Skip to main content

Table 9 Identification of big data privacy and security challenges and their distribution in the literature

From: Secure big data ecosystem architecture: challenges and solutions

Challenge

Study

Frequency

Percentage

Inference

s9, s12, s16, s19, s21, s24, s28, s35, s40, s51, s52, s57, s58, s59, s64, s73, s79

17

22

Lack of consent

s7, s8, s9, s19, s24, s24, s29, s30, s50, s52, s56, s57, s59, s69

14

18

Social misuse of knowledge

s9, s18, s19, s24, s28, s44, s52, s64, s69

9

11

Diverse data sources

s2, s5, s8, s12, s28, s35, s36, s37, s38, s51, s55, s76

13

17

Multiple uses of data

s9, s13, s19, s24, s29, s30, s52, s56

8

10

Storage and processing

s13, s28, s63

2

3

Technology gap

s13, s24, s36, s38

4

5

Agreed data usage

s19, s29, s30

3

4

Unauthorized Access

s15, s21, s24, s26, s30, s33

6

8

Lack of governance

s1, s19, s21, s24, s25, s28, s29, s31, s38, s44, s61

11

14

Data provenance

s24, s26, s28, s33, s36, s40, s48, s54, s55, s57

9

12