Data Privacy in the Era of Big Data: Navigating the Risks

Authors

  • Anusha Atluri Lead Solution/Technical Architect at Acosta, USA. Author

DOI:

https://doi.org/10.56472/ICCSAIML25-103

Keywords:

Data Privacy, Big Data, Privacy Risks, Data Protection, Cybersecurity, Data Governance, Data Breaches, Anonymization, Machine Learning, Privacy Laws, Data Ethics

Abstract

The rapid spread of Big Data is responsible for the transformation of industries, which, in turn, has provided companies with the possibility of gaining informative analysis, enriching customer experiences, and taking data as a source for decision-making. This remarkable jump in the data volume as well as choices about ethics, security, and privacy has become a matter of great concern. Data breach, identity theft, and unauthorized access tend to occur more often when companies handle, manage, and examine enormous amounts of personal data. People desire to have more power over how they share their data and at the same time, are more digitally conscious. The legal system has recently drawn its attention to the problem of data overseas, developing regulations such as the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), and the Health Insurance Portability & Accountability Act (HIPAA), all of which strictly control data management practices thus, creating a healthier atmosphere for better protection of personal data. The firms should introduce all-inclusive laws concerning securing the user data. Conferring a top place to privacy is necessary, and in so doing, technology companies might allow customers to comprehend the information that is given, its purpose, and its use. As the companies have to follow data minimization practices and they are only given the required data, there are, undoubtedly, ethical considerations. To alleviate any privacy concerns companies can invest in robust infrastructure, educate their staff, and have regular check-ups to ensure effective use and secure data. The confidence of the customer is usually a very crucial issue, and ethical handling of data enhances that trust, thus, making life extending customer relationships. Businesses somehow have to give out the data they own for free as to move with technology by deploying the data in their operations hence managing the risk that comes alongside these new technology-driven insights

Downloads

Download data is not yet available.

References

[1] Hassan, S., Dhali, M., Zaman, F., & Tanveer, M. (2021). Big data and predictive analytics in healthcare in Bangladesh: regulatory challenges. Heliyon, 7(6).

[2] Guerra, B. B., & Gutierrez, J. L. M. (2024). On singularity and the Stoics: why Stoicism offers a valuable approach to navigating the risks of AI (Artificial Intelligence).

[3] D'Hotman, D., Loh, E., & Savulescu, J. (2020). AI enabled suicide prediction tools–ethical considerations for medical leaders. BMJ leader, 5(2).

[4] Bradford, M., Taylor, E. Z., & Seymore, M. (2022). A view from the CISO: insights from the data classification process. Journal of Information Systems, 36(1), 201-218.

[5] Ahmad, G. I., Singla, J., & Giri, K. J. (2021). Security and Privacy of E-health Data. Multimedia security: algorithm development, analysis and applications, 199-214.

[6] Cao, Y., Liang, S., Sun, L., Liu, J., Cheng, X., Wang, D., ... & Feng, K. (2022). Trans-Arctic shipping routes expanding faster than the model projections. Global Environmental Change, 73, 102488.

[7] Shah, S. I. H., Peristeras, V., & Magnisalis, I. (2021). Government big data ecosystem: definitions, types of data, actors, and roles and the impact in public administrations. ACM Journal of Data and Information Quality, 13(2), 1-25.

[8] Singh, J. (2022). Security and Privacy Issues Related to Big Data‐Based Ubiquitous Healthcare Systems. Internet of Healthcare Things: Machine Learning for Security and Privacy, 41-64.

[9] Flavia, B. J., & Chelliah, B. J. (2024). BO-LCNN: butterfly optimization based lightweight convolutional neural network for remote data integrity auditing and data sanitizing model. Telecommunication Systems, 85(4), 623-647.

[10] Nash, I., Kennedy-Mayo, D., Swire, P., & Antón, A. (2024). Legal Issues in Reconciling Data Protection, AI, and Cybersecurity under EU Law. Mo. L. Rev., 89, 871.

[11] Mahesh Selvi, T., & Kavitha, V. (2022). A privacy-aware deep learning framework for health recommendation system on analysis of big data. The Visual Computer, 38(2), 385-403.

[12] Kumar, V., Mahmoud, M. S., Alkhayyat, A., Srinivas, J., Ahmad, M., & Kumari, A. (2022). RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure. The Journal of Supercomputing, 78(14), 16167-16196.

[13] Du, Q. (2023, July). Design and Development of Corporate Financial Risk Control System Based on Big Data. In International Conference on Frontier Computing (pp. 436-441). Singapore: Springer Nature Singapore.

[14] R. Daruvuri and K. Patibandla, "Enhancing data security and privacy in edge computing: A comprehensive review of key technologies and future directions," International Journal of Research in Electronics and Computer Engineering, vol. 11, no. 1, pp. 77-88, 2023.

[15] Dhinakaran, D., Edwin Raja, S., Velselvi, R., & Purushotham, N. (2025). Intelligent IoT-Driven Advanced Predictive Maintenance System for Industrial Applications. SN Computer Science, 6(2), 151.

[16] Arunkumar Paramasivan. (2020). Big Data to Better Care: The Role of AI in Predictive Modelling for Healthcare Management. International Journal of Innovative Research and Creative Technology, 6(3), 1–9. https://doi.org/10.5281/zenodo.14551652

[17] Zhai, H., He, S., Wei, Z., & Xie, Y. (2021, December). Blockchain-Based Outsourcing Shared Car Risk Prediction Scheme Design. In International Conference on Security and Privacy in New Computing Environments (pp. 1-14). Cham: Springer International Publishing.

Published

2025-05-18

How to Cite

1.
Atluri A. Data Privacy in the Era of Big Data: Navigating the Risks. IJETCSIT [Internet]. 2025 May 18 [cited 2025 Sep. 12];:19-27. Available from: https://ijetcsit.org/index.php/ijetcsit/article/view/177

Similar Articles

11-20 of 226

You may also start an advanced similarity search for this article.