Review: An Evaluation of Major Threats in Cloud Computing Associated with Big Data

被引:0
作者
Kaur, Kamalpreet [1 ]
Syed, Ali [1 ]
Mohammad, Azeem [1 ]
Halgamuge, Malka N. [1 ]
机构
[1] Charles Sturt Univ, Sch Comp & Math, Melbourne, Vic 3000, Australia
来源
2017 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA ANALYSIS (ICBDA) | 2017年
关键词
Big Data; MapReduce; Cloud computing; RDBM; SECURITY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In today's corporate society, the productivity, stability, and management of an organization relies upon the power of databases. Most organizations outsource their databases in the form of big data and then transfer it into cloud. Although cloud computing technology brings many benefits for an organization, their security risk factor still remains as a big barrier for its wide-spread adoption. Therefore, this problem poses a critical question such as: Is information secure in cloud? Due to this uncertainty, the primary aim of this study is to describe and identify most vulnerable aspects of security threats in cloud environment through content analysis and highlight and evaluate gaps in the literature to draw scholarly attention. This paper analyzed content to source data that helps to identify gaps in the literature. These gaps then have been identified and evaluated to answer questions with possible solutions. This research will help both vendors and users about security issues that have been heightened with recent population advancements and demands that have been pointed out for improvement. This study has reviewed literature in the field over the span of six years, and endeavors to seek answers for the question and cast solutions through thorough evaluation and analysis: the security related issues in cloud computing associated with big data must be taking into account by security practitioners when assessing the needs of service providers. This study has found that cloud environment is an innovation, and the blend of parallel computing and cloud computing can offer various advantages. It is ideal for different kinds of applications that can suit different needs if expenses of application modifications consolidate the cost of setup and maintenance of cloud computing. This study has analyzed content and has also found that management solution of only one big secure data after integrating it with cloud needs yet to be designed.
引用
收藏
页码:373 / 377
页数:5
相关论文
共 23 条
  • [1] [Anonymous], 2015, IEEE CLOUD COMPUT, V2, pc2
  • [2] [Anonymous], 2010, NSDI
  • [3] Big Data security and privacy: A review
    Bardi, Matturdi
    Zhou Xianwei
    Li Shuai
    Lin Fuhong
    [J]. CHINA COMMUNICATIONS, 2014, 11 (02) : 135 - 145
  • [4] Betcher T., 2010, CLOUD COMPUTING KEY
  • [5] Bleikertz S., 2010, SECURITY AUDITS MULT
  • [6] Pham DV, 2010, PR ELECTROMAGN RES S, P350
  • [7] Universal serial bus based software attacks and protection solutions
    Dung Vu Pham
    Syed, Ali
    Halgamuge, Malka N.
    [J]. DIGITAL INVESTIGATION, 2011, 7 (3-4) : 172 - 184
  • [8] Erl T., 2013, CLOUD COMPUTING
  • [9] Gatewood Brent, 2009, Information Management Journal, V43, P32
  • [10] Gholami A., 2016, International Journal of Network Security Its Applications, V8, P59