Reference Hub2
Security and Privacy Issues of Big Data

Security and Privacy Issues of Big Data

José Moura, Carlos Serrão
Copyright: © 2019 |Pages: 33
ISBN13: 9781522575016|ISBN10: 1522575014|EISBN13: 9781522575023
DOI: 10.4018/978-1-5225-7501-6.ch114
Cite Chapter Cite Chapter

MLA

Moura, José, and Carlos Serrão. "Security and Privacy Issues of Big Data." Web Services: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2019, pp. 2197-2229. https://doi.org/10.4018/978-1-5225-7501-6.ch114

APA

Moura, J. & Serrão, C. (2019). Security and Privacy Issues of Big Data. In I. Management Association (Ed.), Web Services: Concepts, Methodologies, Tools, and Applications (pp. 2197-2229). IGI Global. https://doi.org/10.4018/978-1-5225-7501-6.ch114

Chicago

Moura, José, and Carlos Serrão. "Security and Privacy Issues of Big Data." In Web Services: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 2197-2229. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7501-6.ch114

Export Reference

Mendeley
Favorite

Abstract

This chapter revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy. It is a pertinent aspect to be addressed because users share more and more personal data and content through their devices and computers to social networks and public clouds. So, a secure framework to social networks is a very hot topic research. This last topic is addressed in one of the two sections of the current chapter with case studies. In addition, the traditional mechanisms to support security such as firewalls and demilitarized zones are not suitable to be applied in computing systems to support Big Data. SDN is an emergent management solution that could become a convenient mechanism to implement security in Big Data systems, as we show through a second case study at the end of the chapter. This also discusses current relevant work and identifies open issues.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.