Ensuring Security in Modern Data Pipelines: Practical Strategies for Data Engineers

Authors

  • Mahendran Vasagam

Keywords:

Strategic processes, security, compliance, contemporary data pipelines, construction concerns, security practices, obligatory structures, vulnerabilities, ingestion, transformation, storage levels, interprets encryption, access-control, secret-management technologies, enhancing data protection, continuous monitoring, data lineage tracking, regulatory compliance, GDPR, CCPA, effective security measures, pipeline security, operational effectiveness, compliance with regulations.

Abstract

In this research study, the authors explore strategic processes that can be used to maintain security and compliance in contemporary data pipelines. It explores construction concerns, most important security practices, and obligatory structures that can alleviate the vulnerabilities across ingestion, transformation, and storage levels. The research interprets encryption, access-control and secret-management technologies as the ways of enhancing protection of data. It also highlights the fact that continuous monitoring and data lineage tracking along with regulatory compliance must be tracked according to GDPR and CCPA. The results highlight the need to establish effective security measures and end with effective recommendations that widen pipeline security, operational effectiveness, and compliance with regulations.

DOI: https://doi.org/10.17762/ijisae.v12i22s.8090

 

Downloads

Download data is not yet available.

References

Prasad, V.K., Bhattacharya, P., Maru, D., Tanwar, S., Verma, A., Singh, A., Tiwari, A.K., Sharma, R., Alkhayyat, A., Țurcanu, F.E. and Raboaca, M.S., 2022. Federated learning for the internet-of-medical-things: A survey. Mathematics, 11(1), p.151.

Khan, A.Q., Nikolov, N., Matskin, M., Prodan, R., Roman, D., Sahin, B., Bussler, C. and Soylu, A., 2023. Smart data placement using storage-as-a-service model for big data pipelines. Sensors, 23(2), p.564.

Gudavalli, S., Mokkapati, C., Chinta, U., Singh, N.I.H.A.R.I.K.A., Goel, O. and Ayyagari, A.R.A.V.I.N.D., 2021. Sustainable Data Engineering Practices for Cloud Migration. Iconic Research and Engineering Journals (IREJ), 5(5), pp.269-287.

Zeydan, E. and Mangues-Bafalluy, J., 2022. Recent advances in data engineering for networking. Ieee Access, 10, pp.34449-34496.

Aslan, Ö., Aktuğ, S.S., Ozkan-Okay, M., Yilmaz, A.A. and Akin, E., 2023. A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), p.1333.

Raptis, T.P., Cicconetti, C., Falelakis, M., Kalogiannis, G., Kanellos, T. and Lobo, T.P., 2023. Engineering resource-efficient data management for smart cities with Apache Kafka. Future Internet, 15(2), p.43.

Mubeen, M., Arslan, M. and Anandhi, G., 2022. Strategies to avoid illegal data access. Journal of Communication Engineering & Systems, 12(3), pp.29-40.

Devaki, K. and Leena Jenifer, L., 2022. A study on challenges in data security during data transformation. In Computer networks, big data and IoT: proceedings of ICCBI 2021 (pp. 49-66). Singapore: Springer Nature Singapore.

Pandian, R.S.R. and Columbus, C., 2022. An analytical approach for optimal secured data storage on cloud server for online education platform. Geoscientific Instrumentation, Methods and Data Systems Discussions, 2022, pp.1-36.

Bharati, S. and Podder, P., 2022. Machine and deep learning for iot security and privacy: applications, challenges, and future directions. Security and communication networks, 2022(1), p.8951961.

Chadwick, D.W., Fan, W., Costantino, G., De Lemos, R., Di Cerbo, F., Herwono, I., Manea, M., Mori, P., Sajjad, A. and Wang, X.S., 2020. A cloud-edge based data security architecture for sharing and analysing cyber threat information. Future generation computer systems, 102, pp.710-722.

Gudepu, B.K. and Jaladi, D.S., 2022. Data Discovery and Security: Protecting Sensitive Information. International Journal of Acta Informatica, 1(1), pp.176-187.

Owobu, W.O., Abieba, O.A., Gbenle, P., Onoja, J.P., Daraojimba, A.I., Adepoju, A.H. and Ubamadu, B.C., 2021. Review of enterprise communication security architectures for improving confidentiality, integrity, and availability in digital workflows. IRE Journals, 5(5), pp.370-372.

Brickley, J.C. and Thakur, K., 2021. Policy of least privilege and segregation of duties, their deployment, application, & effectiveness. Int J Cyber Secur Digit Forens, 10(4), pp.112-119.

Kousalya, A. and Baik, N.K., 2023. Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique. International Journal of Intelligent Networks, 4, pp.62-67.

Fotache, M., Munteanu, A., Strîmbei, C. and Hrubaru, I., 2023. Framework for the assessment of data masking performance penalties in SQL database servers. Case Study: Oracle. IEEE Access, 11, pp.18520-18541.

Nadipalli, R., 2022. Data Integrity in MySQL-Driven Cloud Systems Using DevSecOps Pipelines. Journal of Scientific and Engineering Research, 9(1), pp.225-232.

Omotunde, H. and Ahmed, M., 2023. A comprehensive review of security measures in database systems: Assessing authentication, access control, and beyond. Mesopotamian Journal of CyberSecurity, 2023, pp.115-133.

James, U.U., 2022. Machine learning-driven anomaly detection for supply chain integrity in 5G industrial automation systems. International Journal of Scientific Research in Science, Engineering and Technology, 9(2), pp.2017-2023.

Awaysheh, F.M., Aladwan, M.N., Alazab, M., Alawadi, S., Cabaleiro, J.C. and Pena, T.F., 2021. Security by design for big data frameworks over cloud computing. IEEE Transactions on Engineering Management, 69(6), pp.3676-3693.

Alharbi, A., 2023. Applying Access Control Enabled Blockchain (ACE-BC) Framework to Manage Data Security in the CIS System. Sensors, 23(6), p.3020.

Sadaf, M., Iqbal, Z., Javed, A.R., Saba, I., Krichen, M., Majeed, S. and Raza, A., 2023. Connected and automated vehicles: Infrastructure, applications, security, critical challenges, and future aspects. Technologies, 11(5), p.117.

Ardagna, C.A., Bellandi, V., Damiani, E., Bezzi, M. and Hebert, C., 2021. Big Data Analytics-as-a-Service: Bridging the gap between security experts and data scientists. Computers & Electrical Engineering, 93, p.107215.

Majeed, A. and Lee, S., 2021. Applications of machine learning and high-performance computing in the era of COVID-19. Applied System Innovation, 4(3), p.40.

Almufarreh, A. and Arshad, M., 2023. Promising emerging technologies for teaching and learning: Recent developments and future challenges. Sustainability, 15(8), p.6917.

Al-Amri, R., Murugesan, R.K., Man, M., Abdulateef, A.F., Al-Sharafi, M.A. and Alkahtani, A.A., 2021. A review of machine learning and deep learning techniques for anomaly detection in IoT data. Applied Sciences, 11(12), p.5320.

Chadwick, D.W., Fan, W., Costantino, G., De Lemos, R., Di Cerbo, F., Herwono, I., Manea, M., Mori, P., Sajjad, A. and Wang, X.S., 2020. A cloud-edge based data security architecture for sharing and analysing cyber threat information. Future generation computer systems, 102, pp.710-722.

Alghofaili, Y., Albattah, A., Alrajeh, N., Rassam, M.A. and Al-Rimy, B.A.S., 2021. Secure cloud infrastructure: A survey on issues, current solutions, and open challenges. Applied Sciences, 11(19), p.9005.

Nath, S. and Arrawatia, R., 2022. Trade-offs or synergies? Hybridity and sustainable performance of dairy cooperatives in India. World Development, 154, p.105862.

Al-Jumaili, A.H.A., Muniyandi, R.C., Hasan, M.K., Paw, J.K.S. and Singh, M.J., 2023. Big data analytics using cloud computing based frameworks for power management systems: Status, constraints, and future recommendations. Sensors, 23(6), p.2952.

Yevseiev, S., Milov, O., Pribyliev, Y., Zviertseva, N., Lezik, A., Komisarenko, O., Nalyvaiko, A., Pogorelov, V., Katsalap, V. and Husarova, I., 2023. Development of the concept for determining the level of critical business processes security. Eastern-European Journal of Enterprise Technologies, 1(9), p.121.

Pollini, A., Callari, T.C., Tedeschi, A., Ruscio, D., Save, L., Chiarugi, F. and Guerri, D., 2022. Leveraging human factors in cybersecurity: an integrated methodological approach. Cognition, Technology & Work, 24(2), pp.371-390.

Ogeawuchi, J.C., Akpe, O.E., Abayomi, A.A., Agboola, O.A., Ogbuefi, E.J.I.E.L.O. and Owoade, S.A.M.U.E.L., 2022. Systematic review of advanced data governance strategies for securing cloud-based data warehouses and pipelines. Iconic Research and Engineering Journals, 6(1), pp.784-794.

Hewage, U.H.W.A., Sinha, R. and Naeem, M.A., 2023. Privacy-preserving data (stream) mining techniques and their impact on data mining accuracy: a systematic literature review. Artificial Intelligence Review, 56(9), pp.10427-10464.

Downloads

Published

30.08.2024

How to Cite

Mahendran Vasagam. (2024). Ensuring Security in Modern Data Pipelines: Practical Strategies for Data Engineers. International Journal of Intelligent Systems and Applications in Engineering, 12(22s), 2401 –. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/8090

Issue

Section

Research Article