ACCENTS Transactions on Information Security (TIS) ISSN (P): 12222 ISSN (O): 2455-7196 Vol - 8, Issue - 31, July 2023
  1. 0
    Google Scholar
  2. 0
    Citation
  3. 0
    Impact Factor
A comprehensive exploration of data security challenges, advantages, and future prospects

Vikram Kumar Yadav and Adil Hashmi

Abstract

In the era of digital reliance, safeguarding sensitive information is paramount. This paper comprehensively investigates data security challenges, advantages, and future prospects. Analyzing literature from 2021 to 2023, it addresses the urgency to fortify digital infrastructures amidst escalating cyber threats. The paper's objective is to conduct an extensive review, providing insights into persistent challenges, breakthroughs, and identifying gaps. It contributes by synthesizing knowledge, shedding light on effective strategies, and serving as a catalyst for future research. The structured analysis covers advancements in data mining, cloud computing, network security, and emerging technologies, fostering a holistic understanding of data security dynamics.

Keyword

Data security, Cyber threats, digital infrastructure, Technology and Security.

Cite this article

Yadav VK, Hashmi A

Refference

[1][1]Hasan MK, Alkhalifah A, Islam S, Babiker NB, Habib AA, Aman AH, et al. Blockchain technology on smart grid, energy trading, and big data: security issues, challenges, and recommendations. Wireless Communications and Mobile Computing. 2022; 2022:1-26.

[2][2]Komljenovic J. The future of value in digitalised higher education: why data privacy should not be our biggest concern. Higher Education. 2022; 83(1):119-35.

[3][3]Zhang X, Zhang W, Sun W, Sun X, Jha SK. A robust 3-D medical watermarking based on wavelet transform for data protection. Computer Systems Science & Engineering. 2022; 41(3).

[4][4]Quach S, Thaichon P, Martin KD, Weaven S, Palmatier RW. Digital technologies: tensions in privacy and data. Journal of the Academy of Marketing Science. 2022; 50(6):1299-323.

[5][5]Vinoth S, Vemula HL, Haralayya B, Mamgain P, Hasan MF, Naved M. Application of cloud computing in banking and e-commerce and related security threats. Materials Today: Proceedings. 2022; 51:2172-5.

[6][6]Rathore MS, Poongodi M, Saurabh P, Lilhore UK, Bourouis S, Alhakami W et al. A novel trust-based security and privacy model for internet of vehicles using encryption and steganography. Computers and Electrical Engineering. 2022; 102:108205.

[7][7]Zhao Y, Chen J. A survey on differential privacy for unstructured data content. ACM Computing Surveys (CSUR). 2022; 54(10s):1-28.

[8][8]Naeem M, Jamal T, Diaz-Martinez J, Butt SA, Montesano N, Tariq MI, et al. Trends and future perspective challenges in big data. In advances in intelligent data analysis and applications: proceeding of the sixth euro-china conference on intelligent data analysis and applications, Arad, Romania 2022 (pp. 309-25). Springer Singapore.

[9][9]Deepa N, Pham QV, Nguyen DC, Bhattacharya S, Prabadevi B, Gadekallu TR, et al. A survey on blockchain for big data: Approaches, opportunities, and future directions. Future Generation Computer Systems. 2022; 131:209-26.

[10][10]Dash B, Ansari MF, Sharma P, Ali A. Threats and opportunities with ai-based cyber security intrusion detection: a review. International Journal of Software Engineering & Applications (IJSEA). 2022; 13(5).

[11][11]Mahajan HB, Rashid AS, Junnarkar AA, Uke N, Deshpande SD, Futane PR, et al. Integration of healthcare 4.0 and blockchain into secure cloud-based electronic health records systems. Applied Nanoscience. 2023; 13(3):2329-42.

[12][12]Sachdev P, Dubey AK. Novel number allotment method with UTNA (Unique Token Number Allocation) security system for mobile user. In international conference on devices, circuits and systems (ICDCS) 2012 (pp. 594-98). IEEE.

[13][13]Faiz M, Fatima N, Sandhu R, Kaur M, Narayan V. Improved homomorphic encryption for security in cloud using particle swarm optimization. Journal of Pharmaceutical Negative Results. 2022:4761-71.

[14][14]Sasubilli SM, Dubey AK, Kumar A. Hybrid security analysis based on intelligent adaptive learning in Big Data. In international conference on advances in computing and communication engineering (ICACCE) 2020 (pp. 1-5). IEEE.

[15][15]Paricherla M, Babu S, Phasinam K, Pallathadka H, Zamani AS, Narayan V, et al. Towards development of machine learning framework for enhancing security in internet of things. Security and Communication Networks. 2022; 2022.

[16][16]Butt SA, Jamal T, Azad MA, Ali A, Safa NS. A multivariant secure framework for smart mobile health application. Transactions on Emerging Telecommunications Technologies. 2022; 33(8):e3684.

[17][17]Ogbuke NJ, Yusuf YY, Dharma K, Mercangoz BA. Big data supply chain analytics: ethical, privacy and security challenges posed to business, industries and society. Production Planning & Control. 2022; 33(2-3):123-37.

[18][18]Seth B, Dalal S, Jaglan V, Le DN, Mohan S, Srivastava G. Integrating encryption techniques for secure data storage in the cloud. Transactions on Emerging Telecommunications Technologies. 2022; 33(4):e4108.

[19][19]Dubey AK. A review of blockchain cyber security. ACCENTS Transactions on Image Processing and Computer Vision. 2023; 9(24):1-8.

[20][20]Ma J, Naas SA, Sigg S, Lyu X. Privacy‐preserving federated learning based on multi‐key homomorphic encryption. International Journal of Intelligent Systems. 2022; 37(9):5880-901.

[21][21]Sasubilli SM, Dubey AK, Kumar A. A computational and analytical approach for cloud computing security with user data management. In international conference on advances in computing and communication engineering (ICACCE) 2020 (pp. 1-5). IEEE.

[22][22]Hasan MK, Ghazal TM, Saeed RA, Pandey B, Gohel H, Eshmawi AA, et al. A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things. IET Communications. 2022; 16(5):421-32.

[23][23]Das D, Bose P, Ruaro N, Kruegel C, Vigna G. Understanding security issues in the NFT ecosystem. In proceedings of the 2022 ACM SIGSAC conference on computer and communications security 2022 (pp. 667-81).

[24][24]Jijuan L, Lirong H, Miaohong X, Chi Z, Dewei L. The application of data mining and fusion technology in the security management of sensitive data in data center. In international conference on data science and computer application (ICDSCA) 2021 (pp. 464-7). IEEE.

[25][25]Wang F, Wang H, Xue L. Research on data security in big data cloud computing environment. In 5th advanced information technology, electronic and automation control conference (IAEAC) 2021 (pp. 1446-50). IEEE.

[26][26]Huang H, Li J. Research on network communication model and network security technology through big data. In international conference on data science and computer application (ICDSCA) 2021 (pp. 138-41). IEEE.

[27][27]Fan J, Xu Y, Ma J. Research on security classification and classification method of power grid data. In international conference on smart grid and smart cities (ICSGSC) 2022 (pp. 72-6). IEEE.

[28][28]Joshi A, Raturi A, Kumar S, Dumka A, Singh DP. Improved security and privacy in cloud data security and privacy: measures and attacks. In international conference on fourth industrial revolution based technology and practices (ICFIRTP) 2022 (pp. 230-3). IEEE.

[29][29]Josphineleela R, Kaliapp S, Natrayan L, Garg A. Big data security through privacy–preserving data mining (ppdm): a decentralization approach. In second international conference on electronics and renewable systems (ICEARS) 2023 (pp. 718-21). IEEE.

[30][30]Zhang X, Li F, Guo S, Pei Y, Zhang Y. Indoor location and data security of traffic flow based on fingerprint database filtering. In 3rd international conference on information technology, big data and artificial intelligence (ICIBA) 2023 (pp. 1006-9). IEEE.

[31][31]Yang H, Cao Y. Research on intelligent perception and supervision for data circulation security based on block-chain. In 8th international conference on cloud computing and big data analytics (ICCCBDA) 2023 (pp. 53-8). IEEE.

[32][32]Zhang X, Li F, Guo S, Pei Y, Zhang Y. Vehicle data security based on underground garage location--dead reckoning method. In 3rd international conference on information technology, big data and artificial intelligence (ICIBA) 2023 (pp. 1051-4). IEEE.

[33][33]Wang L, Qin Y, Li N. Research on security protection system under multi-party gathering technology of computer big data. In 3rd international conference on electronic technology, communication and information (ICETCI) 2023 (pp. 1286-9). IEEE.

[34][34]Hasan MZ, Hussain MZ, Mubarak Z, Siddiqui AA, Qureshi AM, Ismail I. Data security and Integrity in cloud computing. In international conference for advancement in technology (ICONAT) 2023 (pp. 1-5). IEEE.