http://iet.metastore.ingenta.com
1887

Big data security in Internet of Things

Big data security in Internet of Things

For access to this article, please select a purchase option:

Buy chapter PDF
$16.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Security and Privacy for Big Data, Cloud Computing and Applications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The Internet-of-Things (IoT) paradigm is an emerging twenty-first century technological revolution, a concept that facilitates to communicate with objects, devices, and machines at unprecedented scale. Nowadays, IoT is extensively applied to numerous applications such as intelligent transportation, smart security, smart grid, and smart home. Now, considering that in the near future, millions of devices will be interconnected and will be producing enormous data, the privacy and security of data going to be challenged and private information may leak at any time. This chapter presents an overview of the IoT and security concerns on big data while we discuss privacy and security approaches for big data with reference to infrastructure, application, and data.

Chapter Contents:

  • 3.1 Internet-of-Things
  • 3.1.1 Wireless sensor network
  • 3.1.1.1 Sensor nodes
  • 3.1.1.2 Wireless cluster head
  • 3.1.1.3 Wireless network node
  • 3.1.1.4 Base station
  • 3.1.2 Cloud
  • 3.1.2.1 Big data
  • 3.1.2.2 Cloud services
  • 3.1.2.3 Cloud types
  • 3.1.3 Big data analytics
  • 3.1.3.1 Text analytics
  • 3.1.3.2 Audio analytics
  • 3.1.3.3 Video analytics
  • 3.2 Big data security
  • 3.2.1 Hadoop security
  • 3.2.1.1 Authentication and authorization
  • 3.2.2 Cloud security
  • 3.2.3 Monitoring and auditing
  • 3.2.3.1 Intrusion detection
  • 3.2.3.2 Event monitoring
  • 3.2.4 Key management
  • 3.2.5 Anonymization
  • 3.3 Summary
  • References

Inspec keywords: security of data; Internet of Things; Big Data; data privacy

Other keywords: Internet-of-Things paradigm; privacy; IoT; big data security

Subjects: Data security; Ubiquitous and pervasive computing

Preview this chapter:
Zoom in
Zoomout

Big data security in Internet of Things, Page 1 of 2

| /docserver/preview/fulltext/books/pc/pbpc028e/PBPC028E_ch3-1.gif /docserver/preview/fulltext/books/pc/pbpc028e/PBPC028E_ch3-2.gif

Related content

content/books/10.1049/pbpc028e_ch3
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address