Development Of Data Security Algorithms: A Literature Review On Information Security In The Context Of Big Data

Authors

  • Nathanael David Christian Barus China Three Gorges University
  • Natasha Fedora Barus Telkom University

DOI:

https://doi.org/10.59841/ignite.v2i1.933

Keywords:

Big Data, Security, Algorithm, Literatur Review

Abstract

In the era of Big Data, securing sensitive information and ensuring data integrity have become paramount concerns due to the unprecedented volume and intricacy of data. Traditional security algorithms face significant challenges in adapting to the distinct characteristics of Big Data. This literature review explores the evolution of data security algorithms tailored explicitly for the Big Data landscape, aiming to address the increasing demand for robust security solutions capable of handling the unique challenges posed by the massive scale and complexity of data. By scrutinizing existing literature, the review unveils advancements, trends, and innovations developed by researchers and practitioners to mitigate vulnerabilities associated with handling vast datasets. The review also sheds light on emerging technologies and cryptographic techniques specifically designed for Big Data security, contributing to enhanced confidentiality, integrity, and availability in the face of evolving cyber threats. While these developments offer advantages such as improved data protection and threat detection, the review highlights challenges, including algorithmic bias, computational complexity, privacy trade-offs, and a shortage of skilled workforce. By considering these factors and emphasizing continuous improvement and ethical considerations, organizations can responsibly leverage data security algorithms to enhance information security in the era of Big Data.

References

Chandra, S., Ray, S., & Goswami, R. T. (2017). Big Data Security: Survey on Frameworks and Algorithms. 2017 IEEE 7th International Advance Computing Conference (IACC), 48–54. https://doi.org/10.1109/IACC.2017.0025

Cremer, F., Sheehan, B., Fortmann, M., Kia, A. N., Mullins, M., Murphy, F., & Materne, S. (2022). Cyber risk and cybersecurity: a systematic review of data availability. The Geneva Papers on Risk and Insurance - Issues and Practice, 47(3), 698–736. https://doi.org/10.1057/s41288-022-00266-6

Dal Pozzolo, A., Caelen, O., Le Borgne, Y.-A., Waterschoot, S., & Bontempi, G. (2014). Learned lessons in credit card fraud detection from a practitioner perspective. Expert Systems with Applications, 41(10), 4915–4928. https://doi.org/10.1016/j.eswa.2014.02.026

Georgiadis, G., & Poels, G. (2022). Towards a privacy impact assessment methodology to support the requirements of the general data protection regulation in a big data analytics context: A systematic literature review. Computer Law & Security Review, 44, 105640. https://doi.org/10.1016/j.clsr.2021.105640

Gheyas, I. A., & Abdallah, A. E. (2016). Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis. Big Data Analytics, 1(1), 6. https://doi.org/10.1186/s41044-016-0006-0

Ismagilova, E., Hughes, L., Rana, N. P., & Dwivedi, Y. K. (2022). Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework. Information Systems Frontiers, 24(2), 393–414. https://doi.org/10.1007/s10796-020-10044-1

Lei Xu, Chunxiao Jiang, Jian Wang, Jian Yuan, & Yong Ren. (2014). Information Security in Big Data: Privacy and Data Mining. IEEE Access, 2, 1149–1176. https://doi.org/10.1109/ACCESS.2014.2362522

Li, X., Niu, J., Kumari, S., Wu, F., Sangaiah, A. K., & Choo, K.-K. R. (2018). A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. Journal of Network and Computer Applications, 103, 194–204. https://doi.org/10.1016/j.jnca.2017.07.001

Moghadam, R. S., & Colomo-Palacios, R. (2018). Information security governance in big data environments: A systematic mapping. Procedia Computer Science, 138, 401–408. https://doi.org/10.1016/j.procs.2018.10.057

Mvula, P. K., Branco, P., Jourdan, G.-V., & Viktor, H. L. (2023). A systematic literature review of cyber-security data repositories and performance assessment metrics for semi-supervised learning. Discover Data, 1(1), 4. https://doi.org/10.1007/s44248-023-00003-x

Rawat, D. B., Doku, R., & Garuba, M. (2021). Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security. IEEE Transactions on Services Computing, 14(6), 2055–2072. https://doi.org/10.1109/TSC.2019.2907247

Sharafaldin, I., Habibi Lashkari, A., & Ghorbani, A. A. (2018). Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. Proceedings of the 4th International Conference on Information Systems Security and Privacy, 108–116. https://doi.org/10.5220/0006639801080116

Shaukat, K., Luo, S., Varadharajan, V., Hameed, I. A., & Xu, M. (2020). A Survey on Machine Learning Techniques for Cyber Security in the Last Decade. IEEE Access, 8, 222310–222354. https://doi.org/10.1109/ACCESS.2020.3041951

Singh, M., Halgamuge, M. N., Ekici, G., & Jayasekara, C. S. (2018). A Review on Security and Privacy Challenges of Big Data (pp. 175–200). https://doi.org/10.1007/978-3-319-70688-7_8

Sumithra, R., & Parameswari, R. (2022). Data privacy and data protection security algorithms for big data in cloud. International Journal of Health Sciences, 7613–7621. https://doi.org/10.53730/ijhs.v6nS2.6834

Downloads

Published

2024-02-05

How to Cite

Nathanael David Christian Barus, & Natasha Fedora Barus. (2024). Development Of Data Security Algorithms: A Literature Review On Information Security In The Context Of Big Data. Journal Islamic Global Network for Information Technology and Entrepreneurship, 2(1), 49–60. https://doi.org/10.59841/ignite.v2i1.933

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.