Exploring Data Security and Privacy Challenges in Master Data Governance Systems |
||
|
|
|
© 2024 by IJCTT Journal | ||
Volume-72 Issue-11 |
||
Year of Publication : 2024 | ||
Authors : Ravikumar Vallepu | ||
DOI : 10.14445/22312803/IJCTT-V72I11P113 |
How to Cite?
Ravikumar Vallepu, "Exploring Data Security and Privacy Challenges in Master Data Governance Systems ," International Journal of Computer Trends and Technology, vol. 72, no. 11, pp. 126-134, 2024. Crossref, https://doi.org/10.14445/22312803/IJCTT-V72I11P113
Abstract
A key part of master data governance (MDG) is to make enterprises operate with consistent, accurate and reliable data. As companies increasingly adopt multiple master data management (MDM) systems to deal with complex landscapes, the importance of a secure framework becomes all the greater to ensure that it remains in operation. Both their complex business needs, internally driven by innovation, and external legal requirements always form major forces underpinning such considerations.However, securing sensitive data within MDG frameworks raises a set of challenges. Among them are vulnerabilities arising from extensive data access, multiple system integration and adherence to ever-changing regulatory requirements.In the study, one will see that critical risks such as unauthorised access, data breaches, and privacy violations have particularly serious implications for businesses, customers, and all stakeholders. As a response, methods to prevent these risks are examined in the paper, with advanced encryption protocols, role-based access controls, and regular security audits being the chief ones.This paper introduces a series of explorations and recommendations for secure and private data management based upon case studies, previous reading material (Citation 1), existing software (Projects completed Project [2]) and human society actuality. The findings stressed the need for data security that is kept at a delicately balanced level, providing models for future changes to MDG systems. For its part, this study aims to lay the basis for developing adaptive and scalable MDG systems that, in a data-driven world, can meet ongoing and new business needs.
Keywords
Master Data Governance, Data security, Privacy challenges, Access control, Data integration.
Reference
[1] Jiawei Zhang et al., “An Efficient Blockchain-Based Hierarchical Data Sharing for Healthcare Internet of Things,” IEEE Transactions on Industrial Informatics, vol. 18, no. 10, pp. 7139-7150, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Muhammad Asghar Khan et al., “A Smart Card-Based Two-factor Mutual Authentication Scheme for Efficient Deployment of an IoT Based Telecare Medical Information System,” Sensors, vol. 23, no. 12, pp. 1-15, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[3] JoonYoung Lee et al., “Blockchain-Enabled Key Aggregate Searchable Encryption Scheme for Personal Health Record Sharing With Multidelegation,” IEEE Internet of Things Journal, vol. 11, no. 10, pp. 17482-17494, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Huiyong Wang et al., “Ciphertext-Policy Attribute-Based Encryption Supporting Policy-Hiding and Cloud Auditing in Smart Health,” Computer Standards & Interfaces, vol. 84, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Li Yang et al., “Achieving Privacy-Preserving Sensitive Attributes for Large Universe Based on Private Set Intersection,” Information Sciences, vol. 582, pp. 529-546, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Yangyang Bao, Weidong Qiu, and Xiaochun Cheng, “Secure and Lightweight Fine-Grained Searchable Data Sharing for IoT-Oriented and Cloud-Assisted Smart Healthcare System,” IEEE Internet of Things Journal, vol. 9, no.4, pp. 2513-2526, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Guangquan Xu et al., “A Privacy-Preserving Medical Data Sharing Scheme Based on Blockchain,” IEEE Journal of Biomedical and Health Informatics, vol. 27, no. 2, pp. 698-709, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Yudi Zhang et al., “Balancing Privacy and Flexibility of Cloud-Based Personal Health Records Sharing System,” IEEE Transactions on Cloud Computing, vol. 11, no. 3, pp. 2420-2430, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Guangyu Peng, Aiqing Zhang, and Xiaodong Lin, “Patient-Centric Fine-Grained Access Control for Electronic Medical Record Sharing With Security via Dual-Blockchain,” IEEE Transactions on Network Science and Engineering, vol. 10, no. 6, pp. 3908-3921, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Jihyeon Oh et al., “A Secure Data Sharing Based on Key Aggregate Searchable Encryption in Fog-Enabled IoT Environment,” IEEE Transactions on Network Science and Engineering, vol. 9, no. 6, pp. 4468-4481, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Taochun Wang et al., “Health Data Security Sharing Method Based on Hybrid Blockchain,” Future Generation Computer Systems, vol. 153, pp. 251-261, 2024.
[CrossRef] [Google Scholar] [Publisher Link]