Open Access iconOpen Access

ARTICLE

Evaluating Security of Big Data Through Fuzzy Based Decision-Making Technique

by Fawaz Alassery1, Ahmed Alzahrani2, Asif Irshad Khan2, Kanika Sharma3, Masood Ahmad4, Raees Ahmad Khan4,*

1 Department of Computer Science, College of Computers and Information Technology, Taif University, P. O. Box 11099, Taif 21944, Saudi Arabia
2 Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, 21589, Saudi Arabia
3 Department of Computer Applications, Mangalmay Institute of Engineering & Technology, Greater Noida, 201310, Uttar Pradesh, India
4 Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, 226025, Uttar Pradesh, India

* Corresponding Author: Raees Ahmad Khan. Email: email

Computer Systems Science and Engineering 2023, 44(1), 859-872. https://doi.org/10.32604/csse.2023.025796

Abstract

In recent years, it has been observed that the disclosure of information increases the risk of terrorism. Without restricting the accessibility of information, providing security is difficult. So, there is a demand for time to fill the gap between security and accessibility of information. In fact, security tools should be usable for improving the security as well as the accessibility of information. Though security and accessibility are not directly influenced, some of their factors are indirectly influenced by each other. Attributes play an important role in bridging the gap between security and accessibility. In this paper, we identify the key attributes of accessibility and security that impact directly and indirectly on each other, such as confidentiality, integrity, availability, and severity. The significance of every attribute on the basis of obtained weight is important for its effect on security during the big data security life cycle process. To calculate the proposed work, researchers utilised the Fuzzy Analytic Hierarchy Process (Fuzzy AHP). The findings show that the Fuzzy AHP is a very accurate mechanism for determining the best security solution in a real-time healthcare context. The study also looks at the rapidly evolving security technologies in healthcare that could help improve healthcare services and the future prospects in this area.

Keywords


Cite This Article

APA Style
Alassery, F., Alzahrani, A., Khan, A.I., Sharma, K., Ahmad, M. et al. (2023). Evaluating security of big data through fuzzy based decision-making technique. Computer Systems Science and Engineering, 44(1), 859-872. https://doi.org/10.32604/csse.2023.025796
Vancouver Style
Alassery F, Alzahrani A, Khan AI, Sharma K, Ahmad M, Khan RA. Evaluating security of big data through fuzzy based decision-making technique. Comput Syst Sci Eng. 2023;44(1):859-872 https://doi.org/10.32604/csse.2023.025796
IEEE Style
F. Alassery, A. Alzahrani, A. I. Khan, K. Sharma, M. Ahmad, and R. A. Khan, “Evaluating Security of Big Data Through Fuzzy Based Decision-Making Technique,” Comput. Syst. Sci. Eng., vol. 44, no. 1, pp. 859-872, 2023. https://doi.org/10.32604/csse.2023.025796



cc Copyright © 2023 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1680

    View

  • 797

    Download

  • 0

    Like

Share Link