Reference Hub1
Security and Privacy Issues of Big Data

Security and Privacy Issues of Big Data

José Moura, Carlos Serrão
ISBN13: 9781522588979|ISBN10: 1522588973|EISBN13: 9781522588986
DOI: 10.4018/978-1-5225-8897-9.ch019
Cite Chapter Cite Chapter

MLA

Moura, José, and Carlos Serrão. "Security and Privacy Issues of Big Data." Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2019, pp. 375-407. https://doi.org/10.4018/978-1-5225-8897-9.ch019

APA

Moura, J. & Serrão, C. (2019). Security and Privacy Issues of Big Data. In I. Management Association (Ed.), Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications (pp. 375-407). IGI Global. https://doi.org/10.4018/978-1-5225-8897-9.ch019

Chicago

Moura, José, and Carlos Serrão. "Security and Privacy Issues of Big Data." In Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 375-407. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-8897-9.ch019

Export Reference

Mendeley
Favorite

Abstract

This chapter revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy. It is a pertinent aspect to be addressed because users share more and more personal data and content through their devices and computers to social networks and public clouds. So, a secure framework to social networks is a very hot topic research. This last topic is addressed in one of the two sections of the current chapter with case studies. In addition, the traditional mechanisms to support security such as firewalls and demilitarized zones are not suitable to be applied in computing systems to support Big Data. SDN is an emergent management solution that could become a convenient mechanism to implement security in Big Data systems, as we show through a second case study at the end of the chapter. This also discusses current relevant work and identifies open issues.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.