BIG DATA TECHNOLOGIES AND INFORMATION SECURITY CHALLENGES - Problems of Information Technology

BIG DATA TECHNOLOGIES AND INFORMATION SECURITY CHALLENGES - Problems of Information Technology

BIG DATA TECHNOLOGIES AND INFORMATION SECURITY CHALLENGES - Problems of Information Technology

BIG DATA TECHNOLOGIES AND INFORMATION SECURITY CHALLENGES - Problems of Information Technology

BIG DATA TECHNOLOGIES AND INFORMATION SECURITY CHALLENGES - Problems of Information Technology
BIG DATA TECHNOLOGIES AND INFORMATION SECURITY CHALLENGES - Problems of Information Technology
AZERBAIJAN NATIONAL ACADEMY OF SCIENCES

№1, 2016

BIG DATA TECHNOLOGIES AND INFORMATION SECURITY CHALLENGES

Makrufa S. Hajirahimova

The notion of Big Data, which is a new era in information processing, is widely discussed in the business environment, mass media and scientific literature. Big Data technology can make revolutionary changes in the field of governance, health, science, business, e-commerce, industry and others. On the one hand, it opens up new opportunities for the society, but on the other hand, it causes new security problems. The article gives a brief description of the Big Data technology and investigates the use of Big Data analytics and some security issues. In addition, it considers the new ethical problems created by Big Data in terms of personal data protection and offers some recommendations. (pp. 41-46)

Keywords: big data, big data analytics, security, anonymisation, privacy, identification, de-identification, encryption.
DOI : 10.25045/jpit.v07.i1.06
References
  • Aliguliyev R.M., Hajirahimova M.Sh. Big data phenomenon: Challenges and Opportunities // Information Technology, 2014, No 1, pp. 3-16.
  • The digital universe in 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East. Study report, IDC, December 2012. www.emc.com/leadership/digital-universe.
  • Diebold F.X. Big Data Dynamic Factor Models for Macroeconomic Measurement and Discussion Read to the Eighth World Congress of the Econometric Society, 2000.
  • Dean J., Ghemawat S. MapReduce: Simplified Data Processing on Large Clusters / Proceedings of the Sixth Symposium on Operating System Design and Implementation, vol.6, 2004, pp.137–150.
  • Hadoop. http://hadoop.apache.org/.
  • Alguliyev R., Imamverdiyev Y., Yusifov F. Some conceptual views on information security of the society // Journal of Communication and Computer, 2012, vol.9, pp. 644-648.
  • Lei X.; Chunxiao J., Jian W., Jian Y., Yong R., Information Security in Big Data: Privacy and Data Mining // IEEE Access, 2014, vol.2, pp.1149–1176.
  • Big data and data protection.https://ico.org.uk/media/for-organisations/documents/1541/
  • Big data and privacy. A technological perspective. White House, May 2014.
  • Big data and privacy, MIT 2013. http://bigdata.csail.mit.edu
  • Alguliyev R., Imamverdiyev Y. Big Data: Big promises for information security / Proceedings of the IEEE 8th International Conference on Application of Information and Communication Technologies (AICT), Astana, Kazakhstan 15-17 October, 2014, pp.216–219.
  • Laney D., 3D Data Management: Controlling Data Volume, Velocity and Variety. Technical report, META Group, Inc (now Gartner, Inc.), February 2001. http://blogs.gartner.com/
  • Gandomi A., Haider M. Beyond the hype: Big data concepts, methods, and analytics // Ted International Journal of Information Management, 2015, vol.35, pp.137–144.
  • Kambatla K., Kollias G., Kumar V., Grama A. Trends in Big Data Analytics // Parallel Distributed Computing, 2014, vol.74, no.7, pp.2561–2573.
  • Wu X., Zhu X., Wu G.Q., Ding W. Data mining with big data // IEEE Transactionson Knowledge and Data Engineering. 2014, vol.26, no.1, pp.97–107.
  • Che D., Safran M., Peng Z. From big data to big data mining: challenges, issues, and opportunities, in: B.Hong, X.Meng, L.Chen, W.Winiwarter, W.Song (Eds.), Database Systems for Advanced Applications, Springer, Berlin Heidelberg, 2013, pp.1–15.
  • http://cloudtimes.org/2014/02/12/gartner-report-big-data-will-revolutionize-the-cybersecurity-in-next-two-year/
  • Tene O., Polonetsky J. Big Data for All: Privacy and User Control in the age of analytics // Northwestern Journal of Technology and Intellectual Property, 2013, vol.11, no.5, pp.239–273.
  • Danger: 3 Reasons to Be Scared of Big Data. http://smartdatacollective.com/
  • Cloud Security Alliance, Expanded Top Ten Big Data Security and Privacy Challenges, 2013.
  • Malbrecht T., Prekopcsak Z. Big Data Security on Hadoop. www.rapidminer.com
  • Law of the Republic of Azerbaijan on Personal information, 2010, May 11. http://www.dmx.gov.az/userfiles/files/ferdimelumatlarqanun3.pdf
  • Duhigg C. How companies learn your secrets. New York Times, 2012, 16 February.
  • Agrawal D., Das S., Amr El Abbadi. Big Data and Cloud Computing: Current State and Future Opportunities / Proceedings of the 14th International Conference on Extending Database Technology, 2011, pp.530–533.
  • Yin C., Wang J., Xie C., et.al. Robot: An efficient model for big data storage systems based on erasure coding / IEEE International Conference on Big Data, 2013, pp.163–168.
  • Protection of personal data, 1995. http://eur-lex.europa.eu/legal-content/EN/