Adaptive Cyber Secure Software Engineering Practices for Big Data Platforms With Dynamic Access Control and Differential Privacy Mechanisms
Keywords:
Adaptive Security, Dynamic Access, Differential Privacy, Big Data, Cybersecurity FrameworksAbstract
Big data platforms face significant challenges related to cybersecurity and privacy due to the vast volume, variety, and velocity of data they manage. Traditional static security measures often fail to address the dynamic and complex nature of big data environments. This research proposes an adaptive cybersecurity framework that integrates dynamic access control and differential privacy mechanisms to enhance both the security and privacy of big data platforms. The dynamic access control mechanism continuously adjusts access permissions in real-time based on changing risk and trust levels, ensuring that sensitive data remains secure even as user roles and data flows evolve. The differential privacy mechanism adds noise to data, preserving individual privacy while allowing for meaningful data analysis. Through simulations and case studies, the framework was evaluated in various real-world environments, including healthcare, IoT, and finance, where it demonstrated scalability, efficiency, and robust security performance. The results showed that the proposed framework significantly reduced unauthorized access attempts and maintained data privacy, while still enabling effective data analysis. Although there were some challenges regarding performance overhead, particularly in resource-constrained environments, the framework remained effective in large-scale systems. The findings highlight the importance of adaptive security practices in big data environments and suggest that future research should focus on refining dynamic security mechanisms and applying differential privacy in diverse real-world scenarios. These advancements are essential for ensuring that big data platforms can handle evolving cyber threats without compromising data utility or privacy.
References
[1] O. Normurodov, M. A. Al-Absi, A. A. Al-Absi, and M. Sain, “Cyber Security Challenges of Big Data Applications in Cloud Computing: A State of the Art,” Lect. Notes Networks Syst., vol. 395, pp. 12 – 23, 2022, doi: 10.1007/978-981-16-9480-6_2.
[2] E. Bertino and E. Ferrari, “Big data security and privacy,” Stud. Big Data, vol. 31, pp. 425 – 439, 2018, doi: 10.1007/978-3-319-61893-7_25.
[3] D. Wang, W. Zhao, and Z. Ding, “Review of Big Data Security Critical Technologies,” Beijing Gongye Daxue Xuebao/Journal Beijing Univ. Technol., vol. 43, no. 3, pp. 335 – 349, 2017, doi: 10.11936/bjutxb2016020025.
[4] A. Fashakh and H. Abddulkader, “Big Data and Cybersecurity: A Review of Key Privacy and Security Challenges,” in Proceedings - 2022 International Conference on Artificial Intelligence of Things, ICAIoT 2022, 2022. doi: 10.1109/ICAIoT57170.2022.10121822.
[5] R. Kang et al., “ABase: the Multi-Tenant NoSQL Serverless Database for Diverse and Dynamic Workloads in Large-scale Cloud Environments,” in Proceedings of the ACM SIGMOD International Conference on Management of Data, 2025, pp. 471 – 484. doi: 10.1145/3722212.3724426.
[6] F. A. Alaba and A. Rocha, “Malware Detection on Smart Wearables Using Machine Learning Algorithms,” Stud. Syst. Decis. Control, vol. 549, pp. 1 – 130, 2025, doi: 10.1007/978-3-031-65933-1.
[7] N. Srivastava and U. C. Jaiswal, “Big data analytics technique in cyber security: A review,” in Proceedings of the 3rd International Conference on Computing Methodologies and Communication, ICCMC 2019, 2019, pp. 579 – 585. doi: 10.1109/ICCMC.2019.8819634.
[8] A. K. Sharma, A. Joshi, and A. Singh, “Big data privacy: Emerging issues in current era,” in Applications of Artificial Intelligence in 5G and Internet of Things - Proceedings of the 1st International Conference on Applications of AI in 5G and IOT, ICAAI5GI 2024, 2025, pp. 255 – 259. doi: 10.1201/9781003532521-47.
[9] L. Xu and W. Shi, Security theories and practices for big data. 2016. doi: 10.1007/978-3-319-27763-9_4.
[10] N. Akhmedova and D. Mirzaev, “Attribute Based Access Control Method in Big Data Technologies,” in ACM International Conference Proceeding Series, 2025, pp. 459 – 464. doi: 10.1145/3726122.3726188.
[11] J. B. Madavarapu, R. K. Yalamanchili, and R. C. B. Madavarapu, “Enhancing Access Control Mechanisms for Data Stored in Cloud Computing,” in Proceedings - 2024 5th International Conference on Mobile Computing and Sustainable Informatics, ICMCSI 2024, 2024, pp. 766 – 773. doi: 10.1109/ICMCSI61536.2024.00119.
[12] V. Vijayalakshmi, N. Saxena, G. Prasadu, K. Gulati, R. Nagaraju, and S. Choubey, Guardians of the Cyber Realm: How Computational Intelligence Defends? 2025. doi: 10.1201/9781998511013-8.
[13] M. Anisetti, C. A. Ardagna, C. Braghin, E. Damiani, A. Polimeno, and A. Balestrucci, “Dynamic and scalable enforcement of access control policies for big data,” in ACM International Conference Proceeding Series, 2021, pp. 71 – 78. doi: 10.1145/3444757.3485107.
[14] X. Meng and X. Zhang, “Big Data Privacy Management: A Vision Paper,” in Proceedings - 2020 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2020, 2020, pp. 40 – 45. doi: 10.1109/TPS-ISA50397.2020.00016.
[15] R. Sankar, T. Alwin Christopher, W. A. Daden, M. Miruthula, M. Vaishali, and G. Rajan Kirthy, “Cybersecurity Enabled Improved BigData Privacy Management Measures to Preserve Information With Privacy Concerns,” in Proceedings of 9th International Conference on Science, Technology, Engineering and Mathematics: The Role of Emerging Technologies in Digital Transformation, ICONSTEM 2024, 2024. doi: 10.1109/ICONSTEM60960.2024.10568845.
[16] N. Metoui and M. Bezzi, “Differential privacy based access control,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 10033 LNCS, pp. 962 – 974, 2016, doi: 10.1007/978-3-319-48472-3_61.
[17] Y. Yan, L. X. Zhang, B. Q. Wang, and X. Gao, “Location big data differential privacy dynamic partition release method,” Int. J. Secur. Networks, vol. 15, no. 1, pp. 25 – 35, 2020, doi: 10.1504/IJSN.2020.106505.
[18] Y. Qi, Y. Tang, and C. K. Ahn, “Dual-differential privacy-preserving under switching control: A novel approach to improve privacy,” Automatica, vol. 183, 2026, doi: 10.1016/j.automatica.2025.112667.
[19] T. V. Kenekar and A. R. Dani, Privacy preserving data mining on unstructured data. 2017. doi: 10.4018/978-1-5225-2486-1.ch008.
[20] B. B. Jayasingh, M. R. Patra, and D. B. Mahesh, “Security issues and challenges of big data analytics and visualization,” in Proceedings of the 2016 2nd International Conference on Contemporary Computing and Informatics, IC3I 2016, 2016, pp. 204 – 208. doi: 10.1109/IC3I.2016.7917961.
[21] H. Lanying, X. Zenggang, Z. Xuemin, W. Guangwei, and Y. Conghuan, “Research and practice of dataRBAC-based big data privacy protection,” Open Cybern. Syst. J., vol. 9, pp. 669 – 673, 2015, doi: 10.2174/1874110X01509010669.
[22] Y. Zhu and F. Xu, “Application Research on Blockchain Based Access Control,” in Proceedings - 2021 2nd International Conference on Computer Science and Management Technology, ICCSMT 2021, 2021, pp. 530 – 534. doi: 10.1109/ICCSMT54525.2021.00105.
[23] X. Yao, X. Zhou, and J. Ma, “Differential Privacy of Big Data: An Overview,” in Proceedings - 2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016, 2016, pp. 7 – 12. doi: 10.1109/BigDataSecurity-HPSC-IDS.2016.9.
[24] Y. Fu, Y. Yu, and X. Wu, “Differential privacy protection technology and its application in big data environment; [大数据环境下差分隐私保护技术及应用],” Tongxin Xuebao/Journal Commun., vol. 40, no. 10, pp. 157 – 168, 2019, doi: 10.11959/j.issn.1000-436x.2019209.
[25] P. Protivash, J. Durrell, D. Kifer, Z. Ding, and D. Zhang, “RECONSTRUCTION ATTACKS ON AGGRESSIVE RELAXATIONS OF DIFFERENTIAL PRIVACY,” J. Priv. Confidentiality, vol. 14, no. 3, pp. 1 – 33, 2024, doi: 10.29012/jpc.871.
[26] H. Maulid and M. Rosmiati, “Bridging the Gap: A Messaging App Simulation for Comprehending Differential Privacy,” in Proceedings - 2023 IEEE 7th International Conference on Information Technology, Information Systems and Electrical Engineering, ICITISEE 2023, 2023, pp. 186 – 190. doi: 10.1109/ICITISEE58992.2023.10405153.
[27] S. Boudko and H. Abie, “Adaptive Cybersecurity Framework for Healthcare Internet of Things,” in International Symposium on Medical Information and Communication Technology, ISMICT, 2019. doi: 10.1109/ISMICT.2019.8743905.
[28] R. Motupalli, A. Sreedevi, K. Sandhya, A. Geetha, and V. Surya Narayana Reddy, “A Novel Machine Level Computation of Enhancing IoT Cybersecurity Logics with the Scalable and Robust Coral Matrix Security Framework,” J. Mach. Comput., vol. 5, no. 4, pp. 2643 – 2660, 2025, doi: 10.53759/7669/jmc202505203.
[29] K. Omar, J. Zraqou, W. Alkhadour, and J. M. Gómez, Evolving sentinels: How autonomous defense systems self-learn and adapt to dynamic threat environments. 2025. doi: 10.4018/979-8-3373-0954-5.ch009.
[30] S. S. Sefati, B. Arasteh, S. Halunga, and O. Fratu, “A comprehensive survey of cybersecurity techniques based on quality of service (QoS) on the Internet of Things (IoT),” Cluster Comput., vol. 28, no. 12, 2025, doi: 10.1007/s10586-025-05449-z.
[31] R. Verma and M. Jailia, “SDN-enabled adaptive security framework for multi-cloud infrastructures using deep learning-based threat detection and policy management,” PeerJ Comput. Sci., vol. 11, 2025, doi: 10.7717/peerj-cs.3266.
[32] K. R. Ahmed et al., “AI-Enhanced Adaptive Network Security for 6G and Edge Computing,” in 2025 IEEE International Conference on Quantum Photonics, Artificial Intelligence, and Networking, QPAIN 2025, 2025. doi: 10.1109/QPAIN66474.2025.11172162.


