DOI QR코드

DOI QR Code

빅데이터 보안 분야의 연구동향 분석

A Review of Research on Big Data Security

  • 박서기 (동국대학교 서울캠퍼스 경영대학 경영정보학과) ;
  • 황경태 (동국대학교 서울캠퍼스 경영대학 경영정보학과)
  • 투고 : 2016.03.16
  • 심사 : 2016.03.24
  • 발행 : 2016.03.31

초록

본 연구의 목적은 빅데이터 보안 분야의 기존 연구를 분석하고, 향후 연구 방향을 모색하는 것이다. 이를 위해 국내외의 총62편의 논문을 식별하여, 발간년도, 게재 매체, 전반적인 연구접근 방법, 세부적 연구 방법, 연구 주제 등을 분석하였다. 분석 결과, 빅데이터 보안 연구는 매우 초기 단계로서, 비실증 연구가 압도적인 비중을 차지하고 있고, 관련 개념/기법에 대한 이해를 해나가는 과정으로서 기술-관리-통합의 단계로 진화한 정보보안 분야의 연구 동향에 동조하여 기술적인 연구가 주로 진행되고 있다. 연구 주제 측면에서도 빅데이터 보안에 대한 전반적인 이슈를 다룬 총론적인 연구들이 보안 구현 방법론, 분야별 이슈 등의 각론적 연구에 비해 높은 비중을 나타내는 등 초기 단계의 모습을 나타내고 있다. 향후 유망한 연구 분야로는 빅데이터 보안에 대한 전반적인 프레임워크 수립, 업종별 빅데이터 보안에 대한 연구, 빅데이터 보안 관련 정부 정책 분석 등을 들 수 있다. 빅데이터 보안 분야의 연구는 본격적으로 시작된 지 얼마 되지 않아, 연구 결과가 상대적으로 매우 부족한 편이다. 앞으로 다양한 관점에서 빅데이터 보안과 관련해 풍부한 주제를 다루는 연구가 진행되기를 기대한다.

The purpose of the study is to analyze the existing literature and to suggest future research directions in the big data security area. This study identifies 62 research articles and analyses their publication year, publication media, general research approach, specific research method, and research topic. According to the results of the analyses, big data security research is at its intial stage in which non-empirical studies and research dealing with technical issues are dominant. From the research topic perspective, the area demonstrates the signs of initial research stage in which proportion of the macro studies dealing with overall issues is far higher than the micro ones covering specific implementation methods and sectoral issues. A few promising topics for future research include overarching framework on big data security, big data security methods for different industries, and government policies on big data security. Currently, the big data security area does not have sufficient research results. In the future, studies covering various topics in big data security from multiple perspectives are anticipated.

키워드

참고문헌

  1. 공효순.송은지 (2013). "빅 데이터를 이용한 호텔기업 CRM 및 보안에 관한 연구". 융합보안논문지, 13(4): 69-75.
  2. 김기문.박충신.김준석.이호근.임건신 (2005). "경영정보학연구의 연구 다양성 평가". 경영정보학연구. 15(2): 149-170.
  3. 김병철 (2013). “빅 데이터 보안 기술 및 대응방안 연구”. The Journal of Digital Policy & Management, 11(10): 445-451.
  4. 수브르더 비스워스.유진호.정철용 (2013). "AHP 기법을 활용한 Big Data 보안관리 요소들의 우선순위 분석에 관한 연구". 한국전자거래학회지, 18(4): 301-314. https://doi.org/10.7838/jsebs.2013.18.4.301
  5. 유영성.이명수 (2014). "빅데이터와 사회안전". 이슈 & 진단, 135: 1-25.
  6. 이승하.강승원.김기홍.방세중 (2014). "보안 로그/이벤트 수집을 위한 Big Data ETL 모델 설계". 한국통신학회 종합학술 발표회 논문집(하계) 2014: 886-887.
  7. 이종옥.신성희.김홍근.황경태 (2012). "IT 서비스 관리(ITSM) 분야의 연구 프레임워크 및 연구 동향 분석". 정보화정책, 19(1): 3-24.
  8. 이지은.김창재.이남용 (2014). "빅데이터 처리 프로세스에 따른 빅데이터 위험요인 분석". 한국IT서비스학회지, 13(2): 185-194. https://doi.org/10.9716/kits.2014.13.2.185
  9. 조영복.양일권.이상호 (2012). "ID 기반의 빅 데이터 정보보호 방안". 2012 중소기업정보기술융합학회 추계학술대회 논문집, 2(1): 18-21.
  10. 최주영.김명주 (2015)." 빅데이터 서비스의 보안품질평가 모델에 관한 연구". 2015년도 한국인터넷정보학회 춘계학술발표대회 논문집, 145-146.
  11. 홍진근 (2013). “미정부의 빅데이터를 위한 보안정책”. The Journal of Digital Policy & Management, 11(10): 403-409.
  12. 홍진근 (2013). “빅데이터 환경에서 미국 커버로스 인증 적용 정책”. The Journal of Digital Policy & Management, 11(11): 435-441.
  13. 황경태 (2011), 정보시스템 감사: IT 거버넌스의 핵심수단, 탑북스.
  14. Kang, B. S., Cho, J., Yun, S. & Lee, K. H. (2015). A Study on SmartGrid Security Monitoring Based on Big Data Platform. 중소기업융합학회 국제학술대회 논문집, 2(1): 49-50.
  15. Abawajy, J. H., Kelarev, A. & Chowdhury, M. (2014). “Large Iterative Multitier Ensemble Classifiers for Security of Big Data“. IEEE Transactions on Emerging Topics in Computing, 2(3): 352-363. https://doi.org/10.1109/TETC.2014.2316510
  16. Adluru, P., Datla, S. S. & Zhang, X. (2015). "Hadoop Eco System for Big Data Security and Privacy". 2015 IEEE Long Island Systems, Applications and Technology Conference, 1-6.
  17. Ahmed, E. S. A. & Saeed, R. A. (2014). “A Survey of Big Data Cloud Computing Security”. International Journal of Computer Science and Software Engineering, 3(1): 78-85.
  18. Ahmed, W. & Hashmi, M. U. (2013). “Security Visualization on Big Data”. Journal of Independent Studies and Research, 11(2): 18-22.
  19. Alavi, M., & Carlson, P. (1992). "A Review of MIS Research and Disciplinary Development". Journal of Management Information Systems, 8(4), 45-62. https://doi.org/10.1080/07421222.1992.11517938
  20. Aradau, C. & Blanke, T. (2015). "The (Big) Data-security Assemblage: Knowledge and Critique". Big Data & Society, 2(2), 1-12.
  21. Bardi, A., Manghi, P. & Zoppi, F. (2014). "Coping with Interoperability and Sustainability in Cultural Heritage Aggregative Data Infrastructures. International Journal of Metadata, Semantics and Ontologies, 9(2), 138-154. https://doi.org/10.1504/IJMSO.2014.060341
  22. Bertino, E. (2015). "Big Data-Security and Privacy". 2015 IEEE International Congress on Big Data, 757-761.
  23. Blobel, B., Lopez, D. M. & Gonzalez, C. (2016). "Patient Privacy and Security Concerns on Big Data for Personalized Medicine". Health and Technology, 1-7.
  24. Bowers, K. D., Hart, C., Juels, A. & Triandopoulos, N. (2013). "Securing the Data in Big Data Security Analytics". IACR Cryptology ePrint Archive, 1-14.
  25. Chen, Y. (2015). "When the Cloud Meets Big Data: Security Challenges and Solutions", Doctoral Dissertation, Indiana University.
  26. Choi, S. H., Kim, J. S. & Kwak, J. (2015). "A Study of Basic Architecture for Big-Data Security Analysis in SDN Environment". Proceedings of the International Conference on Security and Management, 137-139.
  27. Cuzzocrea, A. (2014). "Privacy and Security of Big Data: Current Challenges and Future Research Perspectives". Proceedings of the First International Workshop on Privacy and Security of Big Data, 45-47.
  28. Cuzzocrea, A. (2014). "PSBD 2014: Overview of the 1st International Workshop on Privacy and Security of Big Data". Proceedings of the 23rd ACM International Conference on Information and Knowledge Management, 2100-2101.
  29. Feng, X., Onafeso, B. & Liu, E. (2015). " Investigating Big Data Healthcare Security Issues with Raspberry Pi". 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, 2329-2334.
  30. Gangawane, A.A. & Dvei, A. (2015) "Big Data Security Issues and Challenges in Cloud Computing", Asian Journal of Convergence in Technology, 1(6): 1-5.
  31. Grant, E. S. & Mohammad, A. F. (2014). "Use of SOA 3.0 in Private Cloud Security Gateway Service Design: In the Era of Big Data". International Conference on Computer Games, Multimedia & Allied Technology, 94-97.
  32. Gupta, A., Verma, A., Kalra, P. & Kumar, L. (2014). "Big Data: A Security Compliance Model". 2014 Conference on IT in Business, Industry and Government, 1-5.
  33. Hsu, C., Zeng, B. & Zhang, M. (2014). “A Novel Group Key Transfer for Big Data Security”. Applied Mathematics and Computation, 249: 436-443. https://doi.org/10.1016/j.amc.2014.10.051
  34. Inukollu, V. N., Arsi, S. & Ravuri, S. R. (2014). “Security Issues Associated with Big Data in Cloud Computing”. International Journal of Network Security & Its Applications, 6(3): 45-56. https://doi.org/10.5121/ijnsa.2014.6304
  35. Islam, M. R. & Islam, M. E. (2014). "An Approach to Provide Security to Unstructured Big Data". 2014 8th International Conference on Software, Knowledge, Information Management and Applications, 1-5.
  36. Kalibjian, J. (2013). "Big Data Management and Security Application to Telemetry Data Products". Proceedings of International Telemetering Conference, 1-8.
  37. Kaushik, M. & Jain, A. (2014). "Challenges to Big Data Security and Privacy". International Journal of Computer Science and Information Technologies, 5(3): 3042-3043.
  38. Kim, S. H., Eom, J. H. & Chung, T. M. (2013a). "Big Data Security Hardening Methodology Using Attributes Relationship". 2013 International Conference on Information Science and Applications (ICISA), 1-2.
  39. Kim, S. H., Kim, N. U. & Chung, T. M. (2013b). "Attribute Relationship Evaluation Methodology for Big Data Security", 2013 International Conference on IT Convergence and Security, 1-4
  40. Koushikaa, M., Habipriya, S., Aravinth, S. S., Karthikeyan, T. & Kumar, V. (2014). “A Public Key Cryptography Security System For Big Data”. International Journal for Innovative Research in Science and Technology, 1(6): 311-313.
  41. Kupwade Patil, H. & Seshadri, R. (2014). "Big Data Security and Privacy Issues in Healthcare". 2014 IEEE International Congress on Big Data, 762-765.
  42. Kshetri, N. (2014). "Big Data's Impact on Privacy, Security and Consumer Welfare". Telecommunications Policy, 38(11): 1134-1145. https://doi.org/10.1016/j.telpol.2014.10.002
  43. Lafuente, G. (2015). “The Big Data Security Challenge”. Network Security, 2015(1): 12-14. https://doi.org/10.1016/S1353-4858(15)70009-7
  44. Lan, L. & Jun, L. (2013). "Some Special Issues of Network Security Monitoring on Big Data Environments" . 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing, 10-15.
  45. Li, S., Zhang, T., Gao, J. & Park, Y. (2015). "A Sticky Policy Framework for Big Data Security". 2015 IEEE First International Conference on Big Data Computing Service and Applications, 130-137.
  46. Liang, Q., Ren, J., Liang, J., Zhang, B., Pi, Y. & Zhao, C. (2015). “Security in Big Data”. Security and Communication Networks, 8(14): 2383-2385. https://doi.org/10.1002/sec.1332
  47. Lu, T., Guo, X., Xu, B., Zhao, L., Peng, Y. & Yang, H. (2013). "Next Big Thing in Big Data: The Security of the ICT Supply Chain". 2013 International Conference on Social Computing, 1066-1073.
  48. Marchal, S., Jiang, X., State, R. & Engel, T. (2014). "A Big Data Architecture for Large Scale Security Monitoring". 2014 IEEE International Congress on Big Data, 56-63.
  49. Matturdi, B., Xianwei, Z., Shuai, L. & Fuhong, L. (2014). “Big Data Security and Privacy: a Review”. China Communications, 11(14): 135-145. https://doi.org/10.1109/CC.2014.7085614
  50. Mell, P. (2012). "Big Data Technology and Implications for Security Research". Proceedings of the 2012 ACM Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 15-16.
  51. Mittal, S. & Varshney, S. (2015). “Big Data: Information Security and Privacy”. International Journal of Software and Web Sciences, 1(1): 29-32.
  52. Murthy, P. K. (2014). "Top Ten Challenges in Big Data Security and Privacy". 2014 IEEE International Test Conference, 1.
  53. Paryasto, M., Alamsyah, A. & Rahardjo, B. (2014). "Big-data Security Management Issues". 2014 2nd International Conference on Information and Communication Technology. 59-63.
  54. Shao, P. & Y. Wang & X. Tao (2010). "A Comparative Study on MIS Research at Mainland China and Abroad(2002-2007)." International Journal of Management Science, 16(2): 39-51.
  55. Sharma, P. P. & Navdeti, C. P. (2014). "Securing Big Data Hadoop: a Review of Security Issues, Threats and Solution" . International Journal of Computer Science and Information Technologies, 5 (2): 2126-2131
  56. Shen, Y. & Thonnard, O. (2014). "Mr-TRIAGE: Scalable Multi-criteria Clustering for Big Data Security Intelligence Applications". 2014 IEEE International Conference on Big Data, 627-635.
  57. Singh, J. (2014). "Real Time Big Data Analytic: Security Concern and Challenges with Machine Learning Algorithm". 2014 Conference on IT in Business, Industry and Government, 1-4.
  58. Tan, Z., Nagar, U. T., He, X., Nanda, P., Liu, R. P., Wang, S. & Hu, J. (2014). “Enhancing Big Data Security with Collaborative Intrusion Detection”. IEEE Cloud Computing, 1(3): 27-33. https://doi.org/10.1109/MCC.2014.53
  59. Tankard, C. (2012). “Big Data Security”. Network Security, 2012(7): 5-8. https://doi.org/10.1016/S1353-4858(12)70063-6
  60. Telang, R. (2014). "Privacy and Security Policy Infrastructure for Big Data", A Journal of Law and Policy for the Information Society, 10(3): 783-798.
  61. Thayananthan, V. & Albeshri, A. (2015). “Big Data Security Issues Based on Quantum Cryptography and Privacy with Authentication for Mobile Data Center”. Procedia Computer Science, 50: 149-156. https://doi.org/10.1016/j.procs.2015.04.077
  62. Thuraisingham, B. (2015). "Big Data Security and Privacy". Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 279-280.
  63. Toshniwal, R., Dastidar, K. G. & Nath, A. (2015). “Big Data Security Issues and Challenges”. International Journal of Innovative Research in Advanced Engineering, 2(2): 15-20.
  64. Van Ginkel, W. (2013). "Holistic Approach Needed for Big Data Security", Internal Auditor, 70(1): 17.
  65. Vessey, Iris, Ramesh, V. & Glass, R.L. (2002). "Research in Information Systems: An Empirical Study of Diversity in the Discipline and Its Journals."Journal of Management Information Systems, 19(2): 129-174. https://doi.org/10.1080/07421222.2002.11045721
  66. Vidyavathi, B. M. (2015). “Security Challenges in Big Data: Review”. International Journal of Advanced Research in Computer Science, 6(6): 199-201.
  67. Vivekanand, M. & Vidyavathi, B. M. (2015). “Security Challenges in Big Data: Review”. International Journal of Advanced Research in Computer Science, 6(6): 199-202.
  68. Wang, H., Jiang, X. & Kambourakis, G. (2015). “Special Issue on Security, Privacy and Trust in Network-based Big Data”. Information Sciences, 318: 48-50. https://doi.org/10.1016/j.ins.2015.05.040
  69. Yadav, G. & Dalal, S. (2015). “Improvisation of Network Security using Encryption Technique for Big Data Technology”. International Journal of Computer Applications, 124(11): 27-30. https://doi.org/10.5120/ijca2015905647