Big Data
Concept

Velocity

data are growing and changing in a rapid way

Variety

data come in different and multiple formats

Volume

huge amount of data is generated every second

Vision

the defined purpose of Big Data mining

Verification

processed data comply to some specifications

Validation

the purpose is fulfilled

Value

pertinent information can be extracted for the
benefit of many sectors

Complexity

it is difficult to organize and analyse Big Data
because of evolving data relationships

Immutability

collected and stored Big Data can be permanent
if well managed

Big Data
Security

Security Challenges

Big Data Nature

Adding security layers may slow system performances
and affect dynamic analysis

It is difficult to handle data classification and management
of large digital disparate sources

Sharing data over many networks increase security risks

The Need to Share
Information

Multiple connections with different levels
of securities

Data sharing associated with advanced
analytics techniques

Discovering confidential information

Illegal access to network's traffics

Correlation attacks, arbitrary identification,
intended identification attacks, etc

Multiple Security
Requirements

To handle information security while managing
massive and rapid data streams

Security tools should be flexible and easily scalable

There is a need to find a balance between multiple
security requirements, privacy obligations, system
performance and rapid dynamic analysis

Inadequate Traditional
Solutions

e.g.: types of data encryption

slow the performance

are time-consuming

are not efficient

New Security Tools
Lack of Maturity

Data Anonymization

Should be achieved without affecting system
performance or data quality

Traditional anonymization techniques are based
on several iterations and time consuming computations

may affect data consistency

may slow down system performance

It is difficult to process and analyse anonymized
Big Data

Compatibility with Big
Data Technologies

some security techniques are incompatible
with commonly used Big Data technologies
(e.g.: MapReduce)

It is mandatory to verify their compatibility
with organization Big Data requirements and
existing infrastructure components.
(Zhao et al., 2014)

Information Reliability
and Quality

It is important to verify Big Data sources
authenticity and integrity before analysing
data

It is difficult to assess the authenticity and
integrity of all various data sources

Data have to be filtered, organized and
contextualized before performing any analysis

Compliance to Security
Laws Regulations and Policies

Deal with multiple laws and regulations
(Tankard, 2012)

Big Data analytics may be in conflict
with some privacy principles.

Need of Big Data Experts

need for advanced security analysis experts
(Constantine, 2014)

Big Data Security on Social Networks

Can prevent terrorist and security
attacks and assess citizens' satisfaction
regarding public services

Detect rapidly abnormal patterns and
ensure a real-time monitoring of
alarming events

aims to ensure

a real-time monitoring to detect vulnerabilities,
security threats and abnormal behaviours

a granular role-based access control

a robust protection of confidential information

a generation of security performance indicators

Three main aspects
(Kim, Kim & Chung, 2013)

Information Security

Security Monitoring

Data Security

Managing Security
(Lu at al., 2013)

ensure Big Data management

ensure system integrity

ensure cyberspace security

Security Solutions

Security Foundations
for Big Data Projects

Risk Analysis Related to
Multiple Technologies

Choosing Adequate
Security Solutions

Dynamic analysis

To detect timely
security incidents

To identity abnormal
customer's behaviours

To monitor security threats

To discover known and
new cyber-attack patterns

Anonymization of Confidential
or Personal Data

Models for data
anonymization

Sub-tree

c1

Top-Down Specialization
(TDS)

Bottom-Up Generalization
(BUG)

Hybrid approach
(TDS + BUG)

c1

t-closeness

m-invariance

k-anonymity

l-diversity

Data Cryptography

Homomorphic Cryptography

Cloud Background Hierarchical
Key Exchange (CBHKE)

Centralized Security
Management

Data Confidentiality and
Data Access Monitoring

Security Surveillance
and Monitoring

Data Loss Prevention
(DLP)

Security Information and Event
Management (SIEM)

dynamic analysis of security
events