skip to main content
10.1145/3378904.3378907acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbdetConference Proceedingsconference-collections
research-article

Security Challenges for Big Data and IoT

Published:09 April 2020Publication History

ABSTRACT

Recently, two terms, namely Big Data and Internet of Things (IoT) have gained popularity individually. However, their interconnections are not fully explored and understood. It is expected that the fusion of Big Data and IoT would create many complex systems for smart cities. While the data from IoT lies in Big Data, the scale of operations are completely different in terms of providing the required real-time analytics for such smart systems. Even though NoSQL databases and other next generation solutions could be deployed to achieve real-time responses, the major security challenges need to be understood as mission critical and sensitive data intertwines Big Data and IoT. In this paper, we identify the security challenges shared by the closely-knit Big Data and IoT in three main risk areas: i) NoSQL security vulnerabilities, ii) mobile IoT (M-IoT) security and privacy constraints and iii) encryption key security threats. We perform a comparative study of security vulnerabilities of NoSQL databases and identify the security and privacy constraints of M-IoT networks. Encryption key attacks for resource constrained IoT devices are also illustrated mathematically. Overall, this paper explores new research directions in these prime areas of security and privacy that would result in solution opportunities for a meaningful fusion of Big Data and IoT for a smart environment.

References

  1. Silva, C.R., and Rodrigues E.M.T. 2017. Privacy In Big Data: Overview And Research Agenda, Electronic Journal of Management & System, 12(4), 491--505.Google ScholarGoogle Scholar
  2. Cai, H., Xu, B., Jiang, L., and Vasilakos, A.V. 2016. IoT-Based Big Data Storage Systems in Cloud Computing: Perspectives and Challenges. IEEE Internet of Things Journal, 4, 75--87.Google ScholarGoogle Scholar
  3. Jung, J. J. 2017. Computational Collective Intelligence with Big Data: Challenges and Opportunities. Future Generation Computer Systems, 66, 87--88.Google ScholarGoogle Scholar
  4. Lv, Z., Song, H., Basanta-Val, P., Steed, A., and Jo, M. 2017. Next-Generation Big Data Analytics: State of the Art, Challenges, and Future Research Topics. IEEE Transactions on Industrial Informatics, 13, 1891--1899.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Sun, Y., Song, H., Jara, A.J. and Bie R. 2016. Internet of things and big data analytics for smart and connected communities. IEEE Access. 4, 766--773.Google ScholarGoogle Scholar
  6. Kumar, N. Vasilakos, A. V. and Rodrigues, J. J. 2017. A multi-tenant cloud-based DC nano grid for self-sustained smart buildings in smart cities, IEEE Communications Magazine, 55(3), 14--21.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Hung, M. 2017. IoT's Challenges and Opportunities in 2017: A Gartner Trend Insight Report, Gartner Report, USA.Google ScholarGoogle Scholar
  8. Deka G. C. 2019. Cloud Database Security Issues and Challenges. In I. Management Association (Ed.), Cloud Security: Concepts, Methodologies, Tools, and Applications (pp. 165--187). Hershey, PA: IGI Global.Google ScholarGoogle Scholar
  9. Marsh R, Belguith S. and Dargahi T. 2019. IoT Database Forensics: An Investigation on HarperDB Security. ICFNDS '19 Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, Paris, France.Google ScholarGoogle Scholar
  10. Ahmad K., Alam M. S. and Udzir N. 2019. Security of NoSQL Database Against Intruders. Recent Patents on Engineering. 13(1), 5--12.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Venkatraman S., Fahd S., Kaspi S., and Venkatraman R. 2016. SQL Versus NoSQL Movement with Big Data Analytics, International Journal of Information Technology and Computer Science, 8(12), 59--66.Google ScholarGoogle Scholar
  12. Dadapeer, N.M. Indravasan, & Adarsh G. 2016. A Survey on Security of NoSQL Databases, International Journal of Innovative Research in Computer and Communication Engineering, 4(4), 5249--5254.Google ScholarGoogle Scholar
  13. Okman L., Gal-Oz N., Gonen Y., Gudes E. & Abramov J. 2011. Security Issues in NoSQL. TrustCom IEEE Conference on International Conference on Trust, Security and Privacy in Computing and Communications, 7, 541--547.Google ScholarGoogle Scholar
  14. Ghazi Y, Masood R., Rauf A., Shibli A., and Hassan O. 2016. DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases. EURASIP Journal on Information Security, 2016, 1--17.Google ScholarGoogle Scholar
  15. NIST, 2018.Big Data Interoperability Framework: Volume 6, Reference Architecture, NIST, USA.Google ScholarGoogle Scholar
  16. Kang, Y., Park, I., Rhee, J., & Lee, Y. 2016. MongoDB-Based Repository Design for IoT-Generated RFID/Sensor Big Data. IEEE Sensors Journal, 16, 485--497.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Kibiwott, K.P., Zhao, Y., Kogo, J., and Zhang, F. 2019. Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing, Mathematical Biosciences & Engineering, 16(5), 3561--3594.Google ScholarGoogle Scholar
  18. Venkatraman, S. and Overmars, A. 2019. New Method of Prime Factorisation-Based Attacks on RSA Authentication in IoT. Cryptography 3(3), 20.Google ScholarGoogle Scholar
  19. Beach, C.; Krachunov, S.; Pope, J.; Fafoutis, X.; Piechocki, R.J.; Craddock, I.; Casson, A.J. An ultra low power personalizable wrist worn ECG monitor integrated with IoT infrastructure. IEEE Access 2018, 6, 44010--44021.Google ScholarGoogle Scholar
  20. Gomes, T.; Salgado, F.; Pinto, S.; Cabral, J.; Tavares, A. A 6LoWPAN accelerator for Internet of Things endpoint devices. IEEE Internet Things J. 2018, 5, 371--377.Google ScholarGoogle Scholar
  21. Li, S.; Da Xu, L.; Zhao, S. 5G internet of things: A survey. J. Ind. Inf. Integr. 2018, 10, 1--9.Google ScholarGoogle Scholar
  22. Ahmadi, H.; Arji, G.; Shahmoradi, L.; Safdari, R.; Nilashi, M.; Alizadeh, M. The application of internet of things in healthcare: A systematic literature review and classification. Univer. Access Inf. Soc. 2018, 1--33.Google ScholarGoogle Scholar
  23. Mishra, A.K.; Tripathy, A.K.; Puthal, D.; Yang, L.T. Analytical model for Sybil attack phases in internet of things. IEEE Internet Things J. 2019, 6, 379--387.Google ScholarGoogle Scholar
  24. Tang, W.; Zhang, K.; Zhang, D.; Ren, J.; Zhang, Y.; Shen, X.S. Fog-Enabled Smart Health: Toward Cooperative and Secure Healthcare Service Provision. IEEE Commun. Mag. 2019, 57, 42--48.Google ScholarGoogle Scholar
  25. Stergiou, C.; Psannis, K.E.; Kim, B.G.; Gupta, B. Secure integration of IoT and cloud computing. Future Gener. Comput. Syst. 2018, 78, 964--975.Google ScholarGoogle Scholar
  26. Mutlag, A.A.; Ghani, M.K.A.; Arunkumar, N.; Mohamed, M.A.; Mohd, O. Enabling technologies for fog computing in healthcare IoT systems. Future Gener. Comput. Syst. 2019, 90, 62--78.Google ScholarGoogle Scholar
  27. You, I.; Leu, F.Y. Comments on "SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks". IEEE Syst. J. 2018, 12, 1038--1041.Google ScholarGoogle Scholar

Index Terms

  1. Security Challenges for Big Data and IoT

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      BDET 2020: Proceedings of the 2020 2nd International Conference on Big Data Engineering and Technology
      January 2020
      126 pages
      ISBN:9781450376839
      DOI:10.1145/3378904

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 9 April 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader