{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T07:27:24Z","timestamp":1769066844162,"version":"3.49.0"},"reference-count":44,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T00:00:00Z","timestamp":1690243200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European University of Atlantic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Systems"],"abstract":"<jats:p>The rapid generation of data from various sources by the public sector, private corporations, business associations, and local communities is referred to as big data. This large and complex dataset is often regarded as the \u2018new oil\u2019 by public administrations (PAs), and data-driven approaches are employed to transform it into valuable insights that can improve governance, transparency, digital services, and public engagement. The government\u2019s big-data ecosystem (GBDE) is a result of this initiative. Effective data management is the first step towards large-scale data analysis, which yields insights that benefit your work and your customers. However, managing big data throughout its life cycle is a daunting challenge for public agencies. Despite its widespread use, big data management is still a significant obstacle. To address this issue, this study proposes a hybrid approach to secure the data management life cycle for GBDE. Specifically, we use a combination of the ECC algorithm with AES 128 BITS encryption to ensure that the data remain confidential and secure. We identified and analyzed various data life cycle models through a systematic literature review to create a data management life cycle for data-driven governments. This approach enhances the security and privacy of data management and addresses the challenges faced by public agencies.<\/jats:p>","DOI":"10.3390\/systems11080380","type":"journal-article","created":{"date-parts":[[2023,7,26]],"date-time":"2023-07-26T01:09:01Z","timestamp":1690333741000},"page":"380","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Secure Data Management Life Cycle for Government Big-Data Ecosystem: Design and Development Perspective"],"prefix":"10.3390","volume":"11","author":[{"given":"Reeba","family":"Zahid","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Engineering & Technology, (UET), Lahore P.O. Box No. 54890, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6446-4945","authenticated-orcid":false,"given":"Ayesha","family":"Altaf","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Engineering & Technology, (UET), Lahore P.O. Box No. 54890, Pakistan"}]},{"given":"Tauqir","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Engineering & Technology, (UET), Lahore P.O. Box No. 54890, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5536-8764","authenticated-orcid":false,"given":"Faiza","family":"Iqbal","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Engineering & Technology, (UET), Lahore P.O. Box No. 54890, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0080-7176","authenticated-orcid":false,"given":"Yini Airet Mir\u00f3","family":"Vera","sequence":"additional","affiliation":[{"name":"Research Group on Foods, Universidad Europea del Atl\u00e1ntico, Isabel Torres 21, 39011 Santander, Spain"},{"name":"Research Group on Foods, Universidad Internacional Iberoamericana, Arecibo, PR 00613, USA"},{"name":"Department of Project Management, Universidade Internacional do Cuanza, Cuito EN250, Bie, Angola"},{"name":"Fundaci\u00f3n Universitaria Internacional de Colombia, Bogota 111311, Colombia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5524-5366","authenticated-orcid":false,"given":"Miguel Angel L\u00f3pez","family":"Flores","sequence":"additional","affiliation":[{"name":"Research Group on Foods, Universidad Europea del Atl\u00e1ntico, Isabel Torres 21, 39011 Santander, Spain"},{"name":"Department of Project Management, Universidad Internacional Iberoamericana, Campeche 24560, Mexico"},{"name":"Instituto Polit\u00e9cnico Nacional, UPIICSA, Mexico City 04510, Mexico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8271-6496","authenticated-orcid":false,"given":"Imran","family":"Ashraf","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Yeungnam University, Gyeongsan 38541, Republic of Korea"}]}],"member":"1968","published-online":{"date-parts":[[2023,7,25]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s42044-018-0024-3","article-title":"Construing the Big Data Based on Taxonomy, Analytics and Approaches","volume":"1","author":"Pathak","year":"2018","journal-title":"Iran. J. Comput. Sci."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1080\/10919392.2015.1125187","article-title":"Big data in the policy cycle: Policy decision making in the digital era","volume":"26","author":"Parycek","year":"2016","journal-title":"J. Organ. Comput. Electron. Commer."},{"key":"ref_3","unstructured":"Nobubele, A., and Mtsweni, J. (2016). Big Data Privacy and Security: A Systematic Analysis of Current and Future Challenges, University of South Africa."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1016\/j.procs.2018.10.199","article-title":"Security Model for Big Healthcare Data Lifecycle","volume":"141","author":"Khalouf","year":"2018","journal-title":"Procedia Comput. Sci."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"111692","DOI":"10.1109\/ACCESS.2019.2933919","article-title":"Requirements of an energy data ecosystem","volume":"7","author":"Immonen","year":"2019","journal-title":"IEEE Access"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"4","DOI":"10.7152\/acro.v24i1.14671","article-title":"Veracity roadmap: Is big data objective, truthful and credible?","volume":"24","author":"Lukoianova","year":"2014","journal-title":"Adv. Classif. Res. Online"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1186\/s40537-019-0281-5","article-title":"Big Data Monetization throughout Big Data Value Chain: A Comprehensive Review","volume":"7","author":"Faroukhi","year":"2020","journal-title":"J. Big Data"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1057\/dddmp.2014.3","article-title":"The consumer data revolution: The reshaping of industry competition and a new perspective on privacy","volume":"15","author":"Becker","year":"2014","journal-title":"J. Direct Data Digit. Mark. Pract."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"4","DOI":"10.7191\/jeslib.2012.1004","article-title":"DataONE: Facilitating eScience through Collaboration","volume":"1","author":"Allard","year":"2012","journal-title":"J. EScience Libr."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Arass, M.E., Tikito, I., and Souissi, N. (2017, January 17\u201319). Data lifecycles analysis: Towards intelligent cycle. Proceedings of the 2017 Intelligent Systems and Computer Vision (ISCV), Fez, Morocco.","DOI":"10.1109\/ISACV.2017.8054938"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"111318","DOI":"10.1016\/j.chaos.2021.111318","article-title":"Double image encryption algorithm based on neural network and chaos","volume":"152","author":"Man","year":"2021","journal-title":"Chaos Solitons Fractals"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1049\/ipr2.12263","article-title":"Medical image encryption scheme based on self-verification matrix","volume":"15","author":"Man","year":"2021","journal-title":"IET Image Process."},{"key":"ref_13","unstructured":"Group DSR, and Structural Reform Group (2023, May 21). Overview of the DDI Version 3.0 Conceptual Model. Available online: http:\/\/opendatafoundation.org\/ddi\/srg\/Papers\/DDIModel_v_4.pdf."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.tree.2011.11.016","article-title":"Ecoinformatics: Supporting ecology as a data-intensive science","volume":"27","author":"Michener","year":"2012","journal-title":"Trends Ecol. Evol."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Demchenko, Y., de Laat, C., and Membrey, P. (2014, January 19\u201323). Defining architecture components of the Big Data Ecosystem. Proceedings of the 2014 International Conference on Collaboration Technologies and Systems (CTS), Minneapolis, MN, USA.","DOI":"10.1109\/CTS.2014.6867550"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.giq.2016.01.003","article-title":"Planning and designing open government data programs: An ecosystem approach","volume":"33","author":"Dawes","year":"2016","journal-title":"Gov. Inf. Q."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Magalhaes, G., Roseira, C., and Manley, L. (2014, January 27\u201330). Business models for open government data. Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance, Guimaraes, Portugal.","DOI":"10.1145\/2691195.2691273"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Arass, M.E., Tikito, I., and Souissi, N. (2018, January 15\u201316). An audit framework for data lifecycles in a big data context. Proceedings of the 2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT), Tianjin, China.","DOI":"10.1109\/MoWNet.2018.8428883"},{"key":"ref_19","first-page":"102593","article-title":"An efficient security data-driven approach for implementing risk assessment","volume":"54","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_20","unstructured":"IBM (2013). Wrangling Big Data: Fundamentals of Data Lifecycle Management, IBM Managing Data Lifecycle."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Lmekki, H., Chiadmi, D., and Lamharhar, H. (2019, January 7\u20139). Open Government Data. Proceedings of the ArabWIC 6th Annual International Conference Research Track on\u2014ArabWIC, Rabat, Morocco.","DOI":"10.1145\/3333165.3333180"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/j.profnurs.2020.06.003","article-title":"A survey of current practices in data management education in nursing doctoral programs","volume":"37","author":"Raszewski","year":"2021","journal-title":"J. Prof. Nurs."},{"key":"ref_23","unstructured":"Heimst\u00e4dt, M., Saunderson, F., and Heath, T. (2014, January 21\u201323). Conceptualizing Open Data Ecosystems: A timeline analysis of Open Data development in the UK. Proceedings of the International Conference for E-Democracy and Open Government (CeDEM204), Krems, Austria."},{"key":"ref_24","unstructured":"NIST Big Data Public Working Group, and Subgroup (2015). NIST Big Data Interoperability Framework: Volume 2, Big Data Taxonomies, Technical Report."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.procs.2019.01.090","article-title":"The role of CRIS\u2019s in the research life cycle. A case study on implementing a FAIR RDM policy at Radboud University, the Netherlands","volume":"146","author":"Jetten","year":"2019","journal-title":"Proc. Comput. Sci."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1016\/j.procs.2020.06.042","article-title":"Data life cycle management in big data analytics","volume":"173","author":"Rahul","year":"2020","journal-title":"Proc. Comput. Sci."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1108\/02635570310506106","article-title":"Understanding web content management systems: Evolution, lifecycle and market","volume":"103","author":"McKeever","year":"2003","journal-title":"Ind. Manage. Data Syst."},{"key":"ref_28","unstructured":"Ball, A. (2023, May 18). Review of Data Management Lifecycle Models. Available online: http:\/\/opus.bath.ac.uk\/28587\/1\/redm1rep120110ab10.pdf."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"El Arass, M., and Souissi, N. (2018, January 21\u201327). Data Lifecycle: From Big Data to SmartData. Proceedings of the 2018 IEEE 5th International Congress on Information Science and Technology (CiSt), Marrakech, Morocco.","DOI":"10.1109\/CIST.2018.8596547"},{"key":"ref_30","first-page":"1","article-title":"Big data: Survey, technologies, opportunities, and challenges","volume":"2014","author":"Khan","year":"2014","journal-title":"Sci. World J."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1109\/TBDATA.2017.2737463","article-title":"Context-driven granular disclosure control for internet of things applications","volume":"5","author":"Yavari","year":"2019","journal-title":"IEEE Trans. Big Data"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1007\/s11036-020-01646-9","article-title":"An Analysis of Blockchain and GDPR under the Data Lifecycle Perspective","volume":"26","author":"Freund","year":"2021","journal-title":"Mob. Netw. Appl."},{"key":"ref_33","unstructured":"Wikipedia (2023, April 10). Cloud Computing. Available online: https:\/\/en.wikipedia.org\/wiki\/Cloud_computing."},{"key":"ref_34","unstructured":"LaChapelle, C. (2017, April 10). The Cost of Data Storage and Management: Where Is It Headed in 2016. Available online: https:\/\/www.datacenterjournal.com\/cost-data-storage-management-headed-2016\/."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"35","DOI":"10.3141\/2291-05","article-title":"Monitoring Travel Time Reliability from the Cloud","volume":"2291","author":"Lei","year":"2012","journal-title":"Transp. Res. Rec. J. Transp. Res. Board"},{"key":"ref_36","unstructured":"Miller, M. (2015). Telephone Discussion with Stephen Lockwood, PB Consult."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/j.comcom.2010.03.032","article-title":"Android\/OSGi-based Vehicular Network Management System","volume":"34","author":"Chen","year":"2011","journal-title":"Comput. Commun."},{"key":"ref_38","unstructured":"EMC, D. (2017, April 04). Dell EMC Glossary: Data Archiving. Available online: https:\/\/www.emc.com\/corporate\/glossary\/data-archiving.htm."},{"key":"ref_39","unstructured":"Olmstead, K., and Smith, A. (2017). Americans and Cybersecurity, Pew Research Center."},{"key":"ref_40","unstructured":"Hibbard, E.A., and Austin, R. (2008). Storage Security Professional\u2019s Guide to Skills and Knowledge, SNIA."},{"key":"ref_41","unstructured":"(2023, May 17). ComputerWeekly.com. Data Storage Security: What It Is and the Key Components of a Storage Security Strategy. Available online: http:\/\/www.computerweekly.com\/feature\/Data-storage-security-What-it-is-and-the-key-components-of-a-storage-security-strategy."},{"key":"ref_42","unstructured":"Texas State Legislature (2023, May 17). Unauthorized Use of Identifying Information. Available online: http:\/\/www.statutes.legis.state.tx.us\/Docs\/BC\/htm\/BC.521.htm."},{"key":"ref_43","unstructured":"Ahn, K., Rakha, H., and Hill, D. (2008). Data Quality White Paper, Technical Report FHWA-HOP-08-038."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Mahalle, V.S., and Shahade, A.K. (2014, January 6\u20138). Enhancing the data security in Cloud by implementing hybrid (Rsa & Aes) encryption algorithm. Proceedings of the 2014 International Conference on Power, Automation and Communication (INPAC), Maharashtra, India.","DOI":"10.1109\/INPAC.2014.6981152"}],"container-title":["Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2079-8954\/11\/8\/380\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T20:18:29Z","timestamp":1760127509000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2079-8954\/11\/8\/380"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,25]]},"references-count":44,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2023,8]]}},"alternative-id":["systems11080380"],"URL":"https:\/\/doi.org\/10.3390\/systems11080380","relation":{},"ISSN":["2079-8954"],"issn-type":[{"value":"2079-8954","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,25]]}}}