Reference Hub20
Security and Privacy Issues of Big Data

Security and Privacy Issues of Big Data

José Moura, Carlos Serrão
ISBN13: 9781466685055|ISBN10: 1466685050|EISBN13: 9781466685062
DOI: 10.4018/978-1-4666-8505-5.ch002
Cite Chapter Cite Chapter

MLA

Moura, José, and Carlos Serrão. "Security and Privacy Issues of Big Data." Handbook of Research on Trends and Future Directions in Big Data and Web Intelligence, edited by Noor Zaman, et al., IGI Global, 2015, pp. 20-52. https://doi.org/10.4018/978-1-4666-8505-5.ch002

APA

Moura, J. & Serrão, C. (2015). Security and Privacy Issues of Big Data. In N. Zaman, M. Seliaman, M. Hassan, & F. Marquez (Eds.), Handbook of Research on Trends and Future Directions in Big Data and Web Intelligence (pp. 20-52). IGI Global. https://doi.org/10.4018/978-1-4666-8505-5.ch002

Chicago

Moura, José, and Carlos Serrão. "Security and Privacy Issues of Big Data." In Handbook of Research on Trends and Future Directions in Big Data and Web Intelligence, edited by Noor Zaman, et al., 20-52. Hershey, PA: IGI Global, 2015. https://doi.org/10.4018/978-1-4666-8505-5.ch002

Export Reference

Mendeley
Favorite

Abstract

This chapter revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy. It is a pertinent aspect to be addressed because users share more and more personal data and content through their devices and computers to social networks and public clouds. So, a secure framework to social networks is a very hot topic research. This last topic is addressed in one of the two sections of the current chapter with case studies. In addition, the traditional mechanisms to support security such as firewalls and demilitarized zones are not suitable to be applied in computing systems to support Big Data. SDN is an emergent management solution that could become a convenient mechanism to implement security in Big Data systems, as we show through a second case study at the end of the chapter. This also discusses current relevant work and identifies open issues.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.