From: Secure big data ecosystem architecture: challenges and solutions
Challenges | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Solutions | Inference | Lack of Consent | Social misuse of knowledge | Diverse sources of data | Multiple use of data | Storage and processing | Technology gap | Agreed data usage | Unauthorized Access | Governance | Data Provenance |
Communication security | Â | Â | Â | x | Â | x | x | Â | Â | Â | Â |
Architecture security | Â | Â | Â | x | Â | Â | Â | Â | Â | Â | Â |
User validation | Â | Â | Â | x | x | Â | Â | x | Â | Â | Â |
Incorporate end point validation and response capabilities | Â | Â | Â | x | x | Â | Â | Â | Â | Â | Â |
Encryption | Â | Â | Â | Â | Â | x | Â | Â | x | Â | Â |
Confidentiality | Â | Â | Â | Â | Â | Â | Â | x | Â | Â | Â |
Access control | Â | Â | Â | Â | Â | Â | Â | x | Â | Â | Â |
Data anonymization | Â | Â | Â | Â | Â | Â | Â | Â | Â | Â | Â |
Privacy at social networks | x | Â | x | Â | Â | Â | Â | Â | Â | Â | Â |
Secure queries | Â | Â | Â | Â | Â | x | Â | Â | x | Â | Â |
Secure data collection, storage, and transaction logs | Â | Â | Â | Â | Â | x | Â | Â | Â | Â | Â |
Policies, laws or governance | x | Â | x | Â | x | Â | Â | Â | Â | x | Â |
Distributed sources of data | Â | Â | Â | Â | Â | x | Â | Â | Â | Â | Â |
Threat modeling | Â | Â | Â | Â | Â | Â | x | Â | Â | Â | Â |
Granular audits | Â | Â | x | Â | Â | Â | Â | Â | x | Â | Â |
Attack detection | Â | Â | Â | Â | Â | Â | Â | Â | Â | Â | Â |
Integrity | Â | Â | Â | x | x | x | Â | Â | Â | Â | Â |
Recovery | Â | Â | Â | x | Â | Â | Â | Â | Â | Â | Â |
User education | Â | x | x | Â | Â | Â | Â | Â | Â | x | Â |
Data transformation | x | Â | Â | Â | Â | x | Â | Â | Â | Â | Â |
Machine learning algorithms | Â | Â | Â | Â | Â | Â | Â | Â | x | Â | Â |
Differential privacy | x | Â | Â | Â | Â | Â | Â | Â | x | Â | Â |
Storage of encrypted header Information | Â | Â | Â | Â | Â | x x | Â | Â | Â | Â | x |
Provenance metadata | Â | x | Â | Â | Â | x | Â | Â | Â | Â | x |
Latent data privacy | Â | Â | x | Â | x | x | Â | Â | Â | Â | Â |
Data-driven privacy preserving | Â | Â | x | Â | Â | Â | Â | x | x | Â | Â |
Data classification | Â | Â | Â | Â | Â | Â | Â | x | x | x | x |