The Constrictor Knot of Big Data Security