2022
DOI: 10.1109/access.2022.3144632
|View full text |Cite
|
Sign up to set email alerts
|

Towards Big Data Security Framework by Leveraging Fragmentation and Blockchain Technology

Abstract: The world is facing a growth in the amount and variety of data generated by both users and machines. Despite the exponential increases, the tools and technologies developed to manage these data volumes are not intended to meet security and data protection requirements. Additionally, most of the current big data security systems are offered by a centralized third party, which is vulnerable to many security threats. Blockchain technology plays a significant role by addressing modern technology concerns such as d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 36 publications
0
5
0
Order By: Relevance
“…As the architecture and functionalities of cloud services have evolved, so have the security challenges and solutions [16,17,18]. Existing models have sought to address various aspects, from data integrity and confidentiality to secure access and trust levels [19,20]. This section provides a comprehensive review of the existing models designed to enhance the security of cloud deployments, exploring their methods, merits, and drawbacks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…As the architecture and functionalities of cloud services have evolved, so have the security challenges and solutions [16,17,18]. Existing models have sought to address various aspects, from data integrity and confidentiality to secure access and trust levels [19,20]. This section provides a comprehensive review of the existing models designed to enhance the security of cloud deployments, exploring their methods, merits, and drawbacks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Alhazmi et al [9] proposed a big data security framework by using blockchain technology and combining fragmentation, encryption, and access control technology to encrypt and protect all process data and realize data security protection. The disadvantage of the scheme is that it has high computational overhead and does not provide an interface for users to access.…”
Section: Related Workmentioning
confidence: 99%
“…First step: checking timestamps t s and service expiration time of the pid i The bcBIM model ensures data tracking, authentication, and tamper prevention It is only applicable to the analysis of building information modeling, and its universality is not strong Alhazmi et al (2022) [9] Fully ensure the security of data The computational overhead is large, and there is no interface for user access…”
Section: Pairhand System Initialization and Usermentioning
confidence: 99%
See 2 more Smart Citations