Review: An Evaluation of Major Threats in Cloud Computing Associated with Big Data

被引:0
|
作者
Kaur, Kamalpreet [1 ]
Syed, Ali [1 ]
Mohammad, Azeem [1 ]
Halgamuge, Malka N. [1 ]
机构
[1] Charles Sturt Univ, Sch Comp & Math, Melbourne, Vic 3000, Australia
关键词
Big Data; MapReduce; Cloud computing; RDBM; SECURITY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In today's corporate society, the productivity, stability, and management of an organization relies upon the power of databases. Most organizations outsource their databases in the form of big data and then transfer it into cloud. Although cloud computing technology brings many benefits for an organization, their security risk factor still remains as a big barrier for its wide-spread adoption. Therefore, this problem poses a critical question such as: Is information secure in cloud? Due to this uncertainty, the primary aim of this study is to describe and identify most vulnerable aspects of security threats in cloud environment through content analysis and highlight and evaluate gaps in the literature to draw scholarly attention. This paper analyzed content to source data that helps to identify gaps in the literature. These gaps then have been identified and evaluated to answer questions with possible solutions. This research will help both vendors and users about security issues that have been heightened with recent population advancements and demands that have been pointed out for improvement. This study has reviewed literature in the field over the span of six years, and endeavors to seek answers for the question and cast solutions through thorough evaluation and analysis: the security related issues in cloud computing associated with big data must be taking into account by security practitioners when assessing the needs of service providers. This study has found that cloud environment is an innovation, and the blend of parallel computing and cloud computing can offer various advantages. It is ideal for different kinds of applications that can suit different needs if expenses of application modifications consolidate the cost of setup and maintenance of cloud computing. This study has analyzed content and has also found that management solution of only one big secure data after integrating it with cloud needs yet to be designed.
引用
收藏
页码:373 / 377
页数:5
相关论文
共 50 条
  • [1] Cloud computing and data security threats taxonomy: A review
    Farsi, Mohammed
    Ali, Munwar
    Shah, Reehan Ali
    Wagan, Asif Ali
    Kharabsheh, Radwan
    Journal of Intelligent and Fuzzy Systems, 2020, 38 (03): : 2529 - 2537
  • [2] Cloud computing and data security threats taxonomy: A review
    Farsi, Mohammed
    Ali, Munwar
    Shah, Reehan Ali
    Wagan, Asif Ali
    Kharabsheh, Radwan
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (03) : 2517 - 2527
  • [3] A Systematic Review of Cloud Computing, Big Data and Databases on the Cloud
    Litchfield, Alan T.
    Althouse, Jacqui
    AMCIS 2014 PROCEEDINGS, 2014,
  • [4] Application Of Cloud Computing In Biomedicine Big Data Analysis Cloud Computing In Big Data
    Yang, Tianyi
    Zhao, Yang
    2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET), 2017,
  • [5] Cloud Computing and Big Data
    Hsu, Ching-Hsien
    Tang, Chunming
    Esteves, Rui M.
    JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (06): : 995 - 997
  • [6] Big data and cloud computing
    Shrestha, Rasu B.
    APPLIED RADIOLOGY, 2014, 43 (03) : 32 - 34
  • [7] A Critical Review of Cloud Computing Environment for Big Data Analytics
    Dzulhikam, Dzulaisar
    Rana, Muhammad Ehsan
    2022 INTERNATIONAL CONFERENCE ON DECISION AID SCIENCES AND APPLICATIONS (DASA), 2022, : 76 - 81
  • [8] Data Security in Cloud Computing: Threats and Countermeasures
    Chen, Yi-Fan
    Suo, Hui
    Liu, Zhuo-Hua
    2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SECURITY (CSIS 2016), 2016, : 181 - 185
  • [9] A REVIEW OF THREATS AND VULNERABILITIES TO CLOUD COMPUTING EXISTENCE
    Efozia, N. F.
    Ariwa, E.
    Asogwa, D. C.
    Awonusi, O.
    Anigbogu, S. O.
    2017 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH 2017), 2017, : 197 - 204
  • [10] A Critical Review of Security Threats in Cloud Computing
    Irfan, Mahroosh
    Usman, Muhammad
    Zhuang, Yan
    Fong, Simon
    2015 3RD INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE (ISCBI 2015), 2015, : 105 - 111