Abstract

Big Data Security and Privacy Issues in the CLOUD

Highlights

  • INTRODUCTIONMany organizations demand efficient solutions to store and analyze these big amount data that are preliminary generated from various sources such as high throughput instruments, sensors or connected devices

  • During recent years, data production rate has been growing exponentially [1, 11]

  • Big data technologies can utilize cloud computing to provide significant benefits, such as the availability of automated tools to assemble, connect, configure and reconfigure virtualized resources on demand. These make it much easier to meet organizational goals as organizations can deploy cloud services. This shift in paradigm that accompanies the adoption of cloud computing is increasingly giving rise to security and privacy considerations relating to facets of cloud computing such as multitenancy, trust, loss of control and accountability [69]

Read more

Summary

INTRODUCTION

Many organizations demand efficient solutions to store and analyze these big amount data that are preliminary generated from various sources such as high throughput instruments, sensors or connected devices For this purpose, big data technologies can utilize cloud computing to provide significant benefits, such as the availability of automated tools to assemble, connect, configure and reconfigure virtualized resources on demand. Big data technologies can utilize cloud computing to provide significant benefits, such as the availability of automated tools to assemble, connect, configure and reconfigure virtualized resources on demand These make it much easier to meet organizational goals as organizations can deploy cloud services.

KEY CONCEPTS AND TECHNOLOGIES
Big Data
Virtualization Mechanisms
Cloud Computing Characteristics
Container Technology
SECURITY AND PRIVACY CHALLENGES
Security Issues in Cloud Computing
Privacy Considerations of Processing Sensitive Data
Big Data Security Challenges
THE CLOUD SECURITY SOLUTIONS
Authentication and Authorization
Identity and Access Management
Security Monitoring and Incident Response
Security Policy Management
BIG DATA SECURITY AND PRIVACY
Big Data Infrastructures and Programming Models
Privacy-Preserving Big Data Solutions in the Cloud
Findings
CONCLUSIONS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call