Skip to main content

Cyber Safe Data Repositories

  • Chapter
  • First Online:
Cybersecurity for Smart Cities

Abstract

Nowadays, data is the center point of source to make any business decisions. With the advancements in digital technologies, business organizations gather a large amount of data using different sources. A large amount of data generation is often termed as Big Data and characterized by many V’s indicating their volume, variety, velocity, etc. Organizations use different tools to store and manage these data, and a data repository, such as a data warehouse, data lake, data mart, or data cube, is usually used. Therefore, data repositories are the source of data management and analytics, which are the collection of multiple databases in a structured or unstructured format. While data repositories benefit organizations’ large collection of data for business analytics, the question comes to cyber safety and security. Without an appropriate cyber security measure, critical data from the repositories may have unauthorized access—leading to business interrupting financial loss and possible business closer. In this book chapter, the vulnerable issues to the data repositories are discussed, and provided measures for making cyber safe data repositories.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.oracle.com/au/database/.

  2. 2.

    https://www.mongodb.com/.

References

  1. Tubaishat A, Al Jouhi M (2020) Building a security framework for smart cities: a case study from uae. In: 2020 5th international conference on computer and communication systems (ICCCS 2020). IEEE, Electrical Network, 15–18 May 2020, pp 477–481

    Google Scholar 

  2. Rashid ANMB, Ahmed M, Pathan A-SK (2021) Infrequent pattern detection for reliable network traffic analysis using robust evolutionary computation. Sensors 21(9)

    Google Scholar 

  3. Rashid ANM, Ahmed M, Islam SR (2021) A supervised rare anomaly detection technique via cooperative co-evolution-based feature selection using benchmark unsw_nb15 dataset. In: Inernational conference on ubiquitous security. Springer, pp 279–291 (2021)

    Google Scholar 

  4. Rashid ANMB, Ahmed M, Sikos LF, Haskell-Dowland, P (2022) Anomaly detection in cybersecurity datasets via cooperative co-evolution-based feature selection. ACM Trans Manag Inf Syst 13(3)

    Google Scholar 

  5. Rashid ANMB, Choudhury T (2019) Knowledge management overview of feature selection problem in high-dimensional financial data: cooperative co-evolution and MapReduce perspectives. Probl Perspect Manag 17(4):340

    Google Scholar 

  6. Ahmed M, Mahmood AN, Islam MR (2016) A survey of anomaly detection techniques in financial domain. Future Gener Comput Syst 55:278–288

    Article  Google Scholar 

  7. Ahmed M, Mahmood AN, Hu J (2016) A survey of network anomaly detection techniques. J Netw Comput Appl 60:19–31

    Article  Google Scholar 

  8. Miloslavskaya N, Tolstoy A (2016) Big data, fast data and data lake concepts. Procedia Comput Sci 88:300–305

    Article  Google Scholar 

  9. Saddad E, El-Bastawissy A, Mokhtar HMO, Hazman M (2020) Lake data warehouse architecture for big data solutions. Int J Adv Comput Sci Appl 11(8)

    Google Scholar 

  10. Rashid ANMB, Ahmed M, Ullah AB (2022) Data lakes: a panacea for big data problems, cyber safety issues, and enterprise security. In: Next-Generation enterprise security and governance, pp 135–162. CRC Press (2022)

    Google Scholar 

  11. Khine PP, Wang ZS (2018) Data lake: a new ideology in big data era. ITM Web Conf 17:03025

    Google Scholar 

  12. Shahabuddin M (2018) All about data repository. https://www.infoguardsecurity.com/all-about-data-repository/. Accessed 30 June 2022

  13. Iosif A-C, Gasiba TE, Zhao T, Lechner U, Pinto-Albuquerque M (2022) A large-scale study on the security vulnerabilities of cloud deployments. In: Wang G, Choo KKR, Ko RKL, Xu Y, Crispo B (eds), Ubiquitous security, volume 1557 of Communications in computer and information science. 1st international conference on ubiquitous security (UbiSec). Guangzhou Univ, Guangzhou, Peoples R China, 28–31 Dec 2021, pp 171–188

    Google Scholar 

  14. All Blue Solutions (2022) Top 10 most common security vulnerabilities in database. https://www.allbluesolutions.com/blog/top-10-most-common-security-vulnerabilities-in-database/. Accessed 30 June 2022

  15. Brook C (2018) What is a data repository? https://digitalguardian.com/blog/what-data-repository. Accessed 30 June 2022

  16. Geekflare Editorial (2022) The most dangerous database threats and how to prevent them. https://geekflare.com/database-threats-and-prevention-tools/. Accessed 30 June 2022

  17. Imperva (2021) Database security. https://www.imperva.com/learn/data-security/database-security/. Accessed 30 June 2022

  18. Murphy D (2022) 10 ways to improve data security. https://www.lepide.com/blog/ten-ways-to-improve-data-security/. Accessed 30 June 2022

  19. Sicilia M-A, Visvizi A (2019) Blockchain and OECD data repositories: opportunities and policymaking implications. Library Hi Tech 37(1, SI):30–42

    Google Scholar 

  20. Rashid ANMB, Ahmed M, Sikos LF, Haskell-Dowland P (2020) A novel penalty-based wrapper objective function for feature selection in Big Data using cooperative co-evolution. IEEE Access 8:150113–150129

    Article  Google Scholar 

  21. Rashid ANMB, Ahmed M, Sikos LF, Haskell-Dowland P (2020) Cooperative co-evolution for feature selection in big data with random feature grouping. J Big Data 7(1):1–42

    Google Scholar 

  22. Techopedia (2022) Data cube. https://www.techopedia.com/definition/28530/data-cube/. Accessed 30 June 2022

  23. Jiang Y, Jeusfeld M, Ding J (2021) Evaluating the data inconsistency of open-source vulnerability repositories. In: ARES 2021: 16th international conference on availability, reliability and security, 17–20 Aug 2021. Electrical Network

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. N. M. Bazlur Rashid .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Rashid, A.N.M.B., Ahmed, M., Ullah, A.B. (2023). Cyber Safe Data Repositories. In: Ahmed, M., Haskell-Dowland, P. (eds) Cybersecurity for Smart Cities. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-24946-4_7

Download citation

Publish with us

Policies and ethics