Abstract

In this paper, the review of the features of big data characteristics of cloud protection problem and research various security regulations and cloud domains were carried out. In order to perform security studies on availability and average time to failure of security, the stochastic process model was applied to analyze security. Based on this research, the use of integrated auditing for safe data storage and transaction logs is highly recommended, and transaction logs, enforcement and security reporting in real time, data climate, compliance with legislation, auditing of facilities, privacy, legality, management of identity and access, cyber threats, and granular auditing to achieve big data security advocated. The purpose of this research is to enforce the use of big data analytics for decision making and policy formulation in corporate and private organizations as well as create room for further research in cloud computing discipline. Keywords: Big data; security regulation; integrated auditing; cloud computing.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call