CFP last date
01 May 2024
Call for Paper
June Edition
CAE solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 01 May 2024

Submit your paper
Know more
Reseach Article

Security and Privacy Preservation on Cloud-based Big Data Analysis (CBDA): A Review

by Hemanth Kumar N. P., Prabhudeva S.
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 6 - Number 1
Year of Publication: 2016
Authors: Hemanth Kumar N. P., Prabhudeva S.
10.5120/cae2016652416

Hemanth Kumar N. P., Prabhudeva S. . Security and Privacy Preservation on Cloud-based Big Data Analysis (CBDA): A Review. Communications on Applied Electronics. 6, 1 ( Oct 2016), 35-42. DOI=10.5120/cae2016652416

@article{ 10.5120/cae2016652416,
author = { Hemanth Kumar N. P., Prabhudeva S. },
title = { Security and Privacy Preservation on Cloud-based Big Data Analysis (CBDA): A Review },
journal = { Communications on Applied Electronics },
issue_date = { Oct 2016 },
volume = { 6 },
number = { 1 },
month = { Oct },
year = { 2016 },
issn = { 2394-4714 },
pages = { 35-42 },
numpages = {9},
url = { https://www.caeaccess.org/archives/volume6/number1/668-2016652416/ },
doi = { 10.5120/cae2016652416 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-09-04T19:56:36.639560+05:30
%A Hemanth Kumar N. P.
%A Prabhudeva S.
%T Security and Privacy Preservation on Cloud-based Big Data Analysis (CBDA): A Review
%J Communications on Applied Electronics
%@ 2394-4714
%V 6
%N 1
%P 35-42
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The term Big Data is nothing but large voluminous data, more complex data and relationship analysis of these data sets. The today's organizations, business units, government sectors, etc. are adopting the big data technique to store the enormous data generated by them. With all the significances of the big data as per economic and social benefits, lacks with many issues related to the security and privacy of the data. The modern ethnology like cloud computing will offer a scalable service for the big data with optimized cost. But the concern of privacy and security is still unsolved. This paper reflects the survey over the cloud-based big data security and privacy preservation. The survey discusses the recent work carried for privacy preservation and also existing research gap. The survey states a significant section for the future research line-up.

References
  1. M. Mayilvaganan and M. Sabitha, "A cloud-based architecture for Big-Data analytics in smart grid: A proposal," Computational Intelligence and Computing Research (ICCIC), IEEE International Conference, Enathi, pp. 1-4, 2013
  2. G. Baciu, C. Li, Y. Wang and X. Zhang, "Clouds: Cloud-based cognition for large streaming data," Cognitive Informatics & Cognitive Computing (ICCI*CC), 2015 IEEE 14th International Conference, Beijing, 2015, pp. 333-338.
  3. Y. Tamura, K. Miyaoka and S. Yamada, "Reliability analysis based on three-dimensional stochastic differential equation for big data on cloud computing," 2014 IEEE International Conference on Industrial Engineering and Engineering Management, Bandar Sunway, 2014, pp. 863-867.f
  4. Guo, Jian, Zhao-Meng Zhu, Xiu-Min Zhou, and Gong-Xuan Zhang. "An instances placement algorithm based on disk i/o load for big data in private cloud." In Wavelet Active Media Technology and Information Processing (ICWAMTIP), 2012 International Conference on, pp. 287-290. IEEE, 2012.
  5. Pant, Vinay Kumar, Jyoti Prakash, and Amit Asthana. "Three step data security model for cloud computing based on RSA and steganography." Green Computing and Internet of Things (ICGCIoT), 2015 International Conference on. IEEE, 2015.
  6. S. Luo; G. Zhang; C. Wu; S. Khan; K. Li, "Boafft: Distributed Deduplication for Big Data Storage in the Cloud," in IEEE Transactions on Cloud Computing , vol.PP, no.99, pp.1-1.
  7. Lemoudden, Mouad, and Bouabid El Ouahidi. "Managing cloud-generated logs using big data technologies." Wireless Networks and Mobile Communications (WINCOM), 2015 International Conference on. IEEE, 2015.
  8. Adnan, Muhammad, et al. "Minimizing big data problems using cloud computing based on Hadoop architecture." 2014 11th Annual High Capacity Optical Networks and Emerging/Enabling Technologies (Photonics for Energy). IEEE, 2014.
  9. Banditwattanawong, Thepparit, Masawee Masdisornchote, and Putchong Uthayopas. "Economical and efficient big data sharing with i-Cloud." 2014 International Conference on Big Data and Smart Computing (BIGCOMP). IEEE, 2014.
  10. Spicuglia, Sebastiano, et al. "Optimizing capacity allocation for big data applications in cloud datacenters." 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM). IEEE, 2015.
  11. Sharif, Ather, et al. "Current security threats and prevention measures relating to cloud services, Hadoop concurrent processing, and big data." Big Data (Big Data), 2015 IEEE International Conference on. IEEE, 2015.
  12. Essa, Youssef M., Gamal Attiya, and Ayman El-Sayed. "Mobile agent based new framework for improving big data analysis." Cloud Computing and Big Data (CloudCom-Asia), 2013 International Conference on. IEEE, 2013.
  13. Cao, Jiuxin, et al. "Entropy‐based denial‐of‐service attack detection in cloud data center." Concurrency and Computation: Practice and Experience 27.18 (2015): 5623-5639.
  14. Zheng, Di, Kerong Ben, and Hongliang Yuan. "Research of Big Data Space-Time Analytics for Clouding Based Contexts-Aware IOV Applications." Advanced Cloud and Big Data (CBD), 2014 Second International Conference on. IEEE, 2014.
  15. Gohil, Parth, Dweepna Garg, and Bakul Panchal. "A performance analysis of MapReduce applications on big data in cloud based Hadoop." Information Communication and Embedded Systems (ICICES), 2014 International Conference on. IEEE, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Big data Cloud Computing Privacy and security issues