{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T09:01:31Z","timestamp":1768986091578,"version":"3.49.0"},"reference-count":42,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2021,10,21]],"date-time":"2021-10-21T00:00:00Z","timestamp":1634774400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Deanship of Scientific Research (DSR) at King Abdulaziz 467 Univer-sity, Jeddah","award":["RG-9-611-38"],"award-info":[{"award-number":["RG-9-611-38"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>The sum of Big Data generated from different sources is increasing significantly with each passing day to extent that it is becoming challenging for traditional storage methods to store this massive amount of data. For this reason, most organizations have resolved to use third-party cloud storage to store data. Cloud storage has advanced in recent times, but it still faces numerous challenges with regard to security and privacy. This paper discusses Big Data security and privacy challenges and the minimum requirements that must be provided by future solutions. The main objective of this paper is to propose a new technical framework to control and manage Big Data security and privacy risks. A design science research methodology is used to carry out this project. The proposed framework takes advantage of Blockchain technology to provide secure storage of Big Data by managing its metadata and policies and eliminating external parties to maintain data security and privacy. Additionally, it uses mobile agent technology to take advantage of the benefits related to system performance in general. We present a prototype implementation for our proposed framework using the Ethereum Blockchain in a real data storage scenario. The empirical results and framework evaluation show that our proposed framework provides an effective solution for secure data storage in a Big Data environment.<\/jats:p>","DOI":"10.3390\/sym13111990","type":"journal-article","created":{"date-parts":[[2021,10,21]],"date-time":"2021-10-21T23:27:39Z","timestamp":1634858859000},"page":"1990","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A Proposed Framework for Secure Data Storage in a Big Data Environment Based on Blockchain and Mobile Agent"],"prefix":"10.3390","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7274-2968","authenticated-orcid":false,"given":"Khalil Ahmad","family":"Alsulbi","sequence":"first","affiliation":[{"name":"Department of Computer Science, College of Computing at Alqunfudah, Umm Al-Qura University, Makkah 21514, Saudi Arabia"},{"name":"Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1287-1634","authenticated-orcid":false,"given":"Maher Ali","family":"Khemakhem","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia"}]},{"given":"Abdullah Ahamd","family":"Basuhail","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia"}]},{"given":"Fathy Eassa","family":"Eassa","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia"}]},{"given":"Kamal Mansur","family":"Jambi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3104-209X","authenticated-orcid":false,"given":"Khalid Ali","family":"Almarhabi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computing at Alqunfudah, Umm Al-Qura University, Makkah 21514, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2021,10,21]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"102095","DOI":"10.1016\/j.ipm.2019.102095","article-title":"Big data adoption: State of the art and research challenges","volume":"56","author":"Baig","year":"2019","journal-title":"Inf. Process. Manag."},{"key":"ref_2","first-page":"479","article-title":"Impacts and challenges of big data: A review","volume":"7","author":"Samsudeen","year":"2020","journal-title":"Int. J. Psychosoc. Rehabil."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"e13","DOI":"10.1002\/spy2.13","article-title":"Challenges and techniques in Big data security and privacy: A review","volume":"1","author":"Bao","year":"2018","journal-title":"Secur. Priv."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"131723","DOI":"10.1109\/ACCESS.2020.3009876","article-title":"Data security and privacy protection for cloud storage: A survey","volume":"8","author":"Yang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_5","first-page":"13237","article-title":"Global DataSphere to Hit 175 Zettabytes by 2025, IDC Says","volume":"17","author":"Alex","year":"2018","journal-title":"Datanami"},{"key":"ref_6","first-page":"13237","article-title":"Security challenges of Big Data storage in Cloud environment: A Survey","volume":"13","author":"Subbalakshmi","year":"2018","journal-title":"Int. J. Appl. Eng. Res."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"860","DOI":"10.3934\/math.2019.3.860","article-title":"Big data security challenges and strategies","volume":"4","author":"Venkatraman","year":"2019","journal-title":"AIMS Math."},{"key":"ref_8","unstructured":"Prajapati, P., and Shah, P. (2020). A review on secure data deduplication: Cloud storage security issue. J. King Saud-Univ. Comput. Inf. Sci., in press."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"147420","DOI":"10.1109\/ACCESS.2019.2946185","article-title":"Privacy protection and data security in cloud computing: A survey, challenges, and solutions","volume":"7","author":"Sun","year":"2019","journal-title":"IEEE Access"},{"key":"ref_10","unstructured":"(2016, February 27). Big Data Working Group, Expanded Top Ten Big Data Security and Privacy Challenges. Available online: https:\/\/downloads.cloudsecurityalliance.org\/initiatives\/bdwg\/Expanded_Top_Ten_Big_Data_Security_and_Privacy_Challenges.pdf."},{"key":"ref_11","unstructured":"Wright, C.S. (2021, June 21). Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https:\/\/ssrn.com\/abstract=3440802."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Conoscenti, M., Vetro, A., and De Martin, J.C. (December, January 29). Blockchain for the Internet of Things: A systematic literature review. Proceedings of the 2016 IEEE\/ACS 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, Morocco.","DOI":"10.1109\/AICCSA.2016.7945805"},{"key":"ref_13","unstructured":"Zahid, J.I., Ferworn, A., and Hussain, F. (2018). Blockchain: A Technical Overview, IEEE. IEEE Internet Policy Newsletter."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"8076","DOI":"10.1109\/JIOT.2019.2920987","article-title":"Blockchain for Internet of Things: A survey","volume":"6","author":"Dai","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MCOM.2018.1700379","article-title":"SecSVA: Secure storage, verification, and auditing of big data in the cloud environment","volume":"56","author":"Aujla","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Dinh, T.T.A., Wang, J., Chen, G., Liu, R., Ooi, B.C., and Tan, K.L. (2017, January 14\u201319). Blockbench: A framework for analyzing private blockchains. Proceedings of the 2017 ACM International Conference on Management of Data, Chicago, IL, USA.","DOI":"10.1145\/3035918.3064033"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Lei, K., Zhang, Q., Xu, L., and Qi, Z. (2018, January 11\u201313). Reputation-based byzantine fault-tolerance for consortium blockchain. Proceedings of the 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS), Singapore.","DOI":"10.1109\/PADSW.2018.8644933"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"147782","DOI":"10.1109\/ACCESS.2019.2946373","article-title":"Using blockchain for electronic health records","volume":"7","author":"Shahnaz","year":"2019","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Mohanta, B.K., Panda, S.S., and Jena, D. (2018, January 10\u201312). An overview of smart contract and use cases in blockchain technology. Proceedings of the 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Bengaluru, India.","DOI":"10.1109\/ICCCNT.2018.8494045"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"533","DOI":"10.4236\/jsea.2016.910036","article-title":"Blockchain platform for industrial internet of things","volume":"9","author":"Bahga","year":"2016","journal-title":"J. Softw. Eng. Appl."},{"key":"ref_21","unstructured":"Krupansky, J. (2021, July 05). What Is a Software Agent. Available online: https:\/\/medium.com\/@jackkrupansky\/what-is-a-software-agent-6089dfe8f99."},{"key":"ref_22","unstructured":"(2021, July 05). Mobile Agent Framework. Available online: http:\/\/maf.sourceforge.net\/."},{"key":"ref_23","first-page":"43","article-title":"Big Data Security and Privacy: A Taxonomy with Some HPC and Blockchain Perspectives","volume":"21","author":"Alsulbi","year":"2021","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"361","DOI":"10.32604\/cmc.2019.06223","article-title":"Security and privacy frameworks for access control big data systems","volume":"59","author":"Centonze","year":"2019","journal-title":"Comput. Mater. Continua"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Gupta, S., Vashisht, S., and Singh, D. (2019, January 24\u201326). Enhancing Big Data Security Using Elliptic Curve Cryptography. Proceedings of the 2019 International Conference on Automation, Computational and Technology Management (ICACTM), London, UK.","DOI":"10.1109\/ICACTM.2019.8776764"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Yau, Y.C., Khethavath, P., and Figueroa, J.A. (2019, January 29\u201331). Secure Pattern-Based Data Sensitivity Framework for Big Data in Healthcare. Proceedings of the 2019 IEEE International Conference on Big Data, Cloud Computing, Data Science & Engineering (BCD), Honolulu, HI, USA.","DOI":"10.1109\/BCD.2019.8885114"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Al-Odat, Z.A., Al-Qtiemat, E.M., and Khan, S.U. (2019, January 27\u201329). A big data storage scheme based on distributed storage locations and multiple authorizations. Proceedings of the 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (Big Data Security), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), Washington, DC, USA.","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2019.00014"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"7763","DOI":"10.1007\/s00500-018-3435-z","article-title":"Efficient and secure big data storage system with leakage resilience in cloud computing","volume":"23","author":"Zhang","year":"2018","journal-title":"Soft Comput."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"992","DOI":"10.1007\/s12083-017-0579-z","article-title":"Secure and private key management scheme in big data networking","volume":"11","author":"Fan","year":"2018","journal-title":"Peer-Peer Netw. Appl."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Naz, M., Al-zahrani, F.A., Khalid, R., Javaid, N., Qamar, A.M., Afzal, M.K., and Shafiq, M. (2019). A secure data sharing platform using blockchain and interplanetary file system. Sustainability, 11.","DOI":"10.3390\/su11247054"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Zhang, C., Li, Y., Sun, W., and Guan, S. (2020, January 12\u201314). Blockchain Based Big Data Security Protection Scheme. Proceedings of the 2020 IEEE 5th Information Technology and Mechatronics Engineering Conference (ITOEC), Chongqing, China.","DOI":"10.1109\/ITOEC49072.2020.9141914"},{"key":"ref_32","first-page":"1254","article-title":"Blockchain based secure data storage and access control system using IPFS","volume":"7","author":"Desai","year":"2020","journal-title":"J. Crit. Rev."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1122","DOI":"10.1016\/j.future.2019.07.037","article-title":"Design of personnel big data management system based on blockchain","volume":"101","author":"Chen","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Jung, Y.M., and Jang, W.J. (2017, January 18\u201320). Data management and searching system and method to provide increased security for IoT platform. Proceedings of the 2017 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea.","DOI":"10.1109\/ICTC.2017.8190803"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Javed, M.U., Rehman, M., Javaid, N., Aldegheishem, A., Alrajeh, N., and Tahir, M. (2020). Blockchain-based secure data storage for distributed vehicular networks. Appl. Sci., 10.","DOI":"10.3390\/app10062011"},{"key":"ref_36","unstructured":"(2021, May 23). Truffle Suite. Available online: Https:\/\/truffleframework.com\/docs\/ganache\/overview."},{"key":"ref_37","unstructured":"(2021, May 23). Metamask. Available online: https:\/\/metamask.io\/."},{"key":"ref_38","unstructured":"(2021, May 25). Node.js. Available online: https:\/\/nodejs.org\/en\/."},{"key":"ref_39","unstructured":"(2021, May 25). Truffle Framework. Available online: https:\/\/www.trufflesuite.com\/truffle."},{"key":"ref_40","unstructured":"(2021, July 19). Hyperledger Besu. Available online: https:\/\/www.hyperledger.org\/use\/besu."},{"key":"ref_41","unstructured":"(2021, July 19). Hyperledger Caliper. Available online: https:\/\/hyperledger.github.io\/caliper\/."},{"key":"ref_42","unstructured":"Performance and Scale Working Group (2021, May 19). Hyperledger Blockchain Performance Metrics. Available online: https:\/\/www.hyperledger.org\/learn\/publications\/blockchain-performance-metrics."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/13\/11\/1990\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:19:53Z","timestamp":1760167193000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/13\/11\/1990"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,21]]},"references-count":42,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2021,11]]}},"alternative-id":["sym13111990"],"URL":"https:\/\/doi.org\/10.3390\/sym13111990","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,21]]}}}