Abstract
Nowadays, data is the center point of source to make any business decisions. With the advancements in digital technologies, business organizations gather a large amount of data using different sources. A large amount of data generation is often termed as Big Data and characterized by many V’s indicating their volume, variety, velocity, etc. Organizations use different tools to store and manage these data, and a data repository, such as a data warehouse, data lake, data mart, or data cube, is usually used. Therefore, data repositories are the source of data management and analytics, which are the collection of multiple databases in a structured or unstructured format. While data repositories benefit organizations’ large collection of data for business analytics, the question comes to cyber safety and security. Without an appropriate cyber security measure, critical data from the repositories may have unauthorized access—leading to business interrupting financial loss and possible business closer. In this book chapter, the vulnerable issues to the data repositories are discussed, and provided measures for making cyber safe data repositories.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Tubaishat A, Al Jouhi M (2020) Building a security framework for smart cities: a case study from uae. In: 2020 5th international conference on computer and communication systems (ICCCS 2020). IEEE, Electrical Network, 15–18 May 2020, pp 477–481
Rashid ANMB, Ahmed M, Pathan A-SK (2021) Infrequent pattern detection for reliable network traffic analysis using robust evolutionary computation. Sensors 21(9)
Rashid ANM, Ahmed M, Islam SR (2021) A supervised rare anomaly detection technique via cooperative co-evolution-based feature selection using benchmark unsw_nb15 dataset. In: Inernational conference on ubiquitous security. Springer, pp 279–291 (2021)
Rashid ANMB, Ahmed M, Sikos LF, Haskell-Dowland, P (2022) Anomaly detection in cybersecurity datasets via cooperative co-evolution-based feature selection. ACM Trans Manag Inf Syst 13(3)
Rashid ANMB, Choudhury T (2019) Knowledge management overview of feature selection problem in high-dimensional financial data: cooperative co-evolution and MapReduce perspectives. Probl Perspect Manag 17(4):340
Ahmed M, Mahmood AN, Islam MR (2016) A survey of anomaly detection techniques in financial domain. Future Gener Comput Syst 55:278–288
Ahmed M, Mahmood AN, Hu J (2016) A survey of network anomaly detection techniques. J Netw Comput Appl 60:19–31
Miloslavskaya N, Tolstoy A (2016) Big data, fast data and data lake concepts. Procedia Comput Sci 88:300–305
Saddad E, El-Bastawissy A, Mokhtar HMO, Hazman M (2020) Lake data warehouse architecture for big data solutions. Int J Adv Comput Sci Appl 11(8)
Rashid ANMB, Ahmed M, Ullah AB (2022) Data lakes: a panacea for big data problems, cyber safety issues, and enterprise security. In: Next-Generation enterprise security and governance, pp 135–162. CRC Press (2022)
Khine PP, Wang ZS (2018) Data lake: a new ideology in big data era. ITM Web Conf 17:03025
Shahabuddin M (2018) All about data repository. https://www.infoguardsecurity.com/all-about-data-repository/. Accessed 30 June 2022
Iosif A-C, Gasiba TE, Zhao T, Lechner U, Pinto-Albuquerque M (2022) A large-scale study on the security vulnerabilities of cloud deployments. In: Wang G, Choo KKR, Ko RKL, Xu Y, Crispo B (eds), Ubiquitous security, volume 1557 of Communications in computer and information science. 1st international conference on ubiquitous security (UbiSec). Guangzhou Univ, Guangzhou, Peoples R China, 28–31 Dec 2021, pp 171–188
All Blue Solutions (2022) Top 10 most common security vulnerabilities in database. https://www.allbluesolutions.com/blog/top-10-most-common-security-vulnerabilities-in-database/. Accessed 30 June 2022
Brook C (2018) What is a data repository? https://digitalguardian.com/blog/what-data-repository. Accessed 30 June 2022
Geekflare Editorial (2022) The most dangerous database threats and how to prevent them. https://geekflare.com/database-threats-and-prevention-tools/. Accessed 30 June 2022
Imperva (2021) Database security. https://www.imperva.com/learn/data-security/database-security/. Accessed 30 June 2022
Murphy D (2022) 10 ways to improve data security. https://www.lepide.com/blog/ten-ways-to-improve-data-security/. Accessed 30 June 2022
Sicilia M-A, Visvizi A (2019) Blockchain and OECD data repositories: opportunities and policymaking implications. Library Hi Tech 37(1, SI):30–42
Rashid ANMB, Ahmed M, Sikos LF, Haskell-Dowland P (2020) A novel penalty-based wrapper objective function for feature selection in Big Data using cooperative co-evolution. IEEE Access 8:150113–150129
Rashid ANMB, Ahmed M, Sikos LF, Haskell-Dowland P (2020) Cooperative co-evolution for feature selection in big data with random feature grouping. J Big Data 7(1):1–42
Techopedia (2022) Data cube. https://www.techopedia.com/definition/28530/data-cube/. Accessed 30 June 2022
Jiang Y, Jeusfeld M, Ding J (2021) Evaluating the data inconsistency of open-source vulnerability repositories. In: ARES 2021: 16th international conference on availability, reliability and security, 17–20 Aug 2021. Electrical Network
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Rashid, A.N.M.B., Ahmed, M., Ullah, A.B. (2023). Cyber Safe Data Repositories. In: Ahmed, M., Haskell-Dowland, P. (eds) Cybersecurity for Smart Cities. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-24946-4_7
Download citation
DOI: https://doi.org/10.1007/978-3-031-24946-4_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-24945-7
Online ISBN: 978-3-031-24946-4
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)