Mitigating Privacy and Security Risks in the Era of Big Data: A Comprehensive Framework of Best Practices and Protocols
- 1 Department of Computer Science, CVV Institute of Science and Technology, Kerala, India
- 2 Tata Consultancies Services, Kerala, India
- 3 Division of Information Technology, Cochin University of Science and Technology, Kerala, India
- 4 Department of Computer Science, Rajagiri School of Engineering and Technology, Kerala, India
Abstract
Addressing the intricate challenges of security and privacy in big data necessitates a focused research approach toward the development of innovative frameworks, protocols and algorithms. This study advocates for a heightened focus on advancing encryption technologies and methodologies to bolster data anonymization, thereby fortifying the protection of user information. Additionally, emphasis is placed on enhancing data access control mechanisms to create more robust systems, ensuring only authorized users can access and utilize data, thus strengthening defenses against unauthorized breaches. Furthermore, there is a critical need to establish clear ethical guidelines governing the responsible utilization of data resources within societal and legal frameworks. Proactive research initiatives are recommended to devise novel methods for the early detection and prevention of malicious activities within the big data landscape, thereby preserving data integrity and privacy effectively. This survey provides a thorough analysis, consolidating various strategies to address security concerns in big data under a unified framework. It comprehensively covers applications, factors affecting security, challenges faced and potential fixes. By highlighting the importance of securing networks from external influences or attacks, this study contributes to the advancement of a more secure and resilient big data ecosystem
DOI: https://doi.org/10.3844/jcssp.2024.1121.1145
Copyright: © 2024 Uma Narayanan, Nithin Puthiya Veettil, Ratheesh Thottungal Krishnankutty, Leya Elizabeth Sunny and Varghese Paul. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
- 988 Views
- 417 Downloads
- 0 Citations
Download
Keywords
- Big Data
- Access Method
- Security and Privacy
- Cryptography
- IoT