Evaluating Security of Big Data Through Fuzzy Based Decision-Making Technique

被引:3
作者
Alassery, Fawaz [1 ]
Alzahrani, Ahmed [2 ]
Khan, Asif Irshad [2 ]
Sharma, Kanika [3 ]
Ahmad, Masood [4 ]
Khan, Raees Ahmad [4 ]
机构
[1] Taif Univ, Coll Comp & Informat Technol, Dept Comp Sci, POB 11099, Taif 21944, Saudi Arabia
[2] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Comp Sci, Jeddah 21589, Saudi Arabia
[3] Mangalmay Inst Engn & Technol, Dept Comp Applicat, Greater Noida 201310, Uttar Pradesh, India
[4] Babasaheb Bhimrao Ambedkar Univ, Dept Informat Technol, Lucknow 226025, Uttar Pradesh, India
来源
COMPUTER SYSTEMS SCIENCE AND ENGINEERING | 2023年 / 44卷 / 01期
关键词
Information security; big data; big data security life cycle; fuzzy AHP; ESTIMATING USABLE-SECURITY; SOFTWARE; TOPSIS; LOGIC; AHP; FRAMEWORK; SYSTEM; ANP;
D O I
10.32604/csse.2023.025796
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, it has been observed that the disclosure of information increases the risk of terrorism. Without restricting the accessibility of information, providing security is difficult. So, there is a demand for time to fill the gap between security and accessibility of information. In fact, security tools should be usable for improving the security as well as the accessibility of information. Though security and accessibility are not directly influenced, some of their factors are indirectly influenced by each other. Attributes play an important role in bridging the gap between security and accessibility. In this paper, we identify the key attributes of accessibility and security that impact directly and indirectly on each other, such as confidentiality, integrity, availability, and severity. The significance of every attribute on the basis of obtained weight is important for its effect on security during the big data security life cycle process. To calculate the proposed work, researchers utilised the Fuzzy Analytic Hierarchy Process (Fuzzy AHP). The findings show that the Fuzzy AHP is a very accurate mechanism for determining the best security solution in a real-time healthcare context. The study also looks at the rapidly evolving security technologies in healthcare that could help improve healthcare services and the future prospects in this area.
引用
收藏
页码:859 / 872
页数:14
相关论文
共 39 条
[1]  
Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
[2]   Evaluating the Usable-Security of Healthcare Software Through Unified Technique of Fuzzy Logic, ANP and TOPSIS [J].
Al-Zahrani, Fahad Ahmed .
IEEE ACCESS, 2020, 8 :109905-109916
[3]   P-STORE: Extension of STORE Methodology to Elicit Privacy Requirements [J].
Ansari, Md Tarique Jamal ;
Baz, Abdullah ;
Alhakami, Hosam ;
Alhakami, Wajdi ;
Kumar, Rajeev ;
Khan, Raees Ahmad .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2021, 46 (09) :8287-8310
[4]   Analyzing the Big Data Security Through a Unified Decision-Making Approach [J].
Attaallah, Abdulaziz ;
Alsuhabi, Hassan ;
Shukla, Sarita ;
Kumar, Rajeev ;
Gupta, Bineet Kumar ;
Khan, Raees Ahmad .
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 32 (02) :1071-1088
[5]   Development and validation of a measure of justice perception in the frame of Fairness theory - Fuzzy approach [J].
Azar, Adel ;
Darvishi, Zahra Alipour .
EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (06) :7364-7372
[6]   Multicenter patient records research: Security policies and tools [J].
Behlen, FM ;
Johnson, SB .
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 1999, 6 (06) :435-443
[7]  
Brickell J, 2009, LECT NOTES COMPUT SC, V5628, P128, DOI 10.1007/978-3-642-03549-4_8
[8]  
Bunn P, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P486
[9]  
Chan M., 2005, J INFORM PRIVACY SEC, V1, P18, DOI [10.1080/15536548.2005.10855772, DOI 10.1080/15536548.2005.10855772]
[10]   Multicriteria analysis with fuzzy pairwise comparison [J].
Deng, HP .
INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, 1999, 21 (03) :215-231