Skip to main content

Table 12 Mapping of solution to the challenges for privacy and security in the big data ecosystem

From: Secure big data ecosystem architecture: challenges and solutions

 

Solution mapping

Solutions

 

1.Communication security

6

2. Architecture security

1, 3, 4, 5, 6, 7, 10, 12, 15

3. User validation

6

4. Encryption

7, 9

5.Confidentiality

6, 22

6.Access control

3, 4, 21

7. Data anonymization

4, 20

8.Privacy at social networks

6, 17

9.Secure queries

4

10. Secure data collection, storage and transaction logs

3, 24

11.Policies, laws or governance

13

12.Distributed sources of data

11

13.Threat modeling/risk assessment

1, 5, 14

14.Intrusion recognition

13

15.Integrity

10, 12

16.Recovery

3, 6

17.User education

5

18. Incorporate end point validation and response capabilities

3, 4, 10

19. Granular audits

10

20. Data transformation

2, 7

21. Machine learning algorithms

18

22. Differential privacy

5, 7, 26

23.Storage of encrypted header information

4

24.Provenance metadata

7, 10

25. Latent data privacy

7

26. Data-driven privacy preserving

22,24

27. Data classification

7,10,24