Big Data Security in Cloud Environment

被引:5
作者
Reddy, Yenumula B. [1 ]
机构
[1] Grambling State Univ, Dept Comp Sci, Grambling, LA 71245 USA
来源
2018 IEEE 4TH INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), 4THIEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 3RD IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS) | 2018年
关键词
Big data; cloud computing; big data issues; big data security; access rights; cloud environment; authentication; sensitive data;
D O I
10.1109/BDS/HPSC/IDS18.2018.00033
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Big data conventionally coins large volume of data that continuously increases in a real-time basis and difficult to store, retrieve, and process in traditional database techniques. But it is necessary to know that big data is unstructured and does not follow the conventional storage retrieval methods. The challenges are to store in a cloud, process, and develop meaningful form so that it is useful to the businesses, government, and customers. This paper discusses the current challenges to store, retrieve, process, and implement security requirements, and possible solutions. We further provide the security model in a dynamic cloud environment to store, process and retrieve the data.
引用
收藏
页码:100 / 106
页数:7
相关论文
共 24 条
  • [1] Ali Ahmad ElmustaphaSyed., 2014, International Journal of Computer Science and Software Engineering (IJCSSE), V3, P78
  • [2] [Anonymous], 2017, Technical Report
  • [3] Asuncao Marcos D., 2015, J PARALLEL DISTRIBUT, V79-80
  • [4] Branch R., 2014, Journal of Software Engineering and Applications, V07, P686, DOI [10.4236/jsea.2014.78063, DOI 10.4236/JSEA.2014.78063]
  • [5] Breggin Linda K., 2014, BIG DATA BIG CHALLEN
  • [6] Gai K., 2017, IEEE T IND INFORM
  • [7] SA-EAST: Security-Aware Efficient Data Transmission for ITS in Mobile Heterogeneous Cloud Computing
    Gai, Keke
    Qiu, Longfei
    Chen, Min
    Zhao, Hui
    Qiu, Meikang
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (02)
  • [8] GAI KK, 2017, IEEE TRANSACTIONS ON, V16
  • [9] Gholami A., 2016, International Journal of Network Security Its Applications, V8, P59
  • [10] Inukollu V.N., 2014, International Journal of Network Security its Applications, V6, P45, DOI [10.5121/ijnsa.2014.6304, DOI 10.5121/IJNSA.2014.6304]