J. C., & van den Herik, H. J. (2021). Big data analytics for e-discovery. In Research Handbook on Big Data Law. Edward Elgar Publishing.
Price, W., & Nicholson, I. I. (2015). Big data, patents, and the future of medicine. Cardozo L. Rev., 37, 1401.
https://bigdataldn.com/news/big-data-the-3-vs-explained/
Matturdi, B., Zhou, X., Li, S., & Lin, F. (2014). Big Data security and privacy: A review. China Communications, 11(14), 135-145.
Moreno, J., Serrano, M. A., & Fernández-Medina, E. (2016). Main issues in big data security. Future Internet, 8(3), 44.
Zhang, D. (2018, October). Big data security and privacy protection. In 8th international conference on management and computer science (ICMCS 2018) (Vol. 77, pp. 275-278). Atlantis Press.
Asaad, R. R., Abdulrahman, S. M., & Hani, A. A. (2017). Advanced Encryption Standard Enhancement with Output Feedback Block Mode Operation. Academic Journal of Nawroz University, 6(3), 1–10. https://doi.org/10.25007/ajnu.v6n3a70
Terzi, D. S., Terzi, R., & Sagiroglu, S. (2015, December). A survey on security and privacy issues in big data. In 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) (pp. 202-207). IEEE.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Academic Journal of Nawroz University

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors retain copyright
The use of a Creative Commons License enables authors/editors to retain copyright to their work. Publications can be reused and redistributed as long as the original author is correctly attributed.
- Copyright
- The researcher(s), whether a single or joint research paper, must sell and transfer to the publisher (the Academic Journal of Nawroz University) through all the duration of the publication which starts from the date of entering this Agreement into force, the exclusive rights of the research paper/article. These rights include the translation, reuse of papers/articles, transmit or distribute, or use the material or parts(s) contained therein to be published in scientific, academic, technical, professional journals or any other periodicals including any other works derived from them, all over the world, in English and Arabic, whether in print or in electronic edition of such journals and periodicals in all types of media or formats now or that may exist in the future. Rights also include giving license (or granting permission) to a third party to use the materials and any other works derived from them and publish them in such journals and periodicals all over the world. Transfer right under this Agreement includes the right to modify such materials to be used with computer systems and software, or to reproduce or publish it in e-formats and also to incorporate them into retrieval systems.
- Reproduction, reference, transmission, distribution or any other use of the content, or any parts of the subjects included in that content in any manner permitted by this Agreement, must be accompanied by mentioning the source which is (the Academic Journal of Nawroz University) and the publisher in addition to the title of the article, the name of the author (or co-authors), journal’s name, volume or issue, publisher's copyright, and publication year.
- The Academic Journal of Nawroz University reserves all rights to publish research papers/articles issued under a “Creative Commons License (CC BY-NC-ND 4.0) which permits unrestricted use, distribution, and reproduction of the paper/article by any means, provided that the original work is correctly cited.
- Reservation of Rights
The researcher(s) preserves all intellectual property rights (except for the one transferred to the publisher under this Agreement).
- Researcher’s guarantee
The researcher(s) hereby guarantees that the content of the paper/article is original. It has been submitted only to the Academic Journal of Nawroz University and has not been previously published by any other party.
In the event that the paper/article is written jointly with other researchers, the researcher guarantees that he/she has informed the other co-authors about the terms of this agreement, as well as obtaining their signature or written permission to sign on their behalf.
The author further guarantees:
- The research paper/article does not contain any defamatory statements or illegal comments.
- The research paper/article does not violate other's rights (including but not limited to copyright, patent, and trademark rights).
This research paper/article does not contain any facts or instructions that could cause damages or harm to others, and publishing it does not lead to disclosure of any confidential information.