From: Secure big data ecosystem architecture: challenges and solutions
 |  | Challenge mapping | ||||||||
---|---|---|---|---|---|---|---|---|---|---|
Challenges | Inference | Lack of consent | Social misuse of knowledge | Diverse sources of data | Multiple use of data | Storage and processing | Technology gap | Agreed data usage | Unauthorized access | Lack of governance |
Inference | Â | Â | Â | x | Â | Â | Â | Â | Â | Â |
Lack of consent | Â | Â | x | Â | x | Â | Â | x | x | x |
Social misuse of knowledge | Â | Â | Â | Â | Â | Â | Â | Â | Â | Â |
Diverse sources of data | Â | Â | Â | Â | Â | x | x | Â | Â | Â |
Multiple use of data | Â | x | x | Â | Â | Â | Â | Â | Â | Â |
Storage and processing | Â | Â | Â | Â | Â | Â | x | Â | Â | Â |
Technology gap | Â | Â | Â | Â | Â | x | Â | Â | x | Â |
Agreed data usage | Â | Â | Â | Â | Â | Â | Â | Â | x | x |
Unauthorized access | Â | Â | Â | Â | Â | x | Â | x | Â | x |
Lack of governance | x | Â | Â | Â | Â | Â | Â | x | Â | Â |
Data provenance | Â | x | Â | x | Â | x | Â | Â | Â | Â |