Open Access iconOpen Access

ARTICLE

crossmark

Analyzing the Big Data Security Through a Unified Decision-Making Approach

by Abdulaziz Attaallah1, Hassan Alsuhabi2, Sarita Shukla3, Rajeev Kumar3,*, Bineet Kumar Gupta3, Raees Ahmad Khan4

1 Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, 21589, Saudi Arabia
2 Department of Mathematics, Al-Qunfudah University College, Umm Al-Qura University, Mecca, 24381, Saudi Arabia
3 Department of Computer Applications, Shri Ramswaroop Memorial University, Barabanki, 225003, India
4 Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, 226025, India

* Corresponding Author: Rajeev Kumar. Email: email

Intelligent Automation & Soft Computing 2022, 32(2), 1071-1088. https://doi.org/10.32604/iasc.2022.022569

Abstract

The use of cloud services, web-based software systems, the Internet of Things (IoT), Machine Learning (ML), Artificial Intelligence (AI), and other wireless sensor devices in the health sector has resulted in significant advancements and benefits. Early disease detection, increased accessibility, and high diagnostic reach have all been made possible by digital healthcare. Despite this remarkable achievement, healthcare data protection has become a serious issue for all parties involved. According to data breach statistics, the healthcare data industry is one of the major threats to cyber criminals. In reality, healthcare data breaches have increased at an alarming rate in recent years. Practitioners are developing a variety of tools, strategies, and approaches to solve healthcare data security concerns. The author has highlighted the crucial measurements and parameters in relation to enormous organizational circumstances for securing a vast amount of data in this paper. Security measures are those that prevent developers and organizations from achieving their objectives. The goal of this work is to identify and prioritize the security approaches that are used to locate and solve problems using different versions of two approaches that have been used to analyze big data security in the past. The Fuzzy Analytic Hierarchy Process (Fuzzy AHP) approach is being used by authors to examine the priorities and overall data security. In addition, the most important features in terms of weight have been quantitatively analyzed. Experts will discover the findings and conclusions useful in improving big data security.

Keywords


Cite This Article

APA Style
Attaallah, A., Alsuhabi, H., Shukla, S., Kumar, R., Gupta, B.K. et al. (2022). Analyzing the big data security through a unified decision-making approach. Intelligent Automation & Soft Computing, 32(2), 1071-1088. https://doi.org/10.32604/iasc.2022.022569
Vancouver Style
Attaallah A, Alsuhabi H, Shukla S, Kumar R, Gupta BK, Khan RA. Analyzing the big data security through a unified decision-making approach. Intell Automat Soft Comput . 2022;32(2):1071-1088 https://doi.org/10.32604/iasc.2022.022569
IEEE Style
A. Attaallah, H. Alsuhabi, S. Shukla, R. Kumar, B. K. Gupta, and R. A. Khan, “Analyzing the Big Data Security Through a Unified Decision-Making Approach,” Intell. Automat. Soft Comput. , vol. 32, no. 2, pp. 1071-1088, 2022. https://doi.org/10.32604/iasc.2022.022569



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2361

    View

  • 914

    Download

  • 0

    Like

Share Link