10 Challenges To Big Data Security and Privacy - Dataconomy

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

1/23/2018 10 Challenges to Big Data Security and Privacy - Dataconomy

BREAKING Time Series Data: A Di cult Yet Tameable Beast

      

438
Shares

259

103

BIG
76 DATA · CYBERSECURITY

10 CHALLENGES TO BIG DATA SECURITY AND PRIVACY


PETER BUTTLER · JULY 28, 2017

0 COMMENTS 0  4.8K  2

Big Data could not be described just in terms of its size. However, to generate a basic understanding, Big Data are datasets which can’t be processed in conventional
database ways to their size. This kind of data accumulation helps improve customer care service in many ways. However, such huge amounts of data can also bring
forth many privacy issues, making Big Data Security a prime concern for any organization. Working in the eld of data security and privacy, many organizations are
acknowledging these threats and taking measures to prevent them.

WHY BIG DATA SECURITY ISSUES ARE SURFACING

Big data is nothing new to large organizations, however, it’s also becoming popular among smaller and medium sized rms due to cost reduction and provided ease
to manage data.

Cloud-based storage has facilitated data mining and collection. However, this big data and cloud storage integration has caused a challenge to privacy and security
threats.

The reason for such breaches may also be that security applications that are designed to store certain amounts of data cannot the big volumes of data that the
aforementioned datasets have. Also, these security technologies are ine cient to manage dynamic data and can control static data only. Therefore, just a regular
security check can not detect security patches for continuous streaming data. For this purpose, you need full-time privacy while data streaming and big data analysis.

PROTECTING TRANSACTION LOGS AND DATA

Data stored in a storage medium, such as transaction logs and other sensitive information, may have varying levels, but that’s not enough. For instance, the transfer
of data between these levels gives the IT manager insight over the data which is being moved. Data size being continuously increased, the scalability and availability
makes auto-tiering necessary for big data storage management. Yet, new challenges are being posed to big data storage as the auto-tiering method doesn’t keep
track of data storage location.  

VALIDATION AND FILTRATION OF END-POINT INPUTS

End-point devices are the main factors for maintaining big data. Storage, processing and other necessary tasks are performed with the help of input data, which is
provided by end-points. Therefore, an organization should make sure to use an authentic and legitimate end-point devices.

SECURING DISTRIBUTED FRAMEWORK CALCULATIONS AND OTHER PROCESSES

Computational security and other digital assets in a distributed framework like MapReduce function of Hadoop, mostly lack security protections. The two main
preventions for it are securing the mappers and protecting the data in the presence of an unauthorized mapper.

SECURING AND PROTECTING DATA IN REAL TIME

Due to large amounts of data generation, most  organizations are unable to maintain regular checks. However, it is most bene cial to perform security checks and
observation in real time or almost in  real time.

http://dataconomy.com/2017/07/10-challenges-big-data-security-privacy/ 1/3
1/23/2018 10 Challenges to Big Data Security and Privacy - Dataconomy
PROTECTING ACCESS CONTROL METHOD COMMUNICATION AND ENCRYPTION  

A secured data storage device is an intelligent step in order to protect the data. Yet, because most often data storage devices are vulnerable, it is necessary to encrypt
the access control methods as well.

DATA PROVENANCE

To classify data, it is necessary to be aware of its origin In order to determine the data origin accurately, authentication, validation and access control could be gained.

GRANULAR AUDITING

Analyzing di erent kinds of logs could be advantageous and this information could be helpful in recognizing any kind of cyber attack or malicious activity. Therefore,
regular auditing can be bene cial.

GRANULAR ACCESS CONTROL

Granular access control of big data stores by NoSQL databases or the Hadoop Distributed File System requires a strong authentication process and mandatory access
control.

PRIVACY PROTECTION FOR NON-RATIONAL DATA STORES

Data stores such as NoSQL have many security vulnerabilities, which cause privacy threats. A prominent security aw is that it is unable to encrypt data during the
tagging or logging of data or while distributing it into di erent groups, when it is streamed or collected.

CONCLUSION

Organizations must ensure that all big data bases are immune to security threats and vulnerabilities. During data collection, all the necessary security protections
such as real-time management should be ful lled. Keeping in mind the huge size of big data, organizations should remember the fact that managing such data could
be di cult and requires extraordinary e orts. However, taking all these steps would help maintain consumer privacy.

Like this article? Subscribe to our weekly newsletter to never miss out!

Follow @DataconomyMedia

TAGS: big data security data privacy

PREVIOUS POST NEXT POST

THE 5 HOTTEST DATA SCIENCE CONFERENCES OF THE SUMMER HIGH PERFORMANCE BIG DATA ANALYSIS USING NUMPY, NUMBA &
PYTHON ASYNCHRONOUS PROGRAMMING

THE AUTHOR

PETER BUTTLER
Peter Buttler is an Infosecurity Expert and Journalist. He Holds a Masters degree in Cybersecurity and technology, vaving 7 years of experience in online
security and privacy. He interviews with security authorities to present expert opinions on current security matters. While writing, he emphasizes on serious
security threats that have an impact worldwide. You can follow him on Twitter @peter_buttlr.

RELATED POSTS

http://dataconomy.com/2017/07/10-challenges-big-data-security-privacy/ 2/3
1/23/2018 10 Challenges to Big Data Security and Privacy - Dataconomy

BIG DATA
GDPR AND THE SKILLS GAP THAT COULD COST YOU €20MILLION

http://dataconomy.com/2017/07/10-challenges-big-data-security-privacy/ 3/3

You might also like