Prospects for Information Security in Big Data Technology

A. Kubigenova, Al. Aktayeva, A. Sharipbay, A. Beissekov, G. Muradilova, A. Seraliyeva


The article discusses the security issues of the Big Data technology directly related to the architecture of the system, as well as the implementation of its following main components: data collection, data storage, normalization, analysis, and visualization of data. BigData technology anticipates certain security hazards bearing adverse effects on business processes of safety-critical systems. In case of massive computer attacks, (MCA) BigData (BD) has unpredictable behavior dynamic, while the incidents are merely recognized rare. The significance and novelty of the study is substantiated by the positive outcome of assessment of the Monte-Carlo method for evaluation the survivability of MCA-exposed recoverable BDs possessing time redundancy (recoverability). The statement of the problem, the modeling algorithm, and examples of solutions are given, based on which the Monte-Carlo method is recommendable for solving the problem. The results obtained might be promising in a way of improving the development of solutions to ensure the stability of the BD function under the conditions of object-orientated aggressive actions.

Full Text:



2020 Network Security and Accessibility Report, (date of access 16.02.2023)

2019 Data Breach Investigations Report, /reports/2019-data breach-investigations-report.pdf (date of access 16.02.2023)

Makarenko S. I. Audit of information security: main stages, conceptual framework, classification of measures // Control Systems, Communications and Security. 2018. vol 1. pp. 1–29.

Livshits II Modern practice of information security audit // Quality management. 2011. vol. 7. pp. 34–41.

Kulba V. V., Shelkov A. B., Gladkov Yu. M., Paveliev S. V. Monitoring and audit of information security of automated systems. Moscow: IPU im. V. A. Trapeznikova RAN, 2009. 94 p.

Markov A. S., Tsirlov V. L., Barabanov A. V. Methods for assessing the inconsistency of information security tools / ed. A. S. Markova. M.: Radio and communication, 2012. 192 p.

Voevodin V. A. Methods of audit and monitoring of the information security management system in terms of ensuring the protection of information in web applications // Modern research in the field of social, economic and technical sciences: monograph. N. Novgorod: NOO "Professional Science", 2021. pp. 8–44.

GOST R 51275–2006. Data protection. Informatization object. Factors affecting information. General provisions. M.: Standardization, 2018.

Voevodin V. A., Kovalev I. S., Folomeev L. A. Insurance of information risks as a tool for managing information protection. In. International CONFERENCE, 2019. Ser.: Scientific. conf. dedicated to Radio Day (issue LXXV). M.: Publishing House of Moscow. NTO radio engineering, electronics and communications them. A. S. Popova, 2020. pp. 152–155.

GOST R 59516-2021. Information Technology. Information security management. Information security risk insurance rules. Moscow: Standartinform, 2021. 20 p.

Statyev V.Yu. Information Security in the Big Data Space, DOI: 10.36724/2072-8735-2022-16-4-21-28

Big Data Security Concerns (date of access 16.02.2023)

Top 7 Big Data Security Issues and Their Solutions (date of access 16.02.2023)

Security of the information space in the context of big data. Kurbatsky V.A. In the collection: Comprehensive Protection of Information. Materials of the XXII scientific-practical conference. 2017. pp.250-253.

Popova A.V., Voronova Yu.S. Information security of personal data of citizens in the conditions of technologies "big data" ("big data"). Alley of Science. 2020. Vol. 1. pp. 683-686.

Problems of ensuring information security in big data management systems. Poltavtseva M.A. In the collection: XIII All-Russian meeting on the management of VSPU-2019. Proceedings of the XIII All-Russian Conference on Management Problems of the VSPU-2019. Institute of Management Problems. V.A. Trapeznikov RAS. 2019. pp. 2606-2611

Technologies of Big Data (Big Data) in the field of information security. Petrenko A.S., Petrenko S.A. In the collection: The 2018 Symposium on Cybersecurity of the Digital Economy (CDE'18). Second international scientific and technical conference, 2018, pp.248-255.

Korobov V. B. Teoriia i praktika ekspertnykh metodov: monografiia [Theory and practice of expert methods: monograph]. Moscow, INFRA-M Publ., 2019.

Big Data Facts 2012 Promotion of mobile applications ( (date of access 26.02.2023)


  • There are currently no refbacks.

Abava  Absolutech Convergent 2022

ISSN: 2307-8162