Skip to main content
Erschienen in:
Buchtitelbild

2023 | OriginalPaper | Buchkapitel

Current Status of Challenges in Data Security: A Review

verfasst von : Neetika Prashar, Susheela Hooda, Raju Kumar

Erschienen in: Cybersecurity and Evolutionary Data Engineering

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Today, data and its security are utmost important for all organizations. The data security and privacy are the most common issues in all the sectors including personal as well as business. With the rise of digital services, data protection and security has become the most critical key areas to respect and safeguard privacy. Data that can be private or public but it needs a secure environment throughout. Organizations that provide digital services must have defined and key processes which include protection regarding the privacy of every individual. In this paper, various types of data security, the risks faced in data security, solutions granted for the problems using technologies, data masking and data mining techniques have been discussed. In addition, this paper also enlightens the recent challenges in data security which will be helpful for novice researchers.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Denning DE, Denning PJ (1979) Data security. ACM Comput Surv (CSUR) 11(3):227–249 Denning DE, Denning PJ (1979) Data security. ACM Comput Surv (CSUR) 11(3):227–249
2.
Zurück zum Zitat Deepika S, Pandiaraja P (2013) Ensuring CIA triad for user data using collaborative filtering mechanism. In: International conference on information communication and embedded systems (ICICES). IEEE Deepika S, Pandiaraja P (2013) Ensuring CIA triad for user data using collaborative filtering mechanism. In: International conference on information communication and embedded systems (ICICES). IEEE
3.
Zurück zum Zitat Johnson DB, Matyas SM, Le AV, Wilkins JD (1993) Design of the commercial data masking facility data privacy algorithm. In: Proceedings of the 1st ACM conference on Computer and communications security, pp 93–96 Johnson DB, Matyas SM, Le AV, Wilkins JD (1993) Design of the commercial data masking facility data privacy algorithm. In: Proceedings of the 1st ACM conference on Computer and communications security, pp 93–96
4.
Zurück zum Zitat Chen MS, Han J, Yu PS (1996) Data mining: an overview from a database perspective. IEEE Trans Knowl Data Eng 8(6):866–883 Chen MS, Han J, Yu PS (1996) Data mining: an overview from a database perspective. IEEE Trans Knowl Data Eng 8(6):866–883
5.
Zurück zum Zitat Zhang D (2018) Big data security and privacy protection. In: 8th international conference on management and computer science (ICMCS 2018), vol 77, pp 275–278. Atlantis Press Zhang D (2018) Big data security and privacy protection. In: 8th international conference on management and computer science (ICMCS 2018), vol 77, pp 275–278. Atlantis Press
6.
Zurück zum Zitat Denning DE, Denning PJ (1979) Data security. ACM Comput Surv (CSUR) 11(3):227–249 Denning DE, Denning PJ (1979) Data security. ACM Comput Surv (CSUR) 11(3):227–249
7.
Zurück zum Zitat Bhardwaj I, Kumar A, Bansal M (2017) A review on lightweight cryptography algorithms for data security and authentication in IoTs. In: 2017 4th international conference on signal processing, computing and control (ISPCC). IEEE, pp 504–509 Bhardwaj I, Kumar A, Bansal M (2017) A review on lightweight cryptography algorithms for data security and authentication in IoTs. In: 2017 4th international conference on signal processing, computing and control (ISPCC). IEEE, pp 504–509
8.
Zurück zum Zitat Yang SK, Shiue YM, Su ZY, Liu IH, Liu CG (2020) An authentication information exchange scheme. In: WSN for IoT applications, vol 8. IEEE Access, pp 9728–9738 Yang SK, Shiue YM, Su ZY, Liu IH, Liu CG (2020) An authentication information exchange scheme. In: WSN for IoT applications, vol 8. IEEE Access, pp 9728–9738
9.
Zurück zum Zitat Zhao Y, Lu N (2018) Research and implementation of data storage backup. In: 2018 IEEE international conference on energy Internet (ICEI), pp 181–184 Zhao Y, Lu N (2018) Research and implementation of data storage backup. In: 2018 IEEE international conference on energy Internet (ICEI), pp 181–184
10.
Zurück zum Zitat Zuo Y, Kang Z, Xu J, Chen Z (2021) BCAS: a blockchain-based cipher text-policy attribute-based encryption scheme for cloud data security sharing. Int J Distrib Sens Netw 17(3) Zuo Y, Kang Z, Xu J, Chen Z (2021) BCAS: a blockchain-based cipher text-policy attribute-based encryption scheme for cloud data security sharing. Int J Distrib Sens Netw 17(3)
11.
Zurück zum Zitat Yazdeen AA, Zeebaree SR, Sadeeq MM, Kak SF, Ahmed OM, Zebari RR (2021) FPGA implementations for data encryption and decryption via concurrent and parallel computation: a review. Qubahan Acad J 1(2):8–16CrossRef Yazdeen AA, Zeebaree SR, Sadeeq MM, Kak SF, Ahmed OM, Zebari RR (2021) FPGA implementations for data encryption and decryption via concurrent and parallel computation: a review. Qubahan Acad J 1(2):8–16CrossRef
12.
Zurück zum Zitat Zhang Y, Zheng D, Deng RH (2018) Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet Things J 5(3):2130–2145CrossRef Zhang Y, Zheng D, Deng RH (2018) Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet Things J 5(3):2130–2145CrossRef
13.
Zurück zum Zitat Zhang F, Kodituwakku HADE, Hines JW, Coble J (2019) Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data. IEEE Trans Industr Inf 15(7):4362–4369CrossRef Zhang F, Kodituwakku HADE, Hines JW, Coble J (2019) Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data. IEEE Trans Industr Inf 15(7):4362–4369CrossRef
14.
Zurück zum Zitat Salo F, Injadat M, Nassif AB, Shami A, Essex A (2018) Data mining techniques in intrusion detection systems: a systematic literature review. In: IEEE Access, vol 6, pp 56046–56058 Salo F, Injadat M, Nassif AB, Shami A, Essex A (2018) Data mining techniques in intrusion detection systems: a systematic literature review. In: IEEE Access, vol 6, pp 56046–56058
15.
Zurück zum Zitat Xu L, Jiang C, Wang J, Yuan J, Ren Y (2014) Information security in big data: privacy and data mining. In: IEEE Access, vol 2, pp 1149–1176 Xu L, Jiang C, Wang J, Yuan J, Ren Y (2014) Information security in big data: privacy and data mining. In: IEEE Access, vol 2, pp 1149–1176
16.
Zurück zum Zitat Siraj MM, Rahmat NA, Din MM (2019) A survey on privacy preserving data mining approaches and techniques. In: Proceedings of the 2019 8th international conference on software and computer applications, pp 65–69 Siraj MM, Rahmat NA, Din MM (2019) A survey on privacy preserving data mining approaches and techniques. In: Proceedings of the 2019 8th international conference on software and computer applications, pp 65–69
17.
Zurück zum Zitat Zhou H, Sun G, Fu S, Liu J, Zhou X, Zhou J (2019) A big data mining approach of PSO-based BP neural network for financial risk management with IoT. In: IEEE Access, vol 7, pp 154035–154043 Zhou H, Sun G, Fu S, Liu J, Zhou X, Zhou J (2019) A big data mining approach of PSO-based BP neural network for financial risk management with IoT. In: IEEE Access, vol 7, pp 154035–154043
18.
Zurück zum Zitat Salo F, Injadat M, Nassif AB, Shami A, Essex A (2018) Data mining techniques in intrusion detection systems: a systematic literature review. In: IEEE Access, vol 6, pp 56046–56058 Salo F, Injadat M, Nassif AB, Shami A, Essex A (2018) Data mining techniques in intrusion detection systems: a systematic literature review. In: IEEE Access, vol 6, pp 56046–56058
19.
Zurück zum Zitat Basin D (2021) The cyber security body of knowledge: formal methods for security, version Basin D (2021) The cyber security body of knowledge: formal methods for security, version
20.
Zurück zum Zitat Bao R, Chen Z, Obaidat MS (2018) Challenges and techniques in big data security and privacy: a review. Secur Privacy 1(4):e13 Bao R, Chen Z, Obaidat MS (2018) Challenges and techniques in big data security and privacy: a review. Secur Privacy 1(4):e13
21.
Zurück zum Zitat Kumar PR, Raj PH, Jelciana P (2018) Exploring data security issues and solutions in cloud computing. Procedia Comput Sci 125:691–697 Kumar PR, Raj PH, Jelciana P (2018) Exploring data security issues and solutions in cloud computing. Procedia Comput Sci 125:691–697
22.
Zurück zum Zitat Tarekegn GB, Munaye YY (2016) Big data: security issues, challenges and future scope. J Comput Eng Technol 7(4):12–24 Tarekegn GB, Munaye YY (2016) Big data: security issues, challenges and future scope. J Comput Eng Technol 7(4):12–24
23.
Zurück zum Zitat Denning DE, Denning PJ (1979) Data security. ACM Comput Surv (CSUR) 11(3):227–249 Denning DE, Denning PJ (1979) Data security. ACM Comput Surv (CSUR) 11(3):227–249
24.
Zurück zum Zitat Fang W, Wen XZ, Zheng Y, Zhou M (2017) A survey of big data security and privacy preserving. IETE Tech Rev 34(5):544–560CrossRef Fang W, Wen XZ, Zheng Y, Zhou M (2017) A survey of big data security and privacy preserving. IETE Tech Rev 34(5):544–560CrossRef
25.
Zurück zum Zitat Daeef A, Mohamed M, Basir N, Saudi MM (2017) Security awareness training: a review. In: Lecture notes in engineering and computer science Daeef A, Mohamed M, Basir N, Saudi MM (2017) Security awareness training: a review. In: Lecture notes in engineering and computer science
27.
Zurück zum Zitat Jaeger L (2018) Information security awareness: literature review and integrative framework Jaeger L (2018) Information security awareness: literature review and integrative framework
28.
Zurück zum Zitat Hwang I, Wakefield R, Kim S, Kim T (2021) Security awareness: the first step in information security compliance behavior. J Comput Inform Syst 61(4):345–356 Hwang I, Wakefield R, Kim S, Kim T (2021) Security awareness: the first step in information security compliance behavior. J Comput Inform Syst 61(4):345–356
29.
Zurück zum Zitat Cricchio L, Grazia M, Palladino BE, Eleftheriou A, Nocentini A, Menesini E. Parental mediation strategies and their role on youths’ online privacy disclosure and protection: a systematic review. Eur Psychol 27(2):116 Cricchio L, Grazia M, Palladino BE, Eleftheriou A, Nocentini A, Menesini E. Parental mediation strategies and their role on youths’ online privacy disclosure and protection: a systematic review. Eur Psychol 27(2):116
30.
Zurück zum Zitat Durnell E, Karynna OM, Howell RT, Zizi M (2020) Online privacy breaches, offline consequences: construction and validation of the concerns with the protection of informational privacy scale. Int J Hum–Comput Interact 36(19):1834–1848 Durnell E, Karynna OM, Howell RT, Zizi M (2020) Online privacy breaches, offline consequences: construction and validation of the concerns with the protection of informational privacy scale. Int J Hum–Comput Interact 36(19):1834–1848
31.
Zurück zum Zitat Naeem M, Jamal T, Jorge DM, Butt SA, Montesano N, Tariq MI, De-la-Hoz-Franco E, De-La-Hoz-Valdiris E (2022) Trends and future perspective challenges in big data. In: Advances in intelligent data analysis and applications. Springer, Singapore, pp 309–325 Naeem M, Jamal T, Jorge DM, Butt SA, Montesano N, Tariq MI, De-la-Hoz-Franco E, De-La-Hoz-Valdiris E (2022) Trends and future perspective challenges in big data. In: Advances in intelligent data analysis and applications. Springer, Singapore, pp 309–325
32.
Zurück zum Zitat Elshawi R, Sakr S, Talia D, Trunfio P (2018) Big data systems meet machine learning challenges: towards big data science as a service. Big Data Res 14:1–11 Elshawi R, Sakr S, Talia D, Trunfio P (2018) Big data systems meet machine learning challenges: towards big data science as a service. Big Data Res 14:1–11
33.
Zurück zum Zitat Dai H-N, Wang H, Xu G, Wan J, Imran M (2020) Big data analytics for manufacturing internet of things: opportunities, challenges and enabling technologies. Enterp Inform Syst 14(9–10):1279–1303 Dai H-N, Wang H, Xu G, Wan J, Imran M (2020) Big data analytics for manufacturing internet of things: opportunities, challenges and enabling technologies. Enterp Inform Syst 14(9–10):1279–1303
34.
Zurück zum Zitat Hooda S, Lamba V, Kaur A (2021) AI and soft computing techniques for securing cloud and edge computing: a systematic review. In: International conference on information systems and computer networks (ISCON), pp 1–5 Hooda S, Lamba V, Kaur A (2021) AI and soft computing techniques for securing cloud and edge computing: a systematic review. In: International conference on information systems and computer networks (ISCON), pp 1–5
35.
Zurück zum Zitat Datta P, Sharma B (2017) A survey on IoT architectures, protocols, security and smart city based applications. In: 8th international conference on computing, communications and networking technologies, ICCCNT Datta P, Sharma B (2017) A survey on IoT architectures, protocols, security and smart city based applications. In: 8th international conference on computing, communications and networking technologies, ICCCNT
36.
Zurück zum Zitat Sangeeta TU. Factors influencing adoption of online teaching by school teachers: a study during COVID‐19 pandemic. J Pub Aff 21(4):e2503 Sangeeta TU. Factors influencing adoption of online teaching by school teachers: a study during COVID‐19 pandemic. J Pub Aff 21(4):e2503
37.
Zurück zum Zitat Kaur P, Harnal S, Tiwari R, Upadhyay S, Bhatia S, Mashat A, Alabdali AM (2022) Recognition of leaf disease using hybrid convolutional neural network by applying feature reduction. Sensors (Basel) 22(2):575. https://doi.org/10.3390/s22020575. PMID: 35062534; PMCID: PMC8779777 Kaur P, Harnal S, Tiwari R, Upadhyay S, Bhatia S, Mashat A, Alabdali AM (2022) Recognition of leaf disease using hybrid convolutional neural network by applying feature reduction. Sensors (Basel) 22(2):575. https://​doi.​org/​10.​3390/​s22020575. PMID: 35062534; PMCID: PMC8779777
Metadaten
Titel
Current Status of Challenges in Data Security: A Review
verfasst von
Neetika Prashar
Susheela Hooda
Raju Kumar
Copyright-Jahr
2023
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-5080-5_1

Premium Partner