ITC571 Assignment on Emerging Technology and Innovations
Added on - 09 Oct 2019
Showing pages 1 to 3 of 6 pages
Annotated BibliographyLength: 2000 words (10-12 pages)*** The higher penalty will be applied if similarity (plagiarism) percentagegoes beyond 25%.Full NameStudent IDSubjectITC571 – Emerging Technology and InnovationsAssignment NoAnnotated BibliographyDue Date26-April-2018Lecturer’s NameMalka N. HalgamugeA Review on Security and Privacy Challenges ofBig DataYour NameYour EmailSchool of Computing and Mathematics, Charles Sturt University, Melbourne, VictoriaAbstract -This section will be completed in the final report.Key Words— Natural hazards, large flood events, flood risk assessment metrics, flood hazardsI.INTRODUCTIONThe Introduction section should contain literature citations to discuss other similar proposals.* CSU expect 12-15 references for this section (in-text citation is compulsory).e.g.http://www.citethisforme.com/us/bibliography-basics/what-is-a-citation/in-texthttps://www.youtube.com/watch?v=R5igNRmKLugBelow is the rough guide to follow the structure of theBibliography(Introduction).Please also follow the Introduction section of the attached papers from HD students of this subject.Rough Guide to the Structure of theAnnotated Bibliography(Introduction),as follows:
Section 1: Significance of the researchThe selected topic is interesting and useful as it the field of big data is constantly growing and thereforethere is a need to understand the impact it is likely to have on the population.Section 2: How original is the approach?The current approach is focused on assessing twelve research papers and then building the aim for theresearch.Section 3-4: Literature review in the area what you are workingThe current section focuses on assessing various research works that are related to the topic underconsideration, that is, the security and privacy challenges of big data. Big Data is new on the technologicalhorizon and even then lots of studies various forms of studies have been conducted on this aspectconsidering its future potential. The first study selected for the assessment is from Kaisler et al . Thepaper has assessed the issues and challenges that are being faced by big data in the current scenario andissues it is expected to face in the future. The researchers have focused on assessing the storage aspect ofthe big data. There are various characteristics of big data that have been mentioned by the researchers thatpose challenge in managing the data and they are volume, velocity, variety, value, and complexity. Thestorage and management of data pose challenge to the organizations who are willing to utilize vast natureof the data. The research method adopted by the researchers were secondary in nature and the researchersmostly referred to the studies conducted by the other researchers in the same field.The second study considered is by Lu et al . The paper is concerned with assessing the efficiency andprivacy of the big data computation. The paper is very close to the current selected topic. The researchershave stated that the big data can be used for the data mining and making decisions that are beneficial to theintended goals of the user. While stating this aspect, the researchers have displayed concern regarding thesecurity and privacy challenges of the big data. They have stated that the authenticity of the data leads toconvincing results. However, if there is lack in the security and privacy of the data, then there is thelikelihood that the people would not be comfortable in releasing their personal data to the various entitiesfor any form of assessment or analysis. The methodology adopted by the researcher depended on thesecondary sources such as the industry defined data and the studies conducted by the previous researchers.The paper identified various big data privacy and security caveats.The third study considered is by Tene and Polonetsky  regarding the privacy and user control in relationto the big data and analysis. On theoretical point of view, this paper is closely related to the topic of currentpaper. The researchersstated that privacy concerns arise when data deluge takes place. The studymethodology adopted by the researchers were based on the various government policy documents and thestudies of the previous researchers. The researchers have concluded that there is a need to build appropriatebalance between the usage of the data and the privacy management of the users. The paper has suggestedthat the policymakers should focus on the key aspects of laws that protect the privacy of the individuals.The fourth study considered is by Rubinstein  that has conducted the secondary study on whether theemergence of big data will end the privacy of the users or it can be new beginning of something. The paperhas reached to the conclusion that building privacy laws is important in order to push the organizations thatrely on the big data analytics for their business to take care of the data retrieval and management. The paperalso put forth the argument that the current policies regarding the data privacy are not in the line thedevelopment in this field. Therefore, there is a need to revisit the policies built and makes changes in line tothe recent development.
The fifth study considered is by Cuzzocrea et al . The current paper has focused on general data storageand warehousing in relation to the big data. However, it has also focused on the data security aspects. Thepaper has not specifically focuses on the selected topic of privacy and security alone but has covered thisaspect too. The researchers have focused on OLAP data cubes and state that the data security is veryimportant as the data structure of OLAP are open by definition. This leads to the necessity of enforcing thesecurity and privacy aspect in OLAP data cubes whether it is in open information system or for the clouddata storage.The sixth study considered is by Hasan et al . The paper has focused on the privacy challenges that arerelated to user profiling in the big data aspects. User profiling is concerned with collection of informationof an individual for the purpose of profile development. The researchers state that the big data aspectsallow the organizations to build rich user profiles that are used successfully in the projects such asrecommender systems. It has been suggested that as the information that are used by the systems arepersonal in nature, it is important that the user data is secured. The paper has considered secondary sourcesfor the study and after several studies, the paper has suggested several aspects that can be implemented inorder to ensure that the data privacy and security is implemented. They are giving privacy guarantees,flexible policies, evaluation of trust and reputation, content anonymizing, requesting unlinking, andunlinking the origin of the information.The seventh study considered is by Patil and Seshadri  on big data privacy and security. The researchershave considered the healthcare sector as the ground of study. The researchers have stated that the big datain the healthcare is getting more important than before. With the emergence of various data collectionpoints, the reasons for data collections have increased substantially. The industry is depending on theprompt data and information delivery technology in order to ensure that the service delivery to the targetconsumer is increased. The researchers have considered secondary sources for to achieve their researchobjective. The researchers concluded in the end that the privacy and security of the patient information is ofparamount importance. The use of secure patient data in real-time has been recommended to ensure that theproactivity in healthcare and wellness is increased.The eighth study considered is by Lu et al  which assess the information security in relation to the bigdata. The paper has focused on reviewing the privacy issues that are related with the data mining. Theresearchers identified four types of users that result into data generation, namely, data provider, collector,miner, and maker. The researchers have discussed privacy concern for each of them. The paper has usedthe secondary sources for the data and information collection for the study. The paper finally concludes thatthe study from the perspective of the four user types. It states that the privacy for the data provider is non-revelation of the personal sensitive data. The data collectors’ concern is releasing the information in amanner that it does not hamper the privacy of the users. The data miner’s concern is to identify correct datato mine which can be achieved through the usage of secure computation protocols. The decision makersfocus on assessing the credibility of the data sourced.The ninth study considered is by Kshetri  which assesses the impact of the big data on the consumer’sprivacy, security and welfare. The paper has used the secondary sources to achieve the research goal. Theresearcher has stated that the different set of consumers expect different levels of privacy and securityconcerns. The paper has identified that the customers have different privacy choices where some can befound to overly concerned with the privacy issues and at the same time other set of customers can be foundwith limited concern of the privacy aspects. But as per the security aspects are concerned people have samelevel of concern.