Skip to main content

Table 13 Mapping of challenges to the proposed solutions of privacy and security in big data ecosystems

From: Secure big data ecosystem architecture: challenges and solutions

Challenges

Solutions

Inference

Lack of Consent

Social misuse of knowledge

Diverse sources of data

Multiple use of data

Storage and processing

Technology gap

Agreed data usage

Unauthorized Access

Governance

Data Provenance

Communication security

   

x

 

x

x

    

Architecture security

   

x

       

User validation

   

x

x

  

x

   

Incorporate end point validation and response capabilities

   

x

x

      

Encryption

     

x

  

x

  

Confidentiality

       

x

   

Access control

       

x

   

Data anonymization

           

Privacy at social networks

x

 

x

        

Secure queries

     

x

  

x

  

Secure data collection, storage, and transaction logs

     

x

     

Policies, laws or governance

x

 

x

 

x

    

x

 

Distributed sources of data

     

x

     

Threat modeling

      

x

    

Granular audits

  

x

     

x

  

Attack detection

           

Integrity

   

x

x

x

     

Recovery

   

x

       

User education

 

x

x

      

x

 

Data transformation

x

    

x

     

Machine learning algorithms

        

x

  

Differential privacy

x

       

x

  

Storage of encrypted header Information

     

x

x

    

x

Provenance metadata

 

x

   

x

    

x

Latent data privacy

  

x

 

x

x

     

Data-driven privacy preserving

  

x

    

x

x

  

Data classification

       

x

x

x

x