Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

A Survey on Security Issues and the Existing Solutions in Big Data

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Pooja Chaudhary, Virendra Kumar Yadav

Pooja Chaudhary and Virendra Kumar Yadav. A Survey on Security Issues and the Existing Solutions in Big Data. International Journal of Computer Applications 162(1):33-37, March 2017. BibTeX

	author = {Pooja Chaudhary and Virendra Kumar Yadav},
	title = {A Survey on Security Issues and the Existing Solutions in Big Data},
	journal = {International Journal of Computer Applications},
	issue_date = {March 2017},
	volume = {162},
	number = {1},
	month = {Mar},
	year = {2017},
	issn = {0975-8887},
	pages = {33-37},
	numpages = {5},
	url = {},
	doi = {10.5120/ijca2017913405},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Big data refers different-different type of data, i.e., structured data means Relational Data, Semi-structured data means XML and unstructured data example :-Word, PDF, Text, Audio, Video etc. Here I have describe only one aspect of big data; other attributes are volume, velocity, value, and veracity. Security is technology issues, which seems to be resolvable in the near-term, but represent long term challenges that require research and new paradigms. This technology needs to be more improvement in terms of development because it suffers from different security problems. This paper will discuss about different security problems and define existing solution.


  1. Amine Rahmani1.2015.De-Identification of Textual Data using Immune System for Privacy Preserving in Big Data.
  2. Alvaro A. Cárdenas . 2013. Big Data Analytics for Security., University of Texas at Dallas, Pratyusa K. Manadhata | HP Labs, Sreeranga P. Rajan | Fujitsu Laboratories of America.
  3. Nandan Makarand Deval. 2011. Secure Steganography Algorithm Based on Cellular Automata using Fibonacci Representation and Reverse Circle Cipher Application for Steganography, International Journal of Computer Science and Information Technologies, Vol. 2 (4).
  4. David Naylor?, Kyle Schompy, Matteo Varvelloz, Ilias Leontiadisz, Jeremy Blackburnz,Diego Lopezz, Konstantina Papagiannakiz, Pablo Rodriguez Rodriguezz., Peter Steenkiste.2015. “Multi-Context TLS (mcTLS):Enabling Secure In-Network Functionality in TLS” Carnegie Mellon University Case Western Reserve University Telefónica Research(ACM).
  5. Stephen Kaisler i_SW Corporation. 2013. Big Data: Issues and Challenges Moving Forward. 46th Hawaii International Conference on System Sciences.
  6. John Gantz., David Reinsel.2012. THE DIGITAL UNIVERSE IN 2020: Big Data, Bigger Digital Shadow s, and Biggest Grow th in the Far East.
  7. B. Saraladevia., N. Pazhanirajaa., P. Victer Paula., M.S. Saleem Bashab., P. Dhavachelvanc.2015. Big Data and Hadoop-A Study in Security Perspective, 2nd International Symposium on Big Data and Cloud Computing (ISBCC’15)(Science Direct).
  8. Roger Schell. 2013. Security – A Big Question for Big Data, University of Southern California, USA, IEEE International Conference on Big Data.
  9. Elisa Bertino., Bharath K. Samanthula.2014. "Security with Privacy - A Research Agenda ", 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (Collaborate Com 2014).
  10. BOUHRIZ Mouniaa., CHAOUI Habibab.2015. Big Data Privacy in Healthcare, The 2nd International Workshop on Privacy and Security in HealthCare (PSCare15).
  11. Koushik Mondal. 2015. Big Data Parallelism: Issues in different X-Information Paradigms, 2nd International Symposium on Big Data and Cloud Computing (ISBCC’15).
  12. Utkarsh Srivastava., Santosh Gopalkrishnan. 2015. Impact of Big Data Analytics on Banking Sector: LearningforIndianBanks. 2nd International Symposium on Big Data and Cloud Computing (ISBCC’15).


Issue in Big data Security, Issue in Hadoop Security, TLS and Mc-TLS, Performance Evaluation