(Publisher of Peer Reviewed Open Access Journals)

ACCENTS Transactions on Information Security (TIS)

ISSN (Print):XXXX    ISSN (Online):2455-7196
Volume-8 Issue-31 July-2023
Full-Text PDF
Paper Title : A comprehensive exploration of data security challenges, advantages, and future prospects
Author Name : Vikram Kumar Yadav and Adil Hashmi
Abstract :

In the era of digital reliance, safeguarding sensitive information is paramount. This paper comprehensively investigates data security challenges, advantages, and future prospects. Analyzing literature from 2021 to 2023, it addresses the urgency to fortify digital infrastructures amidst escalating cyber threats. The paper's objective is to conduct an extensive review, providing insights into persistent challenges, breakthroughs, and identifying gaps. It contributes by synthesizing knowledge, shedding light on effective strategies, and serving as a catalyst for future research. The structured analysis covers advancements in data mining, cloud computing, network security, and emerging technologies, fostering a holistic understanding of data security dynamics.

Keywords : Data security, Cyber threats, digital infrastructure, Technology and Security.
Cite this article : Yadav VK, Hashmi A. A comprehensive exploration of data security challenges, advantages, and future prospects . ACCENTS Transactions on Information Security. 2023; 8 (31): 13-18. DOI:10.19101/TIS.2023.829004.
References :
[1]Hasan MK, Alkhalifah A, Islam S, Babiker NB, Habib AA, Aman AH, et al. Blockchain technology on smart grid, energy trading, and big data: security issues, challenges, and recommendations. Wireless Communications and Mobile Computing. 2022; 2022:1-26.
[Crossref] [Google Scholar]
[2]Komljenovic J. The future of value in digitalised higher education: why data privacy should not be our biggest concern. Higher Education. 2022; 83(1):119-35.
[Crossref] [Google Scholar]
[3]Zhang X, Zhang W, Sun W, Sun X, Jha SK. A robust 3-D medical watermarking based on wavelet transform for data protection. Computer Systems Science & Engineering. 2022; 41(3).
[Crossref] [Google Scholar]
[4]Quach S, Thaichon P, Martin KD, Weaven S, Palmatier RW. Digital technologies: tensions in privacy and data. Journal of the Academy of Marketing Science. 2022; 50(6):1299-323.
[Crossref] [Google Scholar]
[5]Vinoth S, Vemula HL, Haralayya B, Mamgain P, Hasan MF, Naved M. Application of cloud computing in banking and e-commerce and related security threats. Materials Today: Proceedings. 2022; 51:2172-5.
[Google Scholar]
[6]Rathore MS, Poongodi M, Saurabh P, Lilhore UK, Bourouis S, Alhakami W et al. A novel trust-based security and privacy model for internet of vehicles using encryption and steganography. Computers and Electrical Engineering. 2022; 102:108205.
[Crossref] [Google Scholar]
[7]Zhao Y, Chen J. A survey on differential privacy for unstructured data content. ACM Computing Surveys (CSUR). 2022; 54(10s):1-28.
[Crossref] [Google Scholar]
[8]Naeem M, Jamal T, Diaz-Martinez J, Butt SA, Montesano N, Tariq MI, et al. Trends and future perspective challenges in big data. In advances in intelligent data analysis and applications: proceeding of the sixth euro-china conference on intelligent data analysis and applications, Arad, Romania 2022 (pp. 309-25). Springer Singapore.
[Google Scholar]
[9]Deepa N, Pham QV, Nguyen DC, Bhattacharya S, Prabadevi B, Gadekallu TR, et al. A survey on blockchain for big data: Approaches, opportunities, and future directions. Future Generation Computer Systems. 2022; 131:209-26.
[Crossref] [Google Scholar]
[10]Dash B, Ansari MF, Sharma P, Ali A. Threats and opportunities with ai-based cyber security intrusion detection: a review. International Journal of Software Engineering & Applications (IJSEA). 2022; 13(5).
[Google Scholar]
[11]Mahajan HB, Rashid AS, Junnarkar AA, Uke N, Deshpande SD, Futane PR, et al. Integration of healthcare 4.0 and blockchain into secure cloud-based electronic health records systems. Applied Nanoscience. 2023; 13(3):2329-42.
[Crossref] [Google Scholar]
[12]Sachdev P, Dubey AK. Novel number allotment method with UTNA (Unique Token Number Allocation) security system for mobile user. In international conference on devices, circuits and systems (ICDCS) 2012 (pp. 594-98). IEEE.
[Crossref] [Google Scholar]
[13]Faiz M, Fatima N, Sandhu R, Kaur M, Narayan V. Improved homomorphic encryption for security in cloud using particle swarm optimization. Journal of Pharmaceutical Negative Results. 2022:4761-71.
[Crossref] [Google Scholar]
[14]Sasubilli SM, Dubey AK, Kumar A. Hybrid security analysis based on intelligent adaptive learning in Big Data. In international conference on advances in computing and communication engineering (ICACCE) 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[15]Paricherla M, Babu S, Phasinam K, Pallathadka H, Zamani AS, Narayan V, et al. Towards development of machine learning framework for enhancing security in internet of things. Security and Communication Networks. 2022; 2022.
[Crossref] [Google Scholar]
[16]Butt SA, Jamal T, Azad MA, Ali A, Safa NS. A multivariant secure framework for smart mobile health application. Transactions on Emerging Telecommunications Technologies. 2022; 33(8):e3684.
[Crossref] [Google Scholar]
[17]Ogbuke NJ, Yusuf YY, Dharma K, Mercangoz BA. Big data supply chain analytics: ethical, privacy and security challenges posed to business, industries and society. Production Planning & Control. 2022; 33(2-3):123-37.
[Google Scholar]
[18]Seth B, Dalal S, Jaglan V, Le DN, Mohan S, Srivastava G. Integrating encryption techniques for secure data storage in the cloud. Transactions on Emerging Telecommunications Technologies. 2022; 33(4):e4108.
[Crossref] [Google Scholar]
[19]Dubey AK. A review of blockchain cyber security. ACCENTS Transactions on Image Processing and Computer Vision. 2023; 9(24):1-8.
[20]Ma J, Naas SA, Sigg S, Lyu X. Privacy‐preserving federated learning based on multi‐key homomorphic encryption. International Journal of Intelligent Systems. 2022; 37(9):5880-901.
[Crossref] [Google Scholar]
[21]Sasubilli SM, Dubey AK, Kumar A. A computational and analytical approach for cloud computing security with user data management. In international conference on advances in computing and communication engineering (ICACCE) 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[22]Hasan MK, Ghazal TM, Saeed RA, Pandey B, Gohel H, Eshmawi AA, et al. A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things. IET Communications. 2022; 16(5):421-32.
[Crossref] [Google Scholar]
[23]Das D, Bose P, Ruaro N, Kruegel C, Vigna G. Understanding security issues in the NFT ecosystem. In proceedings of the 2022 ACM SIGSAC conference on computer and communications security 2022 (pp. 667-81).
[Crossref] [Google Scholar]
[24]Jijuan L, Lirong H, Miaohong X, Chi Z, Dewei L. The application of data mining and fusion technology in the security management of sensitive data in data center. In international conference on data science and computer application (ICDSCA) 2021 (pp. 464-7). IEEE.
[Crossref] [Google Scholar]
[25]Wang F, Wang H, Xue L. Research on data security in big data cloud computing environment. In 5th advanced information technology, electronic and automation control conference (IAEAC) 2021 (pp. 1446-50). IEEE.
[Crossref] [Google Scholar]
[26]Huang H, Li J. Research on network communication model and network security technology through big data. In international conference on data science and computer application (ICDSCA) 2021 (pp. 138-41). IEEE.
[Crossref] [Google Scholar]
[27]Fan J, Xu Y, Ma J. Research on security classification and classification method of power grid data. In international conference on smart grid and smart cities (ICSGSC) 2022 (pp. 72-6). IEEE.
[Crossref] [Google Scholar]
[28]Joshi A, Raturi A, Kumar S, Dumka A, Singh DP. Improved security and privacy in cloud data security and privacy: measures and attacks. In international conference on fourth industrial revolution based technology and practices (ICFIRTP) 2022 (pp. 230-3). IEEE.
[Crossref] [Google Scholar]
[29]Josphineleela R, Kaliapp S, Natrayan L, Garg A. Big data security through privacy–preserving data mining (ppdm): a decentralization approach. In second international conference on electronics and renewable systems (ICEARS) 2023 (pp. 718-21). IEEE.
[Crossref] [Google Scholar]
[30]Zhang X, Li F, Guo S, Pei Y, Zhang Y. Indoor location and data security of traffic flow based on fingerprint database filtering. In 3rd international conference on information technology, big data and artificial intelligence (ICIBA) 2023 (pp. 1006-9). IEEE.
[Crossref] [Google Scholar]
[31]Yang H, Cao Y. Research on intelligent perception and supervision for data circulation security based on block-chain. In 8th international conference on cloud computing and big data analytics (ICCCBDA) 2023 (pp. 53-8). IEEE.
[Crossref] [Google Scholar]
[32]Zhang X, Li F, Guo S, Pei Y, Zhang Y. Vehicle data security based on underground garage location--dead reckoning method. In 3rd international conference on information technology, big data and artificial intelligence (ICIBA) 2023 (pp. 1051-4). IEEE.
[Crossref] [Google Scholar]
[33]Wang L, Qin Y, Li N. Research on security protection system under multi-party gathering technology of computer big data. In 3rd international conference on electronic technology, communication and information (ICETCI) 2023 (pp. 1286-9). IEEE.
[Crossref] [Google Scholar]
[34]Hasan MZ, Hussain MZ, Mubarak Z, Siddiqui AA, Qureshi AM, Ismail I. Data security and Integrity in cloud computing. In international conference for advancement in technology (ICONAT) 2023 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]