From: Secure big data ecosystem architecture: challenges and solutions
 | Solution mapping |
---|---|
Solutions | Â |
1.Communication security | 6 |
2. Architecture security | 1, 3, 4, 5, 6, 7, 10, 12, 15 |
3. User validation | 6 |
4. Encryption | 7, 9 |
5.Confidentiality | 6, 22 |
6.Access control | 3, 4, 21 |
7. Data anonymization | 4, 20 |
8.Privacy at social networks | 6, 17 |
9.Secure queries | 4 |
10. Secure data collection, storage and transaction logs | 3, 24 |
11.Policies, laws or governance | 13 |
12.Distributed sources of data | 11 |
13.Threat modeling/risk assessment | 1, 5, 14 |
14.Intrusion recognition | 13 |
15.Integrity | 10, 12 |
16.Recovery | 3, 6 |
17.User education | 5 |
18. Incorporate end point validation and response capabilities | 3, 4, 10 |
19. Granular audits | 10 |
20. Data transformation | 2, 7 |
21. Machine learning algorithms | 18 |
22. Differential privacy | 5, 7, 26 |
23.Storage of encrypted header information | 4 |
24.Provenance metadata | 7, 10 |
25. Latent data privacy | 7 |
26. Data-driven privacy preserving | 22,24 |
27. Data classification | 7,10,24 |