World Scientific
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×
Our website is made possible by displaying certain online content using javascript.
In order to view the full content, please disable your ad blocker or whitelist our website www.worldscientific.com.

System Upgrade on Feb 12th

During this period, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at [email protected] for any enquiries.

Analytical Techniques for Decision Making on Information Security for Big Data Breaches

    In the big data processes, management and analytics are primary areas where we can introduce the decision making on information security to mitigate the big data breaches. According to the growing number of online systems and big data handling, mitigating the big data breaches is the serious problem during the processing period which needs to be monitored using appropriate technique. The goal of this research is to prevent the big data breaches using correct decision making based on information security concepts such as access control with authentication which depend on the management policies. The analytical approach of information security solution can also be useful for securing the big data infrastructure and key management that improve the big data breaches. As an analytical method, information security which focuses on detecting and securing the big data breaches is considered with access control. Here, we have introduced the multi-priority model influenced with the network calculus and access control which monitors the breaches during the big data processing. In the results and analysis, we can provide a graph which shows the monitoring improvement for decision making during the mitigation of big data breaches.

    References

    • 1. U. Sivarajah, M. M. Kamal, Z. Irani and V. Weerakkody , Critical analysis of big data challenges and analytical methods, Journal of Business Research (2016). ISIGoogle Scholar
    • 2. Z. Yan, W. Ding, X. Yu, H. Zhu and R. H. Deng , Deduplication on encrypted big data in cloud, IEEE Transactions on Big Data 2 (2) (2016) 138–150. CrossrefGoogle Scholar
    • 3. A. Gandomi and M. Haider , Beyond the hype: Big data concepts, methods, and analytics, International Journal of Information Management 35 (2) (2015) 137–144. Crossref, ISIGoogle Scholar
    • 4. M. Marchetti, F. Pierazzi, A. Guido and M. Colajanni , May. Countering advanced persistent threats through security intelligence and big data analytics. In 2016 8th International Conference on Cyber Conflict (CyCon), 2016, pp. 243–261, NATO CCD COE. Google Scholar
    • 5. J. Huang, Y. Sun, Z. Xiong, Q. Duan, Y. Zhao, X. Cao and W. Wang , Modeling and analysis on access control for device-to-device communications in cellular network: A network-calculus-based approach, IEEE Transactions on Vehicular Technology 65 (3) (2016) 1615–1626. Crossref, ISIGoogle Scholar
    • 6. Verizon Communications Inc. (2013). 2013 Data Breach Investigations Report. Google Scholar
    • 7. http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2013_en_xg.pdf. Google Scholar
    • 8. Y. Yang and X. Zheng , Type based keyword search for securing big data, 2013 International Conference on Cloud Computing and Big Data, IEEE, pp. 354–359. Google Scholar
    • 9. X. Li, F. Zhang and Y. Wang , Research on big data architecture, key technologies, and its measures, 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing, pp. 1–4. Google Scholar
    • 10. J. Hwang and I. Syamsuddin , Information security policy decision making: An analytic hierarchy process approach, in Third Asia International Conference on Modelling and Simulation, 2009, AMS’09., pp. 158–163, IEEE, 2009. Google Scholar
    • 11. J.-J. Peng, J.-Q. Wang and X.-H. Wu , Novel multi-criteria decision-making approaches based on hesitant fuzzy sets and prospect theory, International Journal of Information Technology and Decision Making 15 (3) (2016) 621–643. Link, ISIGoogle Scholar
    • 12. T. Poleto, V. D. Heuer de Carvalho and A. P. C. S. Costa , The full knowledge of big data in the integration of inter-organizational information: An approach focused on decision making, International Journal of Decision Support System Technology 9 (1) (2017) 16–31. Crossref, ISIGoogle Scholar
    • 13. M. H. Manshaei, Q. Zhu, T. Alpcan, T. Bacşar and J. P. Hubaux , Game theory meets network security and privacy, ACM Computing Surveys (CSUR) 45 (3) (2013) 25. Crossref, ISIGoogle Scholar
    • 14. L. Xu, C. Jiang, J. Wang, Y. Ren, J. Yuan and M. Guizani , Game theoretic data privacy preservation: Equilibrium and pricing, in 2015 IEEE International Conference on Communications (ICC), pp. 7071–7076, IEEE. Google Scholar
    • 15. A. Acquisti, The economics of personal data and the economics of privacy (2010). Google Scholar
    • 16. L. Xu, C. Jiang, Y. Chen, Y. Ren and K. R. Liu , Privacy or utility in data collection? A contract theoretic approach, IEEE Journal of Selected Topics in Signal Processing 9 (7) (2015) 1256–1269. Crossref, ISIGoogle Scholar
    • 17. G. Kou, D. Ergu, C. Lin and Y. Chen , Pairwise comparison matrix in multiple criteria decision making, Technological and Economic Development of Economy 22 (5) (2016) 738–765. Crossref, ISIGoogle Scholar
    • 18. G. Kou, Y. Peng and G. Wang , Evaluation of clustering algorithms for financial risk analysis using MCDM methods, Information Sciences 275 (2014) 1–12. Crossref, ISIGoogle Scholar
    • 19. G. Kou, Y. Lu, Y. Peng and Y. Shi , Evaluation of classification algorithms using MCDM and rank correlation, International Journal of Information Technology and Decision Making 11 (1) (2012) 197–225. Link, ISIGoogle Scholar
    • 20. G. Kou and C. Lin , A cosine maximization method for the priority vector derivation in AHP, European Journal of Operational Research 235 (1) (2014) 225–232. Crossref, ISIGoogle Scholar
    • 21. G. Kou, D. Ergu and J. Shang , Enhancing data consistency in decision matrix: Adapting Hadamard model to mitigate judgment contradiction, European Journal of Operational Research 236 (1) (2014) 261–271. Crossref, ISIGoogle Scholar
    • 22. Y. Wang, L. Kung and T. A. Byrd , Big data analytics: Understanding its capabilities and potential benefits for healthcare organizations, Technological Forecasting and Social Change (2016), Elsevier. Google Scholar
    • 23. L. Xu, P. D. Khoa, S. H. Kim, W. W. Ro and W. Shi , Another look at secure big data processing: Formal framework and a potential approach, 2015 IEEE 8th International Conference on Cloud Computing, IEEE, 2015, pp. 548–555. Google Scholar
    • 24. B. Song, M. S. Hossain and A. Alamri , QoS-aware resource provisioning for big data processing in cloud computing environment, 2014 International Conference on Computational Science and Computational Intelligence (CSCI), Vol. 2, IEEE, pp. 107–112. Google Scholar
    • 25. C. Ji, Y. Li, W. Qiu, U. Awada and K. Li , Big data processing in cloud computing environment, 12th International Symposium on Pervasive Systems, Algorithms, and Networks, pp. 17–23, December, 2012. Google Scholar
    • 26. L. Xu, C. Jiang, J. Wang, J. Yuan and Y. Ren , Information security in big data: Privacy and data mining, IEEE Access 2 (2014) 1149–1176. Crossref, ISIGoogle Scholar
    • 27. S. Sharma, B. Bhushan and S. Sharma , Improvising information security in cloud computing environment, International Journal of Computer Applications 86 (16) (2014) 22–25. CrossrefGoogle Scholar
    • 28. J.-S. Wang, C.-H. Liu and G. T. R. Lin , How to manage information security in cloud computing, 2011 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 1405–1410, 2011. Google Scholar
    • 29. Kumar and H. Lee , Efficient and secure cloud storage for handling big data, in Proceedings of 6th International Conference on New Trends in Information Science and Service Science and Data Mining (ISSDM), October 23–25, 2012, pp. 162–166. Google Scholar
    • 30. X. Zhang, C. Liu, S. Nepal, C. Yang, W. Dou and J. Chen , SaC-FRAPP: A scalable and cost-effective framework for privacy preservation over big data on the cloud, Concurrency and Computation: Practice and Experience, 2013. https://doi.org/10.1002/cpe.3083. Crossref, ISIGoogle Scholar
    • 31. R. Zuech, T. M. Khoshgoftaar and R. Wald , Intrusion detection and big heterogeneous data: A survey, Journal of Big Data 2 (2015) 1–41. CrossrefGoogle Scholar
    • 32. A. Tankard , Big data security, Network Security 2012 (7) (2012) 5–8. CrossrefGoogle Scholar
    • 33. N. Gruschka and L. L. Iacono , Vulnerable cloud: Soap message security validation revisited, in IEEE International Conference on Web Services - ICWS 2009, IEEE, 2009, pp. 625–631. Google Scholar
    • 34. S.-H. Kim, N.-U. Kim and T.-M. Chung , Attribute relationship evaluation methodology for big data security, 2013 International Conference on IT Convergence and Security (ICITCS), IEEE, pp. 1–4. Google Scholar
    • 35. M. Schwartz , New virtualization vulnerability allows escape to hypervisor attacks, Information of Week Security Letter 4 (2012). Google Scholar
    • 36. M. Senthil Kumar, V. Ramasamy, S. Sheen, C. Veeramani, A. Bonato and L. Batten, Computational Intelligence, Cyber Security, and Computational Models (2016). Google Scholar
    • 37. J. Huang, M. Zeng, C. C. Xing, J. Luo and F. Hou , Modeling and analysis for admission control of M2M communications using network calculus, 2017 IEEE International Conference on Communications (ICC), 2017, May 21, pp. 1–6, IEEE. Google Scholar
    • 38. M. Fidler , Survey of deterministic and stochastic service curve models in the network calculus, IEEE Communications Surveys and Tutorials (2010). Crossref, ISIGoogle Scholar
    • 39. S. Bondorf and J. B. Schmitt , The DiscoDNC v2 — A comprehensive tool for deterministic network calculus (PDF), 8th International Conference on Performance Evaluation Methodologies and Tools (VALUETOOLS 2014). Google Scholar
    • 40. Y. Long, Z. Lu and H. Shen , Composable worst-case delay bound analysis using network calculus, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (2017). ISIGoogle Scholar
    • 41. S. Bondorf , May. Better bounds by worse assumptions — Improving network calculus accuracy by adding pessimism to the network model, 2017 IEEE International Conference on Communications (ICC), pp. 1–7, 2017, IEEE. Google Scholar
    • 42. H. Chen, R. H. L. Chiang and V. C. Storey , Business intelligence and analytics: From big data to a big impact. MIS Quarterly, 36 (4) (2012) 1165–1188. Crossref, ISIGoogle Scholar
    Published: 9 February 2018

    Remember to check out the Most Cited Articles in IJITDM !