{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T22:33:32Z","timestamp":1774391612180,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,9,21]],"date-time":"2022-09-21T00:00:00Z","timestamp":1663718400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,21]],"date-time":"2022-09-21T00:00:00Z","timestamp":1663718400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s11760-022-02341-w","type":"journal-article","created":{"date-parts":[[2022,9,21]],"date-time":"2022-09-21T17:03:23Z","timestamp":1663779803000},"page":"1335-1343","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A key review on security and privacy of big data: issues, challenges, and future research directions"],"prefix":"10.1007","volume":"17","author":[{"given":"Doygun","family":"Demirol","sequence":"first","affiliation":[]},{"given":"Resul","family":"Das","sequence":"additional","affiliation":[]},{"given":"Davut","family":"Hanbay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,21]]},"reference":[{"issue":"1","key":"2341_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.107094","volume":"169","author":"MZ Gunduz","year":"2020","unstructured":"Gunduz, M.Z., Das, R.: Cyber-security on smart grid: threats and potential solutions. Comput. Netw. 169(1), 107094 (2020). https:\/\/doi.org\/10.1016\/j.comnet.2019.107094","journal-title":"Comput. Netw."},{"key":"2341_CR2","doi-asserted-by":"publisher","unstructured":"Das, R., Baykara, M., Tuna, G.: A novel approach to steganography: enhanced least significant bit substitution algorithm integrated with self-determining encryption feature. CSSE 34(1), 23\u201332 (2019). https:\/\/doi.org\/10.32604\/csse.2019.34.023","DOI":"10.32604\/csse.2019.34.023"},{"key":"2341_CR3","doi-asserted-by":"publisher","unstructured":"Baykara, M., Da\u015f, R.: SoftSwitch: a centralized honeypot-based security approach usingsoftware-defined switching for secure management of VLAN networks. Turkish J. Elect. Eng. & Comput. Sci. 27(5), 3309\u20133325 (2019). https:\/\/doi.org\/10.3906\/elk-1812-86","DOI":"10.3906\/elk-1812-86"},{"key":"2341_CR4","unstructured":"IDC. Future of industry ecosystems: shared data and insights. https:\/\/blogs.idc.com\/2021\/01\/06\/future-of-industry-ecosystems-shared-data-and-insights (2021). Accessed: 2022-08-10"},{"key":"2341_CR5","unstructured":"Erl, T., Khattak, W., Buhler, P.: In Understanding big data (eds Taub, M. et\u00a0al.) Big data fundamentals: concepts, drivers & techniques 3\u201328 (Prentice Hall Press, USA, 2016)"},{"issue":"1","key":"2341_CR6","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1186\/s40537-016-0059-y","volume":"3","author":"P Jain","year":"2016","unstructured":"Jain, P., Gyanchandani, M., Khare, N.: Big data privacy: a technological perspective and review. J. Big Data 3(1), 25 (2016). https:\/\/doi.org\/10.1186\/s40537-016-0059-y","journal-title":"J. Big Data"},{"issue":"3","key":"2341_CR7","doi-asserted-by":"publisher","first-page":"860","DOI":"10.3934\/math.2019.3.860","volume":"4","author":"S Venkatraman","year":"2019","unstructured":"Venkatraman, S., Venkatraman, R.: Big data security challenges and strategies. AIMS Mathemat 4(3), 860\u2013879 (2019). https:\/\/doi.org\/10.3934\/math.2019.3.860","journal-title":"AIMS Mathemat"},{"issue":"3","key":"2341_CR8","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s41019-016-0021-1","volume":"1","author":"E Bertino","year":"2016","unstructured":"Bertino, E.: Introduction to data security and privacy. Data Sci. Eng. 1(3), 125\u2013126 (2016). https:\/\/doi.org\/10.1007\/s41019-016-0021-1","journal-title":"Data Sci. Eng."},{"issue":"1","key":"2341_CR9","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/TFUZZ.2020.3021713","volume":"29","author":"L Zhang","year":"2021","unstructured":"Zhang, L., Shi, Y., Chang, Y.C., Lin, C.T.: Hierarchical fuzzy neural networks with privacy preservation for heterogeneous big data. IEEE Trans. Fuzzy Syst. 29(1), 46\u201358 (2021). https:\/\/doi.org\/10.1109\/TFUZZ.2020.3021713","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"2341_CR10","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.neucom.2012.10.041","volume":"129","author":"YK Wang","year":"2014","unstructured":"Wang, Y.K., Chen, S.A., Lin, C.T.: An EEG-based brain-computer interface for dual task driving detection. Neurocomput 129, 85\u201393 (2014). https:\/\/doi.org\/10.1016\/j.neucom.2012.10.041","journal-title":"Neurocomput"},{"key":"2341_CR11","doi-asserted-by":"publisher","unstructured":"Fonollosa, J., Sheik, S., Huerta, R., Marco, S.: Reservoir computing compensates slow response of chemosensor arrays exposed to fast varying gas concentrations in continuous monitoring. Sens. Actuators, B Chem. 215, 618\u2013629 (2015). https:\/\/doi.org\/10.1016\/j.snb.2015.03.028","DOI":"10.1016\/j.snb.2015.03.028"},{"issue":"March","key":"2341_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2021.120754","volume":"168","author":"P Chaudhary","year":"2021","unstructured":"Chaudhary, P., Gupta, B.B., Chang, X., Nedjah, N., Chui, K.T.: Enhancing big data security through integrating XSS scanner into fog nodes for SMEs gain. Technol. Forecast. Soc. Chang. 168(March), 120754 (2021). https:\/\/doi.org\/10.1016\/j.techfore.2021.120754","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"2341_CR13","unstructured":"Shah, S. S.\u00a0H.: Cross site scripting xss dataset for deep learning (2020). https:\/\/www.kaggle.com\/syedsaqlainhussain\/cross-site-scripting-xss-dataset-for-deep-learning"},{"key":"2341_CR14","unstructured":"Box, P.: Xss payload dataset (2020). https:\/\/github.com\/payloadbox\/xss-payload-list"},{"key":"2341_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-05692-7","author":"S Chen","year":"2021","unstructured":"Chen, S., Fu, A., Yu, S., Ke, H., Su, M.: DP-QIC: A differential privacy scheme based on quasi-identifier classification for big data publication. Soft. Comput. (2021). https:\/\/doi.org\/10.1007\/s00500-021-05692-7","journal-title":"Soft. Comput."},{"key":"2341_CR16","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1007\/978-981-15-7345-3_80","volume":"145","author":"G Smilarubavathy","year":"2021","unstructured":"Smilarubavathy, G., Nidhya, R., Abiramy, N.V., Kumar, A.D.: Paillier homomorphic encryption with K-means clustering algorithm (phekc) for data mining security in cloud. Lecture Notes in Net. Syst. 145, 941\u2013948 (2021). https:\/\/doi.org\/10.1007\/978-981-15-7345-3_80","journal-title":"Lecture Notes in Net. Syst."},{"issue":"2","key":"2341_CR17","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1504\/IJICS.2020.108839","volume":"13","author":"L Mohan","year":"2020","unstructured":"Mohan, L.: Secure and privacy-preserving multi-keyword ranked information retrieval from encrypted big data. Int. J. Inf. Comput. Secur. 13(2), 141\u2013165 (2020). https:\/\/doi.org\/10.1504\/IJICS.2020.108839","journal-title":"Int. J. Inf. Comput. Secur."},{"key":"2341_CR18","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1016\/j.suscom.2018.06.003","volume":"19","author":"C Stergiou","year":"2015","unstructured":"Stergiou, C., Psannis, K.E., Gupta, B.B., Ishibashi, Y.: Security, privacy & efficiency of sustainable cloud computing for big data & IoT. Sustain. Comput. Inform. Syst. 19, 456\u2013465 (2015). https:\/\/doi.org\/10.1016\/j.suscom.2018.06.003","journal-title":"Sustain. Comput. Inform. Syst."},{"issue":"12","key":"2341_CR19","doi-asserted-by":"publisher","first-page":"2381","DOI":"10.1109\/TKDE.2018.2819673","volume":"30","author":"Q Wang","year":"2018","unstructured":"Wang, Q., et al.: Privacy-preserving collaborative model learning: the case of word vector training. IEEE Trans. Knowl. Data Eng. 30(12), 2381\u20132393 (2018). https:\/\/doi.org\/10.1109\/TKDE.2018.2819673","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"23","key":"2341_CR20","doi-asserted-by":"publisher","first-page":"7763","DOI":"10.1007\/s00500-018-3435-z","volume":"22","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., et al.: Efficient and secure big data storage system with leakage resilience in cloud computing. Soft. Comput. 22(23), 7763\u20137772 (2018). https:\/\/doi.org\/10.1007\/s00500-018-3435-z","journal-title":"Soft. Comput."},{"issue":"8","key":"2341_CR21","doi-asserted-by":"publisher","first-page":"1440","DOI":"10.1109\/TKDE.2018.2794384","volume":"30","author":"C Li","year":"2018","unstructured":"Li, C., Zhou, P., Xiong, L., Wang, Q., Wang, T.: Differentially private distributed online learning. IEEE Trans. Knowl. Data Eng. 30(8), 1440\u20131453 (2018). https:\/\/doi.org\/10.1109\/TKDE.2018.2794384","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"2341_CR22","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.ins.2016.09.005","volume":"387","author":"Y Li","year":"2017","unstructured":"Li, Y., Gai, K., Qiu, L., Qiu, M., Zhao, H.: Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf. Sci. 387, 103\u2013115 (2017). https:\/\/doi.org\/10.1016\/j.ins.2016.09.005","journal-title":"Inf. Sci."},{"key":"2341_CR23","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-017-0104-5","author":"M Al-Zobbi","year":"2017","unstructured":"Al-Zobbi, M., Shahrestani, S., Ruan, C.: Improving MapReduce privacy by implementing multi-dimensional sensitivity-based anonymization. J. Big Data (2017). https:\/\/doi.org\/10.1186\/s40537-017-0104-5","journal-title":"J. Big Data"},{"issue":"3","key":"2341_CR24","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MCOM.2017.1600228CM","volume":"55","author":"N Kumar","year":"2017","unstructured":"Kumar, N., Vasilakos, A.V., Rodrigues, J.J.: A multi-tenant cloud-based DC nano grid for self-sustained smart buildings in smart cities. IEEE Commun. Mag. 55(3), 14\u201321 (2017). https:\/\/doi.org\/10.1109\/MCOM.2017.1600228CM","journal-title":"IEEE Commun. Mag."},{"key":"2341_CR25","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1016\/j.ins.2019.05.053","volume":"527","author":"M Chamikara","year":"2020","unstructured":"Chamikara, M., Bertok, P., Liu, D., Camtepe, S., Khalil, I.: Efficient privacy preservation of big data for accurate data mining. Inf. Sci. 527, 420\u2013443 (2020). https:\/\/doi.org\/10.1016\/j.ins.2019.05.053","journal-title":"Inf. Sci."},{"key":"2341_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101570","volume":"87","author":"M Chamikara","year":"2019","unstructured":"Chamikara, M., Bertok, P., Liu, D., Camtepe, S., Khalil, I.: An efficient and scalable privacy preserving algorithm for big data and data streams. Comput. & Sec. 87, 101570 (2019). https:\/\/doi.org\/10.1016\/j.cose.2019.101570","journal-title":"Comput. & Sec."},{"key":"2341_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.pmcj.2018.05.003","volume":"48","author":"MAP Chamikara","year":"2018","unstructured":"Chamikara, M.A.P., Bertok, P., Liu, D., Camtepe, S., Khalil, I.: Efficient data perturbation for privacy preserving and accurate data stream mining. PMC 48, 1\u201319 (2018). https:\/\/doi.org\/10.1016\/j.pmcj.2018.05.003","journal-title":"PMC"},{"key":"2341_CR28","unstructured":"Xiao, H. et\u00a0al. Bach, F., Blei, D.: (eds) Is feature selection secure against training data poisoning? (eds Bach, F. & Blei, D.) Proc. 32nd ICML, Vol.\u00a037, 1689\u20131698 (PMLR, Lille, France, 2015)"},{"key":"2341_CR29","doi-asserted-by":"publisher","first-page":"29","DOI":"10.4018\/IJCINI.2014070103","volume":"8","author":"Y Wang","year":"2014","unstructured":"Wang, Y., Wiebe, V.J.: Big data analytics on the characteristic equilibrium of collective opinions in social networks. IJCINI 8, 29\u201344 (2014). https:\/\/doi.org\/10.4018\/IJCINI.2014070103","journal-title":"IJCINI"},{"key":"2341_CR30","doi-asserted-by":"publisher","unstructured":"Zhang, F., et al.: A distributed frequent itemset mining algorithm using spark for big data analytics. Clust. Comput. 18, 1493\u20131501 (2015). https:\/\/doi.org\/10.1007\/s10586-015-0477-1","DOI":"10.1007\/s10586-015-0477-1"},{"key":"2341_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-0550-4_3","volume-title":"Big Data Analysis in Cloud and Machine Learning","author":"N Sharma","year":"2019","unstructured":"Sharma, N., Shamkuwar, M.: Big Data Analysis in Cloud and Machine Learning. Springer, Singapore (2019)"},{"key":"2341_CR32","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1109\/ACCESS.2014.2332453","volume":"2","author":"H Hu","year":"2014","unstructured":"Hu, H., Wen, Y., Chua, T.S., Li, X.: Toward scalable systems for big data analytics: a technology tutorial. IEEE Access 2, 652\u2013687 (2014). https:\/\/doi.org\/10.1109\/ACCESS.2014.2332453","journal-title":"IEEE Access"},{"issue":"10","key":"2341_CR33","doi-asserted-by":"publisher","first-page":"2648","DOI":"10.4304\/jcp.8.10.2648-2655","volume":"8","author":"Y Yang","year":"2013","unstructured":"Yang, Y., Long, X., Jiang, B.: K-means method for grouping in hybrid mapreduce cluster. Journal of Computers (Finland) 8(10), 2648\u20132655 (2013). https:\/\/doi.org\/10.4304\/jcp.8.10.2648-2655","journal-title":"Journal of Computers (Finland)"},{"key":"2341_CR34","doi-asserted-by":"publisher","unstructured":"Sivarajah, U., Kamal, M.M., Irani, Z., Weerakkody, V.: Critical analysis of big data challenges and analytical methods. JBR 70, 263\u2013286 (2017). https:\/\/doi.org\/10.1016\/j.jbusres.2016.08.001","DOI":"10.1016\/j.jbusres.2016.08.001"},{"key":"2341_CR35","doi-asserted-by":"publisher","unstructured":"Aghabozorgi, S., Seyed, A., Shirkhorshidi, Ying Wah, T.: Time-series clustering - a decade review. Inf. Syst. 53, 16\u201338 (2015). https:\/\/doi.org\/10.1016\/j.is.2015.04.007","DOI":"10.1016\/j.is.2015.04.007"},{"issue":"7","key":"2341_CR36","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/2611567","volume":"57","author":"HV Jagadish","year":"2014","unstructured":"Jagadish, H.V., et al.: Big data and its technical challenges. Commun. ACM 57(7), 86\u201394 (2014). https:\/\/doi.org\/10.1145\/2611567","journal-title":"Commun. ACM"},{"key":"2341_CR37","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.ins.2014.01.015","volume":"275","author":"CL Philip Chen","year":"2014","unstructured":"Philip Chen, C.L., Zhang, C.Y.: Data-intensive applications, challenges, techniques and technologies: a survey on big data. Inf. Sci. 275, 314\u2013347 (2014). https:\/\/doi.org\/10.1016\/j.ins.2014.01.015","journal-title":"Inf. Sci."},{"issue":"4","key":"2341_CR38","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.2307\/41703503","volume":"36","author":"H Chen","year":"2012","unstructured":"Chen, H., Chiang, R.H., Storey, V.C.: Business intelligence and analytics: from big data to big impact. MIS Q. 36(4), 1165\u20131188 (2012). https:\/\/doi.org\/10.2307\/41703503","journal-title":"MIS Q."},{"key":"2341_CR39","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.ijinfomgt.2014.10.007","volume":"35","author":"A Gandomi","year":"2015","unstructured":"Gandomi, A., Haider, M.: Beyond the hype: Big data concepts, methods, and analytics. IJIM 35, 137\u2013144 (2015). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2014.10.007","journal-title":"IJIM"},{"key":"2341_CR40","doi-asserted-by":"crossref","unstructured":"Li, Y., et\u00a0al.: In Big data and cloud computing (eds Huadong, G., Michael, F.\u00a0G. & Alessandro, A.) Manual of Digital Earth 325\u2013355 (Springer, Singapore, 2020)","DOI":"10.1007\/978-981-32-9915-3_9"},{"issue":"9","key":"2341_CR41","first-page":"1","volume":"10","author":"B Das","year":"2020","unstructured":"Das, B.: An overview on big data: characteristics, security and applications. JNCET 10(9), 1\u20135 (2020)","journal-title":"JNCET"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-022-02341-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-022-02341-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-022-02341-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T16:21:59Z","timestamp":1682353319000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-022-02341-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,21]]},"references-count":41,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["2341"],"URL":"https:\/\/doi.org\/10.1007\/s11760-022-02341-w","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,21]]},"assertion":[{"value":"24 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 August 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 September 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}