Bio-inspired Think-and-Share Optimization for Big Data Provenance in Wireless Sensor Networks

Abstract

Big data systems are being increasingly adopted by the enterprises exploiting big data applications to manage data-driven process, practices, and systems in an enterprise wide context. Specifically, big data systems and their underlying applications empower enterprises with analytical decision making (e.g., recommender/decision support systems) to optimize organizational productivity, competitiveness, and growth. Despite these benefits, big data applications face some challenges that include but not limited to security and privacy, authenticity, and reliability of critical data that may result in propagation of false information across systems. Data provenance as an approach and enabling mechanism (to identify the origin, manage the creation, and track the propagation of information etc.) can be a solution to above mentioned challenges for data management in an enterprise context. Data provenance solution(s) can help stakeholders and enterprises to assess the quality of data along with authenticity, reliability, and trust of information on the basis of identity, reproducibility and integrity of data. Considering the wide spread adoption of big data applications and the needs for data provenance, this paper focuses on (i) analyzing state-of-the-art for holistic presentation of provenance in big-data applications (ii) proposing a bio-inspired approach with underlying algorithm that exploits human thinking approach to support data provenance in Wireless Sensor Networks (WSNs). The proposed ‘Think-and-Share Optimization’ (TaSO) algorithms modularizes and automates data provenance in WSNs that are deployed and operated in enterprises. Evaluation of TaSO algorithm demonstrates its efficiency in terms of connectivity, closeness to the sink node, coverage, and execution time. The proposed research contextualizes bio-inspired computation to enable and optimize data provenance in WSNs. Future research aims to exploit machine learning techniques (with underlying algorithms) to automate data provenance for big data systems in networked environments.

Authors and Affiliations

Adel Alkhalil, Rabie Ramadan, Aakash Ahmad

Keywords

Related Articles

Rating Prediction with Topic Gradient Descent Method for Matrix Factorization in Recommendation

In many online review sites or social media, the users are encouraged to assign a numeric rating and write a textual review as feedback to each product that they have bought. Based on users’ history of feedbacks, recomme...

Review of Community Detection over Social Media:Graph Prospective

Community over the social media is the group of globally distributed end users having similar attitude towards a particular topic or product. Community detection algorithm is used to identify the social atoms that are mo...

Analysis and Research of Communication Interrupt Fault for Shanghai Metro Data Transmission System

A line of Shanghai metro has been put into use for nearly fifteen years. There are three times extended during this time. The existing line’s data transmission system was modified over the last decades and has adopted ma...

Variability Management in Business-IT Alignment: MDA based Approach

The expansion of PAIS (Process Aware Information Systems) has created the need for reuse in business processes. In fact, companies are left with directories containing several variants of the same business processes, whi...

 An Adaptive parameter free data mining approach for healthcare application

  In today’s world, healthcare is the most important factor affecting human life. Due to heavy work load it is not possible for personal healthcare. The proposed system acts as a preventive measure for determining w...

Download PDF file
  • EP ID EP596821
  • DOI 10.14569/IJACSA.2019.0100650
  • Views 73
  • Downloads 0

How To Cite

Adel Alkhalil, Rabie Ramadan, Aakash Ahmad (2019). Bio-inspired Think-and-Share Optimization for Big Data Provenance in Wireless Sensor Networks. International Journal of Advanced Computer Science & Applications, 10(6), 390-397. https://europub.co.uk/articles/-A-596821