Cloud and Big Data Security System's Review Principles: A Decisive Investigation

被引:2
|
作者
Mishra, KamtaNath [1 ]
Bhattacharjee, Vandana [1 ]
Saket, Shashwat [1 ]
Mishra, Shivam P. [1 ]
机构
[1] Birla Inst Technol, Dept Comp Sci & Engn, Deoghar 814142, Jharkhand, India
关键词
Attack prevention; Block-chain computing; Big data system; M-health systems; Security mechanism; AUTHENTICATION SCHEME; INTRUSION DETECTION; THINGS SECURITY; INTERNET; PRIVACY; IOT; INFORMATION; NETWORKS; COMMUNICATION; FRAMEWORK;
D O I
10.1007/s11277-022-09781-0
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We perceive big data with massive datasets of complex and variegated structures in the modern era. Such attributes formulate hindrances while analyzing and storing the data to generate apt aftermaths. Privacy and security are the colossal perturb in the domain space of extensive data analysis. In this paper, our foremost priority is the computing technologies that focus on big data, IoT (Internet of Things), Cloud Computing, Blockchain, and fog computing. Among these, Cloud Computing follows the role of providing on-demand services to their customers by optimizing the cost factor. AWS, Azure, Google Cloud are the major cloud providers today. Fog computing offers new insights into the extension of cloud computing systems by procuring services to the edges of the network. In collaboration with multiple technologies, the Internet of Things takes this into effect, which solves the labyrinth of dealing with advanced services considering its significance in varied application domains. The Blockchain is a dataset that entertains many applications ranging from the fields of crypto-currency to smart contracts. The prospect of this research paper is to present the critical analysis and review it under the umbrella of existing extensive data systems. In this paper, we attend to critics' reviews and address the existing threats to the security of extensive data systems. Moreover, we scrutinize the security attacks on computing systems based upon Cloud, Blockchain, IoT, and fog. This paper lucidly illustrates the different threat behaviour and their impacts on complementary computational technologies. The authors have mooted a precise analysis of cloud-based technologies and discussed their defense mechanism and the security issues of mobile healthcare.
引用
收藏
页码:1013 / 1050
页数:38
相关论文
共 50 条
  • [41] Intelligent system for interactive online education based on cloud big data analytics
    Wang, Juan
    Zhao, Bo
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2021, 40 (02) : 2839 - 2849
  • [42] Security and privacy designs based data encryption in cloud storage and challenges: A review
    Mogarala, Aruna Guruvaya
    Mohan, K. G.
    2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,
  • [43] Security and Privacy Issues in IoT-Based Big Data Cloud Systems in a Digital Twin Scenario
    Stergiou, Christos L.
    Bompoli, Elisavet
    Psannis, Konstantinos E.
    APPLIED SCIENCES-BASEL, 2023, 13 (02):
  • [44] Big Data Privacy Protection and Security Provisions of the Healthcare SecPri-BGMPOP Method in a Cloud Environment
    Kuttiyappan, Moorthi
    Appadurai, Jothi Prabha
    Kavin, Balasubramanian Prabhu
    Selvaraj, Jeeva
    Gan, Hong-Seng
    Lai, Wen-Cheng
    MATHEMATICS, 2024, 12 (13)
  • [45] Cloud-based storage and computing for remote sensing big data: a technical review
    Xu, Chen
    Du, Xiaoping
    Fan, Xiangtao
    Giuliani, Gregory
    Hu, Zhongyang
    Wang, Wei
    Liu, Jie
    Wang, Teng
    Yan, Zhenzhen
    Zhu, Junjie
    Jiang, Tianyang
    Guo, Huadong
    INTERNATIONAL JOURNAL OF DIGITAL EARTH, 2022, 15 (01) : 1417 - 1445
  • [46] General Theory of security and a study of hacker's behavior in big data era
    Yang, Yixian
    Niu, Xinxin
    Li, Lixiang
    Peng, Haipeng
    Ren, Jingfeng
    Qi, Haochun
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (02) : 210 - 219
  • [47] Application of Big Data and Machine Learning in Smart Grid, and Associated Security Concerns: A Review
    Hossain, Eklas
    Khan, Imtiaj
    Un-Noor, Fuad
    Sikander, Sarder Shazali
    Sunny, Md Samiul Haque
    IEEE ACCESS, 2019, 7 : 13960 - 13988
  • [48] A key review on security and privacy of big data: issues, challenges, and future research directions
    Doygun Demirol
    Resul Das
    Davut Hanbay
    Signal, Image and Video Processing, 2023, 17 : 1335 - 1343
  • [49] Optimal Service Distribution in Cloud Service System Subject to Data Security Constraints
    Wu, Zhao
    Wan, Zheng
    Huang, Yannong
    Gu, Qiong
    Hu, Chunyang
    Wu, Zhongbo
    JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (05): : 863 - 880
  • [50] A key review on security and privacy of big data: issues, challenges, and future research directions
    Demiroll, Doygun
    Das, Resul
    Hanbay, Davut
    SIGNAL IMAGE AND VIDEO PROCESSING, 2023, 17 (04) : 1335 - 1343