Verification and validation techniques for streaming big data analytics in internet of things environment

With an exponential growth of raw data generated from different sensors, actuators, and mobile devices, data analytics is becoming a challenging issue keeping in view of the heterogeneity of the data generated. The traditional database systems are not able to handle this huge amount of data. Current research and development are mainly focused on the analytics of this big data generated from different devices and overlook the difficulty of its secure streaming. In this study, the authors analyse and provide an overview on how to handle secure streaming data generated from different devices. It includes the major threats and risks, introduced during big data processing in Internet of things environment. Moreover, they analyse the existing security approaches and highlight emerging challenges required to process the heterogeneous big data in a secure manner for IoT applications, such as denial of service, malware, and phishing. The architectural details and security approaches required in each phase of big data processing life-cycle are explored in detail. Finally, various research challenges along with a case study are discussed and analysed.

[1]  Peng Jiang,et al.  A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..

[2]  Kim-Kwang Raymond Choo,et al.  Multimedia big data computing and Internet of Things applications: A taxonomy and process model , 2018, J. Netw. Comput. Appl..

[3]  Neeraj Kumar,et al.  Fog computing for Healthcare 4.0 environment: Opportunities and challenges , 2018, Comput. Electr. Eng..

[4]  Mouzhi Ge,et al.  Big Data for Internet of Things: A Survey , 2018, Future Gener. Comput. Syst..

[5]  Mohammad S. Obaidat,et al.  A systematic review on security issues in vehicular ad hoc network , 2018, Secur. Priv..

[6]  Mohammad S. Obaidat,et al.  Ensuring Privacy and Security in E- Health Records , 2018, 2018 International Conference on Computer, Information and Telecommunication Systems (CITS).

[7]  Mohammad S. Obaidat,et al.  Blind Signatures Based Secured E-Healthcare System , 2018, 2018 International Conference on Computer, Information and Telecommunication Systems (CITS).

[8]  George Ghinea,et al.  An Effective Classification Approach for Big Data Security Based on GMPLS/MPLS Networks , 2018, Secur. Commun. Networks.

[9]  Weigang Li,et al.  Protecting Your Own Private Key in Cloud: Security, Scalability and Performance , 2018, 2018 IEEE Conference on Communications and Network Security (CNS).

[10]  Mahalakshmi Jeyabalu,et al.  A Brief Review on Cloud Security Scenarios , 2018 .

[11]  Mohsen Guizani,et al.  Deep Learning for IoT Big Data and Streaming Analytics: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[12]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[13]  Narina Thakur,et al.  Seguro Digital storage of documents using Blockchain , 2018 .

[14]  Mamta Mittal,et al.  Big Data and Machine Learning Based Secure Healthcare Framework , 2018 .

[15]  Anandakumar Haldorai,et al.  The Impact of Big Data Analytics and Challenges to Cyber Security , 2018 .

[16]  A. B. Hssane,et al.  Big healthcare data: preserving security and privacy , 2018, Journal of Big Data.

[17]  Joel J. P. C. Rodrigues,et al.  Home-based exercise system for patients using IoT enabled smart speaker , 2017, 2017 IEEE 19th International Conference on e-Health Networking, Applications and Services (Healthcom).

[18]  Joel J. P. C. Rodrigues,et al.  FAAL: Fog computing-based patient monitoring system for ambient assisted living , 2017, 2017 IEEE 19th International Conference on e-Health Networking, Applications and Services (Healthcom).

[19]  Mohsen Guizani,et al.  Systematization of Knowledge (SoK): A Systematic Review of Software-Based Web Phishing Detection , 2017, IEEE Communications Surveys & Tutorials.

[20]  Shadi Aljawarneh,et al.  Cloud security engineering: Early stages of SDLC , 2017, Future Gener. Comput. Syst..

[21]  Sakir Sezer,et al.  Dynamic Analysis of Malware using Run Time Opcodes , 2017 .

[22]  Mohammad S. Obaidat,et al.  An advanced Internet of Thing based Security Alert System for Smart Home , 2017, 2017 International Conference on Computer, Information and Telecommunication Systems (CITS).

[23]  Georgios Kambourakis,et al.  DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.

[24]  Shiuh-Pyng Shieh,et al.  Web Application Security: Threats, Countermeasures, and Pitfalls , 2017, Computer.

[25]  Nikunj Joshi,et al.  Big data security and privacy issues — A survey , 2017, 2017 Innovations in Power and Advanced Computing Technologies (i-PACT).

[26]  Elisa Bertino,et al.  Botnets and Internet of Things Security , 2017, Computer.

[27]  R. Udayakumar,et al.  Cloud Security and Compliance - A Semantic Approach in End to End Security , 2017 .

[28]  Soumya Ray,et al.  Big Data Security: Survey on Frameworks and Algorithms , 2017, 2017 IEEE 7th International Advance Computing Conference (IACC).

[29]  Iván Palomares Carrascosa,et al.  Data Analytics and Decision Support for Cybersecurity , 2017, Data Analytics.

[30]  Abderrazak Jemai,et al.  A survey on security of IoT in the context of eHealth and clouds , 2016, 2016 11th International Design & Test Symposium (IDT).

[31]  Ong Bi Lynn,et al.  Internet of Things (IoT): Taxonomy of security attacks , 2016, 2016 3rd International Conference on Electronic Design (ICED).

[32]  Remi Badonnel,et al.  A Taxonomy of Attacks in RPL-based Internet of Things , 2016, Int. J. Netw. Secur..

[33]  Mohamed Cheriet,et al.  Taxonomy of information security risk assessment (ISRA) , 2016, Comput. Secur..

[34]  Ragib Hasan,et al.  Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.

[35]  Shahriar Mirabbasi,et al.  Wireless Energy Harvesting for Internet of Things , 2014 .

[36]  Eric Gossett,et al.  Big Data: A Revolution That Will Transform How We Live, Work, and Think , 2015 .

[37]  Cheryl Ann Alexander,et al.  Big Data in Medical Applications and Health Care , 2015 .

[38]  Guillermo Lafuente,et al.  The big data security challenge , 2015, Netw. Secur..

[39]  N. B. Anuar,et al.  The rise of "big data" on cloud computing: Review and open research issues , 2015, Inf. Syst..

[40]  Debashis De,et al.  Analysis of Security Threats in Wireless Sensor Network , 2014, ArXiv.

[41]  Li Shuai,et al.  Big Data security and privacy: A review , 2014, China Communications.

[42]  Ernesto Damiani,et al.  Business intelligence meets big data : an overview on security and privacy , 2014 .

[43]  Tariq Mahmood,et al.  Security Analytics: Big Data Analytics for cybersecurity: A review of trends, techniques and tools , 2013, 2013 2nd National Conference on Information Assurance (NCIA).

[44]  Richard Cumbley,et al.  Is "Big Data" creepy? , 2013, Comput. Law Secur. Rev..

[45]  Paul P. Tallon Corporate Governance of Big Data: Perspectives on Value, Risk, and Cost , 2013, Computer.

[46]  Piyush Malik,et al.  Governing Big Data: Principles and practices , 2013, IBM J. Res. Dev..

[47]  Saima Maqbool,et al.  Categorized Security Threats in the Wireless Sensor Networks: Countermeasures and Security Management Schemes , 2013 .

[48]  David Loshin,et al.  Data Governance for Big Data Analytics , 2013 .

[49]  A. White VULNERABILITY MANAGEMENT , 2013 .

[50]  Ronald S. Ross,et al.  Guide for Conducting Risk Assessments , 2012 .

[51]  Katina Michael,et al.  Security Risk Management: Building an Information Security Risk Management Program from the Ground Up , 2012, Comput. Secur..

[52]  Michel Dagenais,et al.  Intrusion Response Systems: Survey and Taxonomy , 2012 .

[53]  John Gantz,et al.  The Digital Universe in 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East , 2012 .

[54]  Zakaria I. Saleh,et al.  Proposed Framework for Security Risk Assessment , 2011, J. Information Security.

[55]  브라이언티. 스타벅크,et al.  Advanced spam detection techniques , 2004 .