perpus@umsida.ac.id +62-31-8945444

Sanjida Akrer, Sarna and Md Imran, Khan and Md, Rakibuzzaman (2024) Balancing Data Accessibility and Security in Cloud-Based Business Intelligence Systems. American Journal of Technology Advancement, 1 (6). pp. 60-88. ISSN 2997-9382

[img] Text
Balancing Data Accessibility and Security in Cloud-Based Business Intelligence Systems.pdf

Download (970kB)
Official URL: https://semantjournals.org/index.php/AJTA/article/...

Abstract

In the modern data-driven business world, Business Intelligence (BI) systems in cloud-management environments facilitate real-time decision making, scalable intelligence, and multi-user sharing of data. BI Cloud-based systems have transformed data business through scalable on demand access to analytics and decision-support tools. Organizational agility by democratizing data access in departments, yet pose a huge risk in terms of data security, data privacy and regulatory compliance. With rising business use of cloud BI platforms, the competing needs of maximum data access and highly secure systems are becoming an essential issue. This study examines this balance by examining real world security breach episodes with the Security Breach dataset that contains rich records of 173 security breaches in several firms and industries. The paper focuses on types of breach, points of origination of data, participation of third-party business associates and magnitude of compromised information. It is worth noting that the most common breaches identified effortlessly deal with breaches on network servers and portable gadgets and that external business associates make up a large percentage of these breaches. This paper shows via pattern recognition and descriptive analytics how simple cloud-based BI attacks with access controls failing, inadequately encrypted information and the absence of constant observation endangers the cloud-based BI setting through a typical variety of errors and mishaps. It also points out the trade-offs that organizations must make including empowering self-service analytics or ensuring stringent access-restrictions. The analysis provides a model that incorporates Zero Trust Architecture, Role and Attribute-Based Access Control, encryption standards and third-party control, to assist companies secure their Business Intelligence infrastructure in a way that is non-detrimental to the valid information flow. This study gives practical guidance to IT executives, security architectures, and data governance experts who want to ensure a fine balance between accessibility and security in cloud BI systems. The results stress the role of a multi-tier, policy-based solution to safeguard sensitive business information and keep the benefits of real-time cloud analytics.

Item Type: Article
Subjects: Q Science > Q Science (General)
Divisions: Postgraduate > Master's of Islamic Education
Depositing User: Journal Editor
Date Deposited: 07 Jul 2025 12:00
Last Modified: 07 Jul 2025 12:00
URI: http://eprints.umsida.ac.id/id/eprint/16270

Actions (login required)

View Item View Item