Abstract
The computation of big data and related services has been the topic of research and popular applications due to the rapid progress of big data technology and statistical data analysis solutions. There are several issues with data quality that contribute to error decisions in organizations and institutions. Current research just covers how to adequately validate data to assure its validity. Data integrity is synonymous with data validity. It is a difficult undertaking that is often performed by national statistics organizations and institutes. There is a significant need to provide a general system for validating the big data integrity. This approach has been dedicated to presenting a model for data integrity, particularly big data, and how to solve the validation process. The data also comprises the validity of the data fields, as well as the validity of measuring the data and determining compliance with the data cycle chain. For the integrity of large data, the processing speed and accuracy of the verification process are taken into account. The research was based on the Python programming language and real test data, and it was based on the use of the most recent technologies and programming languages.
Similar content being viewed by others
References
Kim, G.-H., Trimi, S., & Chung, J.-H. (2014). Big-data applications in the Government sector. Communications of the ACM, 57(3), 78–85.
Nath, A. (2015). Big data security issues and challenges. International Journal of Innovative Research in Advanced Engineering (IJIRAE), 2(2), 15–20.
Inukollu, V. N., Arsi, S., & Ravuri, S. R. (2014). Security Issues associated with big data in cloud computing. International Journal of Network Security & Its Applications (IJNSA), 6(3), 45–56.
Lebdaoui, S. El Hajji and Orhanou, G., "Managing big data integrity," in 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, Morocco, 2016.
Liu, C., Ranjan, R., Zhang, X., Yang, C, Georgakopoulos, D, and Chen, J. (2013) "Public Auditing for Big Data Storage in Cloud Computing - A Survey," 2013 IEEE 16th International Conference on Computational Science and Engineering.
Demchenko, Y., Membrey, C. de Laat, P., and Grosso, P., (2013) “Addressing Big Data Issues in Scientific Data Infrastructure,” in 2013 International Conference on Collaboration Technologies and Systems (CTS), San Diego, CA, USA.
Lagoze, C. (2014). “Big Data, data integrity, and the fracturing of the control zone.” Big Data & Society, 1–11.
Sing, A. P., & Pasupuleti, S. K. (2016). Optimized public auditing and data dynamics for data storage security in cloud computing. Procedia Computer Science, 93, 751–759.
Liu, B., Yu, X. L., Chen, S., Xu, X., and Zhu, L., (2017) "Blockchain-Based Data Integrity Service Framework for IoT Data," 2017 IEEE International Conference on Web Services (ICWS), pp. 468–475.
Li, Y., Yu, Y., Min, G., Susilo, W., Ni, J., & Choo, K.-K.R. (2019). Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Transactions on Dependable and Secure Computing, 16(1), 72–83.
Iarocci, N., "Cerberus," 2016. [Online]. Available: python-cerberus.org.
Zhou, L., Fu, A., Yu, S., Su, M., & Kuang, B. (2018). Data integrity verification of the outsourced big data in the cloud environment. Journal of Network and Computer Applications. https://doi.org/10.1016/j.jnca.2018.08.003
Mantzoukas, K., Kloukinas, C., & Spanoudakis, G. (2018). Monitoring Data Integrity in Big Data Analytics Services. IEEE 11th International Conference on Cloud Computing (CLOUD) (pp. 904–907). IEEE.
Mukhtaj, K., Maozhen, L., Phillip, A., Gareth, T., & Junyong, L. (2014). Big Data Analytics on PMU Measurements. 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). IEEE, 2014. p. 715–719.
Peng, S., Zhou, F., & Wang, Q. (2017). Identity-based public multi-replica provable data possession. IEEE Access, 5, 26990–27001.
Sookhak, M., Yu, F. R., & Zomaya, A. Y. (2018). Auditing big data storage in cloud computing using divide and conquer tables. IEEE Trans Parallel Distr. Syst, 29(5), 999–1012.
Yin, S. (2020). Research on the detection algorithm of data integrity verification results in big data storage. J Phys: Conf Ser., 1574, 012008.
Rai, S., & Sharma, A. (2020). Research perspective on security-based algorithm in big data concepts. International Journal of Engineering and Advanced Technology, 9(3), 2138–2143.
Manimurugan, S. (2021). IoT-fog-cloud model for anomaly detection using improved naive bayes and principal component analysis. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-02723-3
Manimurugan, S., Majdi, A.-Q., Mohmmed, M., Narmatha, C., & Varatharajan, R. (2020). “Intrusion detection in network, adaptive neuro-fuzzy inference system-ANFIS, crow search optimization- CSO, NSL-KDD". Microprocessors and Microsystems, 79, 103261. https://doi.org/10.1016/j.micpro.2020.103261
Narmatha, C., Eljack, S. M., Tuka, A. A. R. M., et al. (2020). A hybrid fuzzy brain-storm optimization algorithm for the classification of brain tumor MRI Images. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-020-02470-5
Manimurugan, S., Almutairi, S., Aborokbah, M., Ganesan, S., Varatharajan, R. (2020). A review on advanced computational approaches on multiple sclerosis segmentation and classification. IET signal Processing, 14(6), 333–341. https://doi.org/10.1049/iet-spr.2019.0543
Manimurugan, S., Almutairi, S., Mohammed Aborokbah, M., Ganesan, N. C. S., & Patan, R. (2020). Effective attack detection in internet of things smart environment using deep belief neural network. IEEE Access., 8, 77396–77404.
Almutairi, S., Manimurugan, S., & Aborokbah, M. (2019). A new secure transmission scheme between senders and receiver using HVCHC without Any Loss. EURASIP Journal on Wireless Communications and Networking, 2019, 88. https://doi.org/10.1186/s13638-019-1399-z
Al-Mutairi, S., & Manimurugan, S. (2017). The clandestine image transmission scheme to prevent from the intruders. International Journal of Advanced and Applied Sciences, 4(2), 52–60.
Manimurugan, S., & Mutari, S. A. (2017). A novel secret image hiding technique for secure transmission. Journal of Theoretical and Applied Information Technology, 95(1), 166–176.
Manimurugan, S., & Narmatha, C. (2015). Secure and efficient medical image transmission by new tailored visual cryptography scheme with LS compressions. International Journal of Digital Crime and Forensics (IJDCF), 7(1), 26–50.
Manimurugan, S., Porkumaran, K., & Narmatha, C. (2014). The new block pixel sort algorithm for TVC encrypted medical image. Imaging Science Journal., 62(8), 403–414.
Author information
Authors and Affiliations
Contributions
Fawaz and Saad Almutairi are contributed equally.
Corresponding author
Ethics declarations
Conflicts of interest
The authors declare no conflict of interest, financial or otherwise.
Data Availability
The authors confirm that the data supporting the findings of this research are available within the article.
Code availability
Custom code.
Human and Animal Rights
No animals/humans were used for studies that are basis of this research.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Alyami, F., Almutairi, S. Implementing Integrity Assurance System for Big Data. Wireless Pers Commun 122, 2585–2601 (2022). https://doi.org/10.1007/s11277-021-09013-x
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-09013-x