Analyzing the Big Data Security Through a Unified Decision-Making Approach

被引:37
作者
Attaallah, Abdulaziz [1 ]
Alsuhabi, Hassan [2 ]
Shukla, Sarita [3 ]
Kumar, Rajeev [3 ]
Gupta, Bineet Kumar [3 ]
Khan, Raees Ahmad [4 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Comp Sci, Jeddah 21589, Saudi Arabia
[2] Umm Al Qura Univ, Al Qunfudah Univ Coll, Dept Math, Mecca 24381, Saudi Arabia
[3] Shri Ramswaroop Mem Univ, Dept Comp Applicat, Barabanki 225003, India
[4] Babasaheb Bhimrao Ambedkar Univ, Dept Informat Technol, Lucknow 226025, Uttar Pradesh, India
关键词
Big data; ioT; security assessment; fuzzy AHP; SPECIAL SECTION; ANALYTICS; SOFTWARE;
D O I
10.32604/iasc.2022.022569
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The use of cloud services, web-based software systems, the Internet of Things (IoT), Machine Learning (ML), Artificial Intelligence (AI), and other wireless sensor devices in the health sector has resulted in significant advance-ments and benefits. Early disease detection, increased accessibility, and high diag-nostic reach have all been made possible by digital healthcare. Despite this remarkable achievement, healthcare data protection has become a serious issue for all parties involved. According to data breach statistics, the healthcare data industry is one of the major threats to cyber criminals. In reality, healthcare data breaches have increased at an alarming rate in recent years. Practitioners are developing a variety of tools, strategies, and approaches to solve healthcare data security concerns. The author has highlighted the crucial measurements and para-meters in relation to enormous organizational circumstances for securing a vast amount of data in this paper. Security measures are those that prevent developers and organizations from achieving their objectives. The goal of this work is to identify and prioritize the security approaches that are used to locate and solve problems using different versions of two approaches that have been used to ana-lyze big data security in the past. The Fuzzy Analytic Hierarchy Process (Fuzzy AHP) approach is being used by authors to examine the priorities and overall data security. In addition, the most important features in terms of weight have been quantitatively analyzed. Experts will discover the findings and conclusions useful in improving big data security.
引用
收藏
页码:1071 / 1088
页数:18
相关论文
共 26 条
  • [1] Abomhara M., 2015, Journal of Cyber Security and Mobility, P65, DOI [10.13052/jcsm2245-1439.414, DOI 10.13052/JCSM2245-1439.414]
  • [2] Evaluating the Usable-Security of Healthcare Software Through Unified Technique of Fuzzy Logic, ANP and TOPSIS
    Al-Zahrani, Fahad Ahmed
    [J]. IEEE ACCESS, 2020, 8 : 109905 - 109916
  • [3] [Anonymous], 2016, J GEOTECHNICAL TRANS
  • [4] P-STORE: Extension of STORE Methodology to Elicit Privacy Requirements
    Ansari, Md Tarique Jamal
    Baz, Abdullah
    Alhakami, Hosam
    Alhakami, Wajdi
    Kumar, Rajeev
    Khan, Raees Ahmad
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2021, 46 (09) : 8287 - 8310
  • [5] STORE: Security Threat Oriented Requirements Engineering Methodology
    Ansari, Md Tarique Jamal
    Pandey, Dhirendra
    Alenezi, Mamdouh
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (02) : 191 - 203
  • [6] Arulananda S., 2019, INT J SCI TECHNOLOGY, V8, P2277
  • [7] Guest Editorial Special Section on Cloud Computing, Edge Computing, Internet of Things, and Big Data Analytics Applications for Healthcare Industry 4.0
    Celesti, Antonio
    Amft, Oliver
    Villari, Massimo
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (01) : 454 - 456
  • [8] An Overview of Internet of Things (IoT) and Data Analytics in Agriculture: Benefits and Challenges
    Elijah, Olakunle
    Rahman, Tharek Abdul
    Orikumhi, Igbafe
    Leow, Chee Yen
    Hindia, M. H. D. Nour
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (05): : 3758 - 3773
  • [9] The rise of "big data" on cloud computing: Review and open research issues
    Hashem, Ibrahim Abaker Targio
    Yaqoob, Ibrar
    Anuar, Nor Badrul
    Mokhtar, Salimah
    Gani, Abdullah
    Khan, Samee Ullah
    [J]. INFORMATION SYSTEMS, 2015, 47 : 98 - 115
  • [10] Trends in big data analytics
    Kambatla, Karthik
    Kollias, Giorgos
    Kumar, Vipin
    Grama, Ananth
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2014, 74 (07) : 2561 - 2573