You are on page 1of 3

Big Data and Security Challenges

Hasnain Khan

Many companies and governments are increasingly seeing the advantages of Big Data. In
reality, effective Big Data mining allows various sectors (economic, social, medical, scientific
research, and so on) to gain a competitive edge and create value. The 3Vs essential features of
Big Data are what characterize it the most. Velocity (data grows and changes quickly), Variety
(data comes in a variety of formats), and Volume (a large amount of data is created every
second) are the three Vs. To establish that a source is a Big Data source, all three qualities must
be present. We can't talk about Big Data if one of these three Vs doesn't apply.

Many aspects of Big Data security are similar to those of traditional information systems (where
data are structured). However, for quick data analysis, Big Data security need more powerful
tools, proper techniques, and modern technology. It also necessitates a new security management
paradigm that manages both internal (data generated by an organization's internal systems and
procedures) and external (data gathered from other organizations or external web sites) data in
simultaneously. Many concerns might be asked in response to these points:

(i) How to safely maintain and analyze massive, unstructured, and heterogeneous data
sets?
(ii) ii) How can security measures be integrated into distributed systems while
maintaining a high degree of performance (e.g., efficient storage, fast processing, and
real-time analysis)?
(iii) How can large data streams be analyzed without jeopardizing data security and
privacy?

Information security, security monitoring, and data security are the three primary
components of security in the context of Big Data. In general, Big Data security seeks to
provide real-time monitoring to discover vulnerabilities, security threats, and anomalous
behavior, granular role-based access control, secure data protection and the creation of
security performance indicators. In the event of a security emergency, it facilitates quick
decision-making.

One issue in the context of Big Data is managing vast and fast data volumes while
maintaining information security. As a result, security tools should be adaptable and scalable
in order to facilitate the incorporation of future technical advancements and the handling of
changing application needs. Multiple security needs, privacy duties, system performance, and
quick dynamic analysis on various huge data sets (data in motion or static, private and public,
local or shared, etc.) must all be balanced.

In the context of Big Data, traditional security approaches, such as various forms of data
encryption, slow down performance and take time. In addition, they are ineffective. For
security reasons, only tiny data partitions are handled. As a result, most security threats are
discovered after the harm has spread. Big Data systems need the coordination of numerous
applications and concurrent calculations. As a result, in such contexts, speed is a critical
factor for data exchange and real-time analysis.

Data analysis is a critical component in preventing and detecting security problems in the Big
Data age. Several polls, however, show that many businesses are unaware of the necessity of
hiring data scientists for sophisticated security analyses. In reality, companies should rely on
a multi-disciplinary team of data scientists, mathematicians, and security best practices
programmers to assure Big Data security.

Encryption of data and Big Data is a popular solution. Many studies have been carried out in
order to improve the performance and reliability of old approaches or to develop new Big
Data encryption methods. Homomorphic Cryptography, unlike certain standard encryption
methods, allows computation on encrypted data. As a result, this approach maintains data
secrecy while allowing relevant insight to be extracted through analysis and calculations on
the encrypted data.

Another suggestion is to save data on the cloud instead than on mobile devices. The objective
is to take advantage of the Cloud's centralized security measures and standardized and
standard compliance architecture. Indeed, Cloud systems are updated and checked on a
regular basis to ensure their security. However, achieving "zero risk" is difficult. Data
security, in reality, is in the hands of Cloud outsourcers and operators. Furthermore, being a
concentrated mine of valuable data, the Cloud is highly appealing to attackers. Owners and
administrators of data should be aware of security threats and establish explicit data access
procedures. When outsourcing Big Data management, storage, or processing, they must
guarantee that the appropriate security level is met. Furthermore, the conventional
governance notion of just security managers and chiefs being accountable must be changed.
To tackle the problems of protecting Big Data sources in remote contexts, it is more
convenient to implement a centralized security governance. Employees, managers, ISR,
operators, users, customers, partners, suppliers, outsources, and other stakeholders in the
organization's ecosystem should all be involved. The objective is to hold all parties
responsible for security management in order to improve the adoption of security best
practices and assure compliance with standards and laws. Threats, rules, and policies should
all be understood by users. Partners, for example, must adhere to data access and
confidentiality standards. Users must update their systems on a regular basis to ensure that
their mobile devices adhere to industry standards and suggested security practices and laws.
Users must also avoid installing untrustworthy components (e.g., counterfeit software,
software without a valid license). Programmers, architects, and designers of Big Data
applications, on the other hand, must incorporate security and privacy requirements
throughout the development life cycle. Outsourcers should be held accountable for Big Data
security by including specific security terms in their contracts.

References

1. Big Data Security: Challenges, Recommendations and Solutions, Fatima-Zahra


Benjelloun, Ayoub Ait Lahcen
2. Computer Network Security and Preventive Measures in the Age of Big Data, Min Xiao
and Mei Guo, 3rd International Conference on Mechatronics and Intelligent Robotics
(ICMIR-2019)

You might also like