ABSTRACT
Recently, two terms, namely Big Data and Internet of Things (IoT) have gained popularity individually. However, their interconnections are not fully explored and understood. It is expected that the fusion of Big Data and IoT would create many complex systems for smart cities. While the data from IoT lies in Big Data, the scale of operations are completely different in terms of providing the required real-time analytics for such smart systems. Even though NoSQL databases and other next generation solutions could be deployed to achieve real-time responses, the major security challenges need to be understood as mission critical and sensitive data intertwines Big Data and IoT. In this paper, we identify the security challenges shared by the closely-knit Big Data and IoT in three main risk areas: i) NoSQL security vulnerabilities, ii) mobile IoT (M-IoT) security and privacy constraints and iii) encryption key security threats. We perform a comparative study of security vulnerabilities of NoSQL databases and identify the security and privacy constraints of M-IoT networks. Encryption key attacks for resource constrained IoT devices are also illustrated mathematically. Overall, this paper explores new research directions in these prime areas of security and privacy that would result in solution opportunities for a meaningful fusion of Big Data and IoT for a smart environment.
- Silva, C.R., and Rodrigues E.M.T. 2017. Privacy In Big Data: Overview And Research Agenda, Electronic Journal of Management & System, 12(4), 491--505.Google Scholar
- Cai, H., Xu, B., Jiang, L., and Vasilakos, A.V. 2016. IoT-Based Big Data Storage Systems in Cloud Computing: Perspectives and Challenges. IEEE Internet of Things Journal, 4, 75--87.Google Scholar
- Jung, J. J. 2017. Computational Collective Intelligence with Big Data: Challenges and Opportunities. Future Generation Computer Systems, 66, 87--88.Google Scholar
- Lv, Z., Song, H., Basanta-Val, P., Steed, A., and Jo, M. 2017. Next-Generation Big Data Analytics: State of the Art, Challenges, and Future Research Topics. IEEE Transactions on Industrial Informatics, 13, 1891--1899.Google ScholarDigital Library
- Sun, Y., Song, H., Jara, A.J. and Bie R. 2016. Internet of things and big data analytics for smart and connected communities. IEEE Access. 4, 766--773.Google Scholar
- Kumar, N. Vasilakos, A. V. and Rodrigues, J. J. 2017. A multi-tenant cloud-based DC nano grid for self-sustained smart buildings in smart cities, IEEE Communications Magazine, 55(3), 14--21.Google ScholarDigital Library
- Hung, M. 2017. IoT's Challenges and Opportunities in 2017: A Gartner Trend Insight Report, Gartner Report, USA.Google Scholar
- Deka G. C. 2019. Cloud Database Security Issues and Challenges. In I. Management Association (Ed.), Cloud Security: Concepts, Methodologies, Tools, and Applications (pp. 165--187). Hershey, PA: IGI Global.Google Scholar
- Marsh R, Belguith S. and Dargahi T. 2019. IoT Database Forensics: An Investigation on HarperDB Security. ICFNDS '19 Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, Paris, France.Google Scholar
- Ahmad K., Alam M. S. and Udzir N. 2019. Security of NoSQL Database Against Intruders. Recent Patents on Engineering. 13(1), 5--12.Google ScholarDigital Library
- Venkatraman S., Fahd S., Kaspi S., and Venkatraman R. 2016. SQL Versus NoSQL Movement with Big Data Analytics, International Journal of Information Technology and Computer Science, 8(12), 59--66.Google Scholar
- Dadapeer, N.M. Indravasan, & Adarsh G. 2016. A Survey on Security of NoSQL Databases, International Journal of Innovative Research in Computer and Communication Engineering, 4(4), 5249--5254.Google Scholar
- Okman L., Gal-Oz N., Gonen Y., Gudes E. & Abramov J. 2011. Security Issues in NoSQL. TrustCom IEEE Conference on International Conference on Trust, Security and Privacy in Computing and Communications, 7, 541--547.Google Scholar
- Ghazi Y, Masood R., Rauf A., Shibli A., and Hassan O. 2016. DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases. EURASIP Journal on Information Security, 2016, 1--17.Google Scholar
- NIST, 2018.Big Data Interoperability Framework: Volume 6, Reference Architecture, NIST, USA.Google Scholar
- Kang, Y., Park, I., Rhee, J., & Lee, Y. 2016. MongoDB-Based Repository Design for IoT-Generated RFID/Sensor Big Data. IEEE Sensors Journal, 16, 485--497.Google ScholarDigital Library
- Kibiwott, K.P., Zhao, Y., Kogo, J., and Zhang, F. 2019. Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing, Mathematical Biosciences & Engineering, 16(5), 3561--3594.Google Scholar
- Venkatraman, S. and Overmars, A. 2019. New Method of Prime Factorisation-Based Attacks on RSA Authentication in IoT. Cryptography 3(3), 20.Google Scholar
- Beach, C.; Krachunov, S.; Pope, J.; Fafoutis, X.; Piechocki, R.J.; Craddock, I.; Casson, A.J. An ultra low power personalizable wrist worn ECG monitor integrated with IoT infrastructure. IEEE Access 2018, 6, 44010--44021.Google Scholar
- Gomes, T.; Salgado, F.; Pinto, S.; Cabral, J.; Tavares, A. A 6LoWPAN accelerator for Internet of Things endpoint devices. IEEE Internet Things J. 2018, 5, 371--377.Google Scholar
- Li, S.; Da Xu, L.; Zhao, S. 5G internet of things: A survey. J. Ind. Inf. Integr. 2018, 10, 1--9.Google Scholar
- Ahmadi, H.; Arji, G.; Shahmoradi, L.; Safdari, R.; Nilashi, M.; Alizadeh, M. The application of internet of things in healthcare: A systematic literature review and classification. Univer. Access Inf. Soc. 2018, 1--33.Google Scholar
- Mishra, A.K.; Tripathy, A.K.; Puthal, D.; Yang, L.T. Analytical model for Sybil attack phases in internet of things. IEEE Internet Things J. 2019, 6, 379--387.Google Scholar
- Tang, W.; Zhang, K.; Zhang, D.; Ren, J.; Zhang, Y.; Shen, X.S. Fog-Enabled Smart Health: Toward Cooperative and Secure Healthcare Service Provision. IEEE Commun. Mag. 2019, 57, 42--48.Google Scholar
- Stergiou, C.; Psannis, K.E.; Kim, B.G.; Gupta, B. Secure integration of IoT and cloud computing. Future Gener. Comput. Syst. 2018, 78, 964--975.Google Scholar
- Mutlag, A.A.; Ghani, M.K.A.; Arunkumar, N.; Mohamed, M.A.; Mohd, O. Enabling technologies for fog computing in healthcare IoT systems. Future Gener. Comput. Syst. 2019, 90, 62--78.Google Scholar
- You, I.; Leu, F.Y. Comments on "SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks". IEEE Syst. J. 2018, 12, 1038--1041.Google Scholar
Index Terms
- Security Challenges for Big Data and IoT
Recommendations
Emerging Security Threats and Countermeasures in IoT
ASIA CCS '15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications SecurityIoT (Internet of Things) diversifies the future Internet, and has drawn much attention. As more and more gadgets (i.e. Things) connected to the Internet, the huge amount of data exchanged has reached an unprecedented level. As sensitive and private ...
Internet of Things security
The Internet of things (IoT) has recently become an important research topic because it integrates various sensors and objects to communicate directly with one another without human intervention. The requirements for the large-scale deployment of the ...
Comments