Chinese Journal of Network and Information Security ›› 2016, Vol. 2 ›› Issue (4): 1-11.doi: 10.11959/j.issn.2096-109x.2016.00046

• Comprehensive Reviews •     Next Articles

Data security and protection techniques in big data:a survey

Kai-min WEI1,Jian WENG1,Kui REN2   

  1. 1 School of Information Science and Technology,Jinan University,Guangzhou 510632,China
    2 Computer Science and Engineering,State University of New York at Buffalo,Buffalo 14260,United States
  • Revised:2015-04-02 Online:2016-04-01 Published:2016-05-25
  • Supported by:
    The National Natural Science Foundation of China(61272413);The National Natural Science Foundation of China(61472165);The National Natural Science Foundation of China(61502202);The Re-search Fund for the Doctoral Program of Higher Education of China(20134401110011)


Big Data has attracted tremendous attention from all over the world nowadays.Its sheer volume,complex structure and realtime processing requirements often obsolete traditional technologies when coming to provide suffi-cient security protection.To address this challenge,significant research efforts have been carried out by the research community since recent years.Different technical aspects of big data security,including encryption algorithms,data integrity auditing,access control,secure data duplication,assured deletion,and secure search were surveyed,and in-depth discussions on their pros and cons were provided.Various future research directions were also discussed.

Key words: big data, data security, and protection, algorithm, search

CLC Number: