Research on Data Security and Privacy Protection in the Context of Big Data

Authors

  • Wenjun Wang

DOI:

https://doi.org/10.54097/astapa66

Keywords:

Big Data, Data Security, Privacy Protection, Data Breaches, Encryption Technologies

Abstract

The "Big Data" era brings massive data inflows from diverse sources, creating opportunities and privacy/security challenges. With rising public concern due to frequent data breaches, protecting privacy and data security has become crucial. This paper summarizes current academic research and developments in data protection technologies, including encryption, anonymization, and access control. It aims to provide insights into data security and privacy in big data, examining future technological prospects and challenges.

Downloads

Download data is not yet available.

References

Smith, R. E. (1971). Authentication and identification: computer access control. IEEE Transactions on Computers, 100(5), 438-440.

Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644-654.

Smith, L., & Jones, F. (1985). The Rise of Databases and the Challenges of Security in the 1980s. Database Security Journal, 3(2), 13-21.

Denning, D. E. (1982). Cryptography and Data Security. Addison-Wesley.

Miller, R. (1987). Protecting Personal Data: Theoretical Perspectives Concerning Privacy and Security. Journal of Privacy Studies, 2(1), 34-45.

Cohen, F. (1987). Computer Viruses: Theory and Experiments. Computers & Security, 6(1), 22-35.

Warren, S., & Brandeis, L. (1890). The Right to Privacy. Harvard Law Review, 4(5), 193-220.

Clarke, R. (1999). Internet privacy concerns confirm the case for intervention. Communications of the ACM, 42(2), 60-67.

EU Directive 95/46/EC. (1995). Directive on protecting individuals concerning the processing of personal data and the free movement of such data. Official Journal of the European Communities.

Lessig, L. (1999). Code and Other Laws of Cyberspace. Basic Books.

Schneier, B. (2003). Beyond Fear: Thinking Sensibly About Security in an Uncertain World. Springer-Verlag.

Regulation (EU) 2016/679. (2016). General Data Protection Regulation. Official Journal of the European Union.

Mosca, M. (2018). Quantum threat timeline. Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 1-6.

Business Tech Weekly. (n.d.). Big Data Privacy and Security Challenges: What need to know. Retrieved from https://www. businesstechweekly.com.

ScienceDirect. (n.d.). Data security governance in the era of big data: status, challenges. retrieved from https:// www. sciencedirect. Com.

Frontiers. (n.d.). Solutions to Big Data Privacy and Security Challenges. retrieved from https://www.frontiersin.org.

IEEE Xplore. (n.d.). Big Data and Cybersecurity: A Review of Key Privacy and Security Challenges. retrieved from https:// ieeexplore.ieee.org.

Security Magazine. (n.d.). Top 10 Big Data Security and Privacy Challenges Report Released. Retrieved from https:// www. securitymagazine.com.

Harvard University's Berkman Klein Center for Internet & Society. (n.d.). Practical approaches to big data privacy over time. https:// privacytools. seas.harvard. edu/ publications/ practical-approaches-big-data-privacy-over-time.

Journal of Big Data. (2021). Big data privacy: a technological perspective and review. https:// journalofbigdata. springeropen. com/ articles/10.1186/s40537-017-0084-6.

Bentotahewa, V., Hewage, C., & Williams, J. (2021). Solutions to Big Data Privacy and Security Challenges Associated With COVID-19 Surveillance Systems. Frontiers in big data, 4, 645204.

Mosca, M. (2018). Cybersecurity in an era with quantum computers: will we be ready? IEEE Security & Privacy, 16(5), 38-41.

Zhang, Y., Duan, Z., Yin, L., & Zhao, Y. (2021). Significant Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data. IEEE Access, 9, 121582-121601.

Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of Things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347-2376.

Greenleaf, G. (2017). Global data privacy laws 2017: 120 national data privacy laws, including Indonesia and Turkey. Privacy Laws & Business International Report, 145. 14-18.

Downloads

Published

03-02-2024

Issue

Section

Articles

How to Cite

Wang, W. (2024). Research on Data Security and Privacy Protection in the Context of Big Data. Frontiers in Computing and Intelligent Systems, 7(1), 29-33. https://doi.org/10.54097/astapa66