Skip to main content
Erschienen in: Wireless Personal Communications 3/2022

24.08.2021

Implementing Integrity Assurance System for Big Data

verfasst von: Fawaz Alyami, Saad Almutairi

Erschienen in: Wireless Personal Communications | Ausgabe 3/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The computation of big data and related services has been the topic of research and popular applications due to the rapid progress of big data technology and statistical data analysis solutions. There are several issues with data quality that contribute to error decisions in organizations and institutions. Current research just covers how to adequately validate data to assure its validity. Data integrity is synonymous with data validity. It is a difficult undertaking that is often performed by national statistics organizations and institutes. There is a significant need to provide a general system for validating the big data integrity. This approach has been dedicated to presenting a model for data integrity, particularly big data, and how to solve the validation process. The data also comprises the validity of the data fields, as well as the validity of measuring the data and determining compliance with the data cycle chain. For the integrity of large data, the processing speed and accuracy of the verification process are taken into account. The research was based on the Python programming language and real test data, and it was based on the use of the most recent technologies and programming languages.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kim, G.-H., Trimi, S., & Chung, J.-H. (2014). Big-data applications in the Government sector. Communications of the ACM, 57(3), 78–85.CrossRef Kim, G.-H., Trimi, S., & Chung, J.-H. (2014). Big-data applications in the Government sector. Communications of the ACM, 57(3), 78–85.CrossRef
2.
Zurück zum Zitat Nath, A. (2015). Big data security issues and challenges. International Journal of Innovative Research in Advanced Engineering (IJIRAE), 2(2), 15–20. Nath, A. (2015). Big data security issues and challenges. International Journal of Innovative Research in Advanced Engineering (IJIRAE), 2(2), 15–20.
3.
Zurück zum Zitat Inukollu, V. N., Arsi, S., & Ravuri, S. R. (2014). Security Issues associated with big data in cloud computing. International Journal of Network Security & Its Applications (IJNSA), 6(3), 45–56.CrossRef Inukollu, V. N., Arsi, S., & Ravuri, S. R. (2014). Security Issues associated with big data in cloud computing. International Journal of Network Security & Its Applications (IJNSA), 6(3), 45–56.CrossRef
4.
Zurück zum Zitat Lebdaoui, S. El Hajji and Orhanou, G., "Managing big data integrity," in 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, Morocco, 2016. Lebdaoui, S. El Hajji and Orhanou, G., "Managing big data integrity," in 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, Morocco, 2016.
5.
Zurück zum Zitat Liu, C., Ranjan, R., Zhang, X., Yang, C, Georgakopoulos, D, and Chen, J. (2013) "Public Auditing for Big Data Storage in Cloud Computing - A Survey," 2013 IEEE 16th International Conference on Computational Science and Engineering. Liu, C., Ranjan, R., Zhang, X., Yang, C, Georgakopoulos, D, and Chen, J. (2013) "Public Auditing for Big Data Storage in Cloud Computing - A Survey," 2013 IEEE 16th International Conference on Computational Science and Engineering.
6.
Zurück zum Zitat Demchenko, Y., Membrey, C. de Laat, P., and Grosso, P., (2013) “Addressing Big Data Issues in Scientific Data Infrastructure,” in 2013 International Conference on Collaboration Technologies and Systems (CTS), San Diego, CA, USA. Demchenko, Y., Membrey, C. de Laat, P., and Grosso, P., (2013) “Addressing Big Data Issues in Scientific Data Infrastructure,” in 2013 International Conference on Collaboration Technologies and Systems (CTS), San Diego, CA, USA.
7.
Zurück zum Zitat Lagoze, C. (2014). “Big Data, data integrity, and the fracturing of the control zone.” Big Data & Society, 1–11. Lagoze, C. (2014). “Big Data, data integrity, and the fracturing of the control zone.” Big Data & Society, 1–11.
8.
Zurück zum Zitat Sing, A. P., & Pasupuleti, S. K. (2016). Optimized public auditing and data dynamics for data storage security in cloud computing. Procedia Computer Science, 93, 751–759.CrossRef Sing, A. P., & Pasupuleti, S. K. (2016). Optimized public auditing and data dynamics for data storage security in cloud computing. Procedia Computer Science, 93, 751–759.CrossRef
9.
Zurück zum Zitat Liu, B., Yu, X. L., Chen, S., Xu, X., and Zhu, L., (2017) "Blockchain-Based Data Integrity Service Framework for IoT Data," 2017 IEEE International Conference on Web Services (ICWS), pp. 468–475. Liu, B., Yu, X. L., Chen, S., Xu, X., and Zhu, L., (2017) "Blockchain-Based Data Integrity Service Framework for IoT Data," 2017 IEEE International Conference on Web Services (ICWS), pp. 468–475.
10.
Zurück zum Zitat Li, Y., Yu, Y., Min, G., Susilo, W., Ni, J., & Choo, K.-K.R. (2019). Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Transactions on Dependable and Secure Computing, 16(1), 72–83.CrossRef Li, Y., Yu, Y., Min, G., Susilo, W., Ni, J., & Choo, K.-K.R. (2019). Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Transactions on Dependable and Secure Computing, 16(1), 72–83.CrossRef
11.
Zurück zum Zitat Iarocci, N., "Cerberus," 2016. [Online]. Available: python-cerberus.org. Iarocci, N., "Cerberus," 2016. [Online]. Available: python-cerberus.org.
13.
Zurück zum Zitat Mantzoukas, K., Kloukinas, C., & Spanoudakis, G. (2018). Monitoring Data Integrity in Big Data Analytics Services. IEEE 11th International Conference on Cloud Computing (CLOUD) (pp. 904–907). IEEE. Mantzoukas, K., Kloukinas, C., & Spanoudakis, G. (2018). Monitoring Data Integrity in Big Data Analytics Services. IEEE 11th International Conference on Cloud Computing (CLOUD) (pp. 904–907). IEEE.
14.
Zurück zum Zitat Mukhtaj, K., Maozhen, L., Phillip, A., Gareth, T., & Junyong, L. (2014). Big Data Analytics on PMU Measurements. 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). IEEE, 2014. p. 715–719. Mukhtaj, K., Maozhen, L., Phillip, A., Gareth, T., & Junyong, L. (2014). Big Data Analytics on PMU Measurements. 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). IEEE, 2014. p. 715–719.
15.
Zurück zum Zitat Peng, S., Zhou, F., & Wang, Q. (2017). Identity-based public multi-replica provable data possession. IEEE Access, 5, 26990–27001.CrossRef Peng, S., Zhou, F., & Wang, Q. (2017). Identity-based public multi-replica provable data possession. IEEE Access, 5, 26990–27001.CrossRef
16.
Zurück zum Zitat Sookhak, M., Yu, F. R., & Zomaya, A. Y. (2018). Auditing big data storage in cloud computing using divide and conquer tables. IEEE Trans Parallel Distr. Syst, 29(5), 999–1012.CrossRef Sookhak, M., Yu, F. R., & Zomaya, A. Y. (2018). Auditing big data storage in cloud computing using divide and conquer tables. IEEE Trans Parallel Distr. Syst, 29(5), 999–1012.CrossRef
17.
Zurück zum Zitat Yin, S. (2020). Research on the detection algorithm of data integrity verification results in big data storage. J Phys: Conf Ser., 1574, 012008. Yin, S. (2020). Research on the detection algorithm of data integrity verification results in big data storage. J Phys: Conf Ser., 1574, 012008.
18.
Zurück zum Zitat Rai, S., & Sharma, A. (2020). Research perspective on security-based algorithm in big data concepts. International Journal of Engineering and Advanced Technology, 9(3), 2138–2143.CrossRef Rai, S., & Sharma, A. (2020). Research perspective on security-based algorithm in big data concepts. International Journal of Engineering and Advanced Technology, 9(3), 2138–2143.CrossRef
23.
Zurück zum Zitat Manimurugan, S., Almutairi, S., Mohammed Aborokbah, M., Ganesan, N. C. S., & Patan, R. (2020). Effective attack detection in internet of things smart environment using deep belief neural network. IEEE Access., 8, 77396–77404.CrossRef Manimurugan, S., Almutairi, S., Mohammed Aborokbah, M., Ganesan, N. C. S., & Patan, R. (2020). Effective attack detection in internet of things smart environment using deep belief neural network. IEEE Access., 8, 77396–77404.CrossRef
25.
Zurück zum Zitat Al-Mutairi, S., & Manimurugan, S. (2017). The clandestine image transmission scheme to prevent from the intruders. International Journal of Advanced and Applied Sciences, 4(2), 52–60.CrossRef Al-Mutairi, S., & Manimurugan, S. (2017). The clandestine image transmission scheme to prevent from the intruders. International Journal of Advanced and Applied Sciences, 4(2), 52–60.CrossRef
26.
Zurück zum Zitat Manimurugan, S., & Mutari, S. A. (2017). A novel secret image hiding technique for secure transmission. Journal of Theoretical and Applied Information Technology, 95(1), 166–176. Manimurugan, S., & Mutari, S. A. (2017). A novel secret image hiding technique for secure transmission. Journal of Theoretical and Applied Information Technology, 95(1), 166–176.
27.
Zurück zum Zitat Manimurugan, S., & Narmatha, C. (2015). Secure and efficient medical image transmission by new tailored visual cryptography scheme with LS compressions. International Journal of Digital Crime and Forensics (IJDCF), 7(1), 26–50.CrossRef Manimurugan, S., & Narmatha, C. (2015). Secure and efficient medical image transmission by new tailored visual cryptography scheme with LS compressions. International Journal of Digital Crime and Forensics (IJDCF), 7(1), 26–50.CrossRef
28.
Zurück zum Zitat Manimurugan, S., Porkumaran, K., & Narmatha, C. (2014). The new block pixel sort algorithm for TVC encrypted medical image. Imaging Science Journal., 62(8), 403–414.CrossRef Manimurugan, S., Porkumaran, K., & Narmatha, C. (2014). The new block pixel sort algorithm for TVC encrypted medical image. Imaging Science Journal., 62(8), 403–414.CrossRef
Metadaten
Titel
Implementing Integrity Assurance System for Big Data
verfasst von
Fawaz Alyami
Saad Almutairi
Publikationsdatum
24.08.2021
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2022
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-09013-x

Weitere Artikel der Ausgabe 3/2022

Wireless Personal Communications 3/2022 Zur Ausgabe