Review of the Mechanisms Used to Protect the Big Data from Attacks | IEEE Conference Publication | IEEE Xplore