Big Data Security: Requirements, Challenges and Preservation of Private Data inside Mobile Operators

被引:0
|
作者
Dincer, Cem [1 ]
Zeydan, Engin [2 ]
机构
[1] Turk Telekom, Secur Planning & Applicat Dept, Istanbul, Turkey
[2] Turk Telekom Labs, Istanbul, Turkey
关键词
big data security; cellular networks; mobile operators; private data;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Today's mobile operators (MOs) are experiencing tremendous amount of data usage of their subscribers. This results in data tsunami arriving from various sources inside MOs' network infrastructures. On the other hand, handling this data increase in an elegant manner will be utmost importance for designing the next generation cellular SG network infrastructure. In this evolving SG architecture, there will also be many vertical market players from different domains (e.g. car manufacturers, retailers, banks, transportation providers) as well as third party players (e.g. application developers) that will be interacting with MO's subscribers private data through many innovative big data applications. These big data applications can provide additional value added services to MOs. On the other hand, ensuring the security of these applications utilizing big data will be another dimension that needs to be provisioned carefully. In this paper, we study the various security requirements and challenges of running big data application services by MOs themselves. Based on the system architecture that is studied, we have also run extensive vulnerability tests against one example of big data application deployed inside MO's premises. Our results indicate key security findings and map some of the missing requirements into the considered big data application scenario.
引用
收藏
页码:273 / 278
页数:6
相关论文
共 50 条
  • [31] Challenges and Solutions of Information Security Issues in the Age of Big Data
    Yang Mengke
    Zhou Xiaoguang
    Zeng Jianqiu
    Xu Jianjian
    [J]. CHINA COMMUNICATIONS, 2016, 13 (03) : 193 - 202
  • [32] A Framework for Analysis of Incompleteness and Security Challenges in IoT Big Data
    Kumari, Kimmi
    Mrunalini, M.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (02)
  • [33] Challenges and Solutions of Information Security Issues in the Age of Big Data
    YANG Mengke
    ZHOU Xiaoguang
    ZENG Jianqiu
    XU Jianjian
    [J]. China Communications, 2016, 13 (03) : 193 - 202
  • [34] Opportunities and Challenges of Information Security Faced by the Era of Big Data
    Li, Xin-Peng
    Liu, Yu-Chen
    Wu, Guo-Hua
    Qi, Kai-Kai
    Xu, Da-Wei
    [J]. Proceedings of the 2016 International Conference on Engineering and Advanced Technology, 2016, 82 : 106 - 109
  • [35] Research of Big data and data security
    Ren, Qiong
    Xu, Zhongyuan
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 871 - 875
  • [36] Security in big data
    Liang, Qilian
    Ren, Jian
    Liang, Jing
    Zhang, Baoju
    Pi, Yiming
    Zhao, Chenglin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (14) : 2383 - 2385
  • [37] Mobile Big Data
    Guo, Jun
    Dohler, Mischa
    Kim, Whoi-Yul
    Tsoi, Ah-Chung
    Zheng, Kan
    [J]. IEEE NETWORK, 2016, 30 (03): : 4 - 5
  • [38] Challenges of Big Data and Vehicle Data
    Prehofer, Christian
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING AND SELF-ORGANIZING SYSTEMS COMPANION (ACSOS-C 2021), 2021, : 287 - 288
  • [39] The challenges of big data
    Mardis, Elaine R.
    [J]. DISEASE MODELS & MECHANISMS, 2016, 9 (05) : 483 - 485
  • [40] The challenges of big data
    Taylor P.
    [J]. ITNOW, 2020, 62 (03) : 56 - 57