Merkle Tree: A Fundamental Component of Big Data

A. Kubigenova, A. Aktayeva, G. Yesmagambetov, V. Sukhomlin, A. Umbetov

Abstract


Abstract - Big data has unlocked the way for significant advances in various scientific fields. As a result, it has become a desirable topic in a both the academic world and IT businesses. ICT has contributed significantly to innovation, productivity, and competitiveness in big data management. However, many technological challenges related to data collection, storage, use, analysis, privacy, and trust need to be addressed. Big data poses challenges and approaches to overcoming these obstacles vary; data, processes, privacy, and governance are the most frequently mentioned challenges. In addition, inaccurate or misleading big data can lead to misinterpretation of results, negatively affecting user experience. In addition, inaccurate or misleading big data can also cause results to be misinterpreted, negatively impacting data security. This article discusses the challenges associated with significant data security and proposes some critical solutions to mitigate these challenges. A total of 45 articles were collected and examined to compile the article corpus, focusing on several essential issues of the big data security analysis field and their implications for multiple industries.

Full Text:

PDF

References


. S. Uthayasankar, K. Muhammad, I. Zahir and W. Vishanth “Critical analysis of Big Data challenges and analytical methods,” Journal of Business Research, vol.70, 2016, https://doi.org/10.1016/j.jbusres.2016.08.001

. A.A. Kharlamov, M. Pilgun “Data Analytics for Predicting Situational Developments in Smart Cities: Assessing User Perceptions,” Sensors, vol.24(15):4810, 2024, https://doi.org/10.3390/s24154810

. L. Theodorakopoulos, A. Theodoropoulou and C. Halkiopoulos “Enhancing Decentralized Decision-Making with Big Data and Blockchain Technology: A Comprehensive Review,” Applied Sciences, vol.14(16):7007, 2024, https://doi.org/10.3390/app14167007

. S. Azzabi, Z. Alfughi and A. Ouda “Data Lakes: A Survey of Concepts and Architectures,” Computers, vol.13(7):183, 2024, https://doi.org/10.3390/computers13070183

. M. Halaweh, A.E. Massry “Conceptual Model for Successful Implementation of Big Data in Organizations,” Journal of International Technology and Information Management, vol. 24(2), pp.21–34, 2015, https://doi.org/10.58729/1941-6679.1039

. Z. Chang, J. Wu, H. Liang, Yong Wang, Y. Wang, X. Xiong “ A Review of Power System False Data Attack Detection Technology Based on Big Data,” Information, vol.15(8):439, 2024, https://doi.org/10.3390/info15080439

. H. S. Munawar, F. Ullah, S. Qayyum, D. Shahzad “Big Data in Construction: Current Applications and Future Opportunities,” Big Data and Cognitive Computing, 2022; vol.6(1):18, 2022 https://doi.org/10.3390/bdcc6010018

. U. Sivarajah, S. Kumar, V. Kumar, S. Chatterjee, J. Li, “A study on big data analytics and innovation: From technological and business cycle perspectives,” Technol. Forecast. Soc. Chang., vol.202(C): 123328, 2024, https://doi.org/10.1016/ j.techfore.2024.123328

. A. Kharangate “Asynchronous Merkle Trees,” arXiv.org,arXiv:2311.17441v1, 2023, https://doi.org/10.48550/ arxiv.2311.17441

. D. Williams and Emin Gun Sirer, "Optimal parameter selection for efficient memory integrity verification using Merkle hash trees," In Proc. 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), pp. 383-388, 2004, https://doi.org/10.1109/NCA.2004.1347805

. J. A. Alzubi “Blockchain-based Lamport Merkle digital signature: Authentication tool in IoT healthcare,” Journal Computer Communications, vol.170, pp. 200-208, 2021, https://doi.org/10.1016/j.comcom.2021.02.002

. X. Wang, W. Lin, W. Zhang, Y. Huang, Z. Li, Q. Liu, X. Yang, Y.Yao, & C. Lv, C. “Integrating Merkle Trees with Transformer Networks for Secure Financial Computation”, Applied Sciences, vol.14(4):1386, 2024 https://doi.org/10.3390/app14041386

. O. Kuznetsov, A. Rusnak, A. Yezhov, K. Kuznetsova, D. Kanonik & O. Domin, O. “Evaluating the Security of Merkle Trees in the Internet of Things: An Analysis of Data Falsification Probabilities,”abs/2404.12093, 2024, https://doi.org/10.48550/ arxiv.2404.12093

. Liu Zhenpeng, Wang Shuo, Duan Sichen, Ren Lele & Wei Jianhang ”Dynamic Data Integrity Auditing Based on Hierarchical Merkle Hash Tree in Cloud Storage,” Electronics, vol.12:717, 2023, https://doi.org 10.3390/electronics12030717

. J. Wu, S. A. Haider, M. Bhardwaj, A. Sharma & P. Singhal “Blockchain-Based Data Audit Mechanism for Integrity over Big Data Environments,” Security and Communication Networks, pp.1-9, 2022, https://doi.org/10.1155/2022/8165653

. J. S. Jayaprakash, K. Balasubramanian, R. Sulaiman, M. K. Hasan, B. D. Parameshachari & C. Iwendi “Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method,” Computers, Materials & Continua, vol.72(1), 2022, https://doi.org/10.32604/cmc.2022.021269

. R. Wang & S. Zhong & Qin Zhou & J. Tu “A Trustworthy Data Verification Technique for Cross-Chain Data Sharing Based on Merkle Trees,” In Proc. Conference: International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), pp.1- 6, 2023, DOI:10.1109/icdcece57866.2023. 10150492

. Tyson Winarski “Big Data Blockchains with Merkle Trees,” Patent US10896171B2, 2021

. M. El-Hindi, T. Ziegler & C. Binnig “Towards Merkle Trees for High-Performance Data Systems,” In Proc. Conference: SIGMOD 2023, https://doi.org/10.1145/3595647.3595651

. M.S. Niaz & G. Saake, “Merkle hash tree based techniques for data integrity of outsourced data,” CEUR Workshop Proceedings, vol.1366, pp. 66-71, 2015,

. L. Chen, & R. Movassagh “Quantum Merkle Trees,” Quantum vol.8:1380, 2024, https://doi.org/10.22331/q-2024-06-18-1380

. S. Jing, X. Zheng, & Z. Chen “Review and Investigation of Merkle Tree’s Technical Principles and Related Application Fields,” In Proc. Conference: International Conference on Artificial Intelligence, Big Data and Algorithms (CAIBDA), pp.86-90, 2021, DOI:10.1109/CAIBDA53561.2021.00026

. S. Han, K. Xu, Zh. Zhu, S. Guo, H. Liu & Z. Li “Hash-Based Signature for Flexibility Authentication of IoT Devices,” Wuhan Univ. J. Nat. Sci., vol.27(1), pp.1-10, 2022, https://doi.org/10.1051/wujns/2022271001

. S. Han S, Y. Wang, D. Shen & C.Wang “A Multi-Party Privacy-Preserving Record Linkage Method Based on Secondary Encoding,“ Mathematics, vol.12(12):1800, 2024, https://doi.org/10.3390/math12121800


Refbacks

  • There are currently no refbacks.


Abava  Кибербезопасность IT Congress 2024

ISSN: 2307-8162