5G for Future Wireless Networks. First International Conference, 5GWN 2017, Beijing, China, April 21-23, 2017, Proceedings

Research Article

A Survey on Security Issues in Big Data of Ubiquitous Network

Download
202 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-72823-0_10,
        author={Yuehua Huo and Yanyu Sun and Weiqiang Fan and Xinzhou Cheng and Dong Li and Yinlong Liu},
        title={A Survey on Security Issues in Big Data of Ubiquitous Network},
        proceedings={5G for Future Wireless Networks. First International Conference, 5GWN 2017, Beijing, China, April 21-23, 2017, Proceedings},
        proceedings_a={5GWN},
        year={2018},
        month={1},
        keywords={Ubiquitous network Big data Information security Intelligent},
        doi={10.1007/978-3-319-72823-0_10}
    }
    
  • Yuehua Huo
    Yanyu Sun
    Weiqiang Fan
    Xinzhou Cheng
    Dong Li
    Yinlong Liu
    Year: 2018
    A Survey on Security Issues in Big Data of Ubiquitous Network
    5GWN
    Springer
    DOI: 10.1007/978-3-319-72823-0_10
Yuehua Huo1, Yanyu Sun1, Weiqiang Fan1, Xinzhou Cheng2, Dong Li1, Yinlong Liu3,*
  • 1: China University of Mining and Technology
  • 2: China Unicom Network Technology Research Institute
  • 3: Chinese Academy of Sciences
*Contact email: huoyh@cumtb.edu.cn

Abstract

In the ubiquitous network, these many devices generate a huge amount of data. The sharp increase of the diverse devices has led to the various heterogeneous data types and the booming growth of the data, that is, the ubiquitous network will bring big data. Due to the heterogeneity and ubiquitous nature of ubiquitous networks, the big data of ubiquitous network faces a broad and growing range of security threats and challenges. Based on the basic knowledge of the big data of ubiquitous network, this paper analyzes the security threats in the process of data collection, storage, processing and application. System elaborated the big data of ubiquitous network encryption and integrity protection, access control, privacy protection, attack detection, security technology research status. The research direction and future development direction are also discussed in this paper.