Cloud and Big Data Security System's Review Principles: A Decisive Investigation

被引:2
|
作者
Mishra, KamtaNath [1 ]
Bhattacharjee, Vandana [1 ]
Saket, Shashwat [1 ]
Mishra, Shivam P. [1 ]
机构
[1] Birla Inst Technol, Dept Comp Sci & Engn, Deoghar 814142, Jharkhand, India
关键词
Attack prevention; Block-chain computing; Big data system; M-health systems; Security mechanism; AUTHENTICATION SCHEME; INTRUSION DETECTION; THINGS SECURITY; INTERNET; PRIVACY; IOT; INFORMATION; NETWORKS; COMMUNICATION; FRAMEWORK;
D O I
10.1007/s11277-022-09781-0
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We perceive big data with massive datasets of complex and variegated structures in the modern era. Such attributes formulate hindrances while analyzing and storing the data to generate apt aftermaths. Privacy and security are the colossal perturb in the domain space of extensive data analysis. In this paper, our foremost priority is the computing technologies that focus on big data, IoT (Internet of Things), Cloud Computing, Blockchain, and fog computing. Among these, Cloud Computing follows the role of providing on-demand services to their customers by optimizing the cost factor. AWS, Azure, Google Cloud are the major cloud providers today. Fog computing offers new insights into the extension of cloud computing systems by procuring services to the edges of the network. In collaboration with multiple technologies, the Internet of Things takes this into effect, which solves the labyrinth of dealing with advanced services considering its significance in varied application domains. The Blockchain is a dataset that entertains many applications ranging from the fields of crypto-currency to smart contracts. The prospect of this research paper is to present the critical analysis and review it under the umbrella of existing extensive data systems. In this paper, we attend to critics' reviews and address the existing threats to the security of extensive data systems. Moreover, we scrutinize the security attacks on computing systems based upon Cloud, Blockchain, IoT, and fog. This paper lucidly illustrates the different threat behaviour and their impacts on complementary computational technologies. The authors have mooted a precise analysis of cloud-based technologies and discussed their defense mechanism and the security issues of mobile healthcare.
引用
收藏
页码:1013 / 1050
页数:38
相关论文
共 50 条
  • [21] Elliptic curve Diffie-Hellman cryptosystem in big data cloud security
    Subramanian, E. K.
    Tamilselvan, Latha
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (04): : 3057 - 3067
  • [22] A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era
    Han, Si
    Han, Ke
    Zhang, Shouyi
    IEEE ACCESS, 2019, 7 : 60290 - 60298
  • [23] Detecting Product Review Spammers Using Principles of Big Data
    Rout, Jitendra Kumar
    Dalmia, Anmol
    Rath, Santanu Kumar
    Mohanta, Bhabendu Kumar
    Ramasubbareddy, Somula
    Gandomi, Amir H.
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2023, 70 (07) : 2516 - 2527
  • [24] A Short Review on Data Security and Privacy Issues in Cloud Computing
    Arjun, U.
    Vinay, S.
    2016 IEEE INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ADVANCED COMPUTING (ICCTAC), 2016,
  • [25] New Hybrid Intrusion Detection and Prevention System to Ensure Security and Privacy in Big Data
    Bakir, Cigdem
    PROCEEDINGS OF 26TH INTERNATIONAL CONFERENCE ELECTRONICS 2022, 2022,
  • [26] Internet of Things Big Data Security in Cloud via Stream Cipher and Clustering Model
    K. S. Saraswathy
    S. S. Sujatha
    Wireless Personal Communications, 2022, 123 : 3483 - 3496
  • [27] LSPP: a leakage-resilient security approach for a cloud-assisted big data
    Bouleghlimat, Imene
    Boudouda, Souheila
    Hacini, Salima
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (01)
  • [28] Big Data in Cloud Computing: A Review of Key Technologies and Open Issues
    Canaj, Elena
    Xhuvani, Aleksander
    ADVANCES IN INTERNET, DATA & WEB TECHNOLOGIES, 2018, 17 : 504 - 513
  • [29] Big data's impact on privacy, security and consumer welfare
    Kshetri, Nir
    TELECOMMUNICATIONS POLICY, 2014, 38 (11) : 1134 - 1145
  • [30] Blockchain-based delegated Quantum Cloud architecture for medical big data security
    El Azzaoui, Abir
    Sharma, Pradip Kumar
    Park, Jong Hyuk
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 198