From: Secure big data ecosystem architecture: challenges and solutions
DAMA knowledge area | Challenges | Solutions |
---|---|---|
Data governance | Privacy at social networks | Policies, laws and governance |
Data architecture | Timeliness, device heterogeneity | Architecture security |
Data modeling and design | Data deluge, inappropriate analytics, technology gap | Communication security, threat modeling/risk assessment, intrusion recognition |
Data storage and operations | Data storage and sharing, data collection, availability | Endpoint validation and response capabilities, secure queries, secure data collection, storage and transaction logs, distributed sources for data, data transformation, machine learning algorithms, data classification |
Data security | Privacy and security, confidentiality, lack of skills | Encryption, user validation, confidentiality, skills, differential privacy, latent data privacy, data-driven privacy preserving |
Data integration and interoperability | Data capture, data transfer | Â |
Documents and contents | Complexity, different data types and formats | Granular access control, data anonymization, granular audit, user education |
Reference and master data | Â | Recovery |
Data warehousing and business intelligence | Establishing a data-driven culture, cost/budget, organizational resistance | Â |
Metadata | Â | Storage of encryption header information, provenance metadata |
Data quality | Accuracy, incompleteness and inconsistency, vagueness | Â |