Big Data Services Security and Security Challenges in Cloud Environment

Raed Alsufyani, Khursand Jama, Yulin Yao, Muthu Ramachandran, Victor Chang

2016

Abstract

This paper explores security issues of storage in the cloud and the methodologies that can be used to improve the security level. This study is concluded with a discussion of current problems and the future direction of cloud computing. Big data analysis can also be classified into memory level analysis, business intelligence (BI) level analysis, and massive level analysis. This research paper is based on cloud computing security and data storage issues that organizations face when they upload their data to the cloud in order to share it with their customers. Most of these issues are acknowledged in this paper, and there is also discussion of the various perspectives on cloud computing issues.

References

  1. Archer, J., Cullinane, D. and Puhlmann, N. et al (2009). Security Guidance for Critical Areas of Focus in Cloud Computing, 2.1.
  2. Alsufyani, R. and Chang, V., 2015. Risk Analysis of Business Intelligence in Cloud Computing.
  3. Bell, J. (1993). The Irish troubles. New York: St. Martin's Press.
  4. Bell, J. (1999). Doing your research project. Buckingham [England]: Open University Press.
  5. Biggam, J. (2008). Succeeding With Your Master's Dissertation. Maidenhead: McGraw-Hill International (UK) Ltd.
  6. Chang, V., 2014. A proposed model to analyse risk and return for Cloud adoption. Lambert Acedemic Publishing.
  7. Chang, V., Ramachandran, M., Yao, Y., Kuo, Y.H. and Li, C.S., 2016. A resiliency framework for an enterprise cloud. International Journal of Information Management, 36(1), pp.155-166.
  8. Chang, V. (2014). The Business Intelligence as a Service in the Cloud. Future Generation Computer Systems, 37, pp.512-534.
  9. Chang, V., 2015. Towards a Big Data system disaster recovery in a Private Cloud. Ad Hoc Networks, 35, pp.65-82.
  10. Chang, V., Walters, R.J. and Wills, G.B., 2015. Cloud Computing and Frameworks for Organisational Cloud Adoption. Delivery and Adoption of Cloud Computing Services in Contemporary Organizations, p.1.
  11. Chang, V., Kuo, Y.H. and Ramachandran, M., 2016. Cloud Computing Adoption Framework-a security framework for business clouds. Future Generation Computer Systems.57, pp24-41.
  12. Chang, V., John Walters, R. and Wills, G. (2011). Cloud Storage in a private cloud deployment: Lessons for Data Intensive research.
  13. Chang, V., Walters, R.J. and Wills, G., 2013. The development that leads to the Cloud Computing Business Framework. International Journal of Information Management, 33(3), pp.524-538.
  14. Chen, Y., Paxson, V. and Katz, R. (2010). What's New About Cloud Computing Security?.
  15. Mohamed Talib, A., Atan, R., Abdullah, R. and AzrifahAzmi Murad, M. (2012). Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture. Journal of Information Security, 03(04), pp.295-306.
  16. Mohamed Talib, A., Atan, R., Abdullah, R. and AzrifahAzmi Murad, M. (2012). Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture. Journal of Information Security, 03(04), pp.295-306.
  17. Passary, S. (2014). Cloud computing is the future but not if security problems persist. [online] Tech Times. Available at: http://www.techtimes.com/articles/8449/20140615/clo ud-computing-is-the-future-but-not-if-securityproblems-persist.htm [Accessed 11 May 2015].
  18. Passary, S. (2014). Cloud computing is the future but not if security problems persist. [online] Tech Times. Available at: http://www.techtimes.com/articles/8449/20140615/clo ud-computing-is-the-future-but-not-if-securityproblems-persist.htm [Accessed 11 May 2015].
  19. Ramireddy, S et al. (2010). Privacy and Security Practices in the Arena of Cloud Computing - A Research in Progress.
  20. Rashidi, A. (2012). A Model for User Trust in Cloud Computing. International Journal on Cloud Computing: Services and Architecture, 2(2), pp.1-8.
  21. Robinson, N., Valeri, L., Cave, J., Starkey, T., Graux, H., Creese, S. and Hopkins, P. (2010). The Cloud: Understanding the Security, Privacy and Trust Challenges. SSRN Electronic Journal.
  22. (2012). A Descriptive Literature Review and Classification of Cloud Computing Research.
  23. Zhou, Z. (2014). Data Security and Privacy in Cloud Computing.
  24. Zissis, D. and Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), pp.583-592.
  25. Zissis, D. and Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), pp.583-592.
Download


Paper Citation


in Harvard Style

Alsufyani R., Jama K., Yao Y., Ramachandran M. and Chang V. (2016). Big Data Services Security and Security Challenges in Cloud Environment . In Proceedings of the International Conference on Internet of Things and Big Data - Volume 1: RAIBS, (IOTBD 2016) ISBN 978-989-758-183-0, pages 461-468. DOI: 10.5220/0005948904610468


in Bibtex Style

@conference{raibs16,
author={Raed Alsufyani and Khursand Jama and Yulin Yao and Muthu Ramachandran and Victor Chang},
title={Big Data Services Security and Security Challenges in Cloud Environment},
booktitle={Proceedings of the International Conference on Internet of Things and Big Data - Volume 1: RAIBS, (IOTBD 2016)},
year={2016},
pages={461-468},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005948904610468},
isbn={978-989-758-183-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Internet of Things and Big Data - Volume 1: RAIBS, (IOTBD 2016)
TI - Big Data Services Security and Security Challenges in Cloud Environment
SN - 978-989-758-183-0
AU - Alsufyani R.
AU - Jama K.
AU - Yao Y.
AU - Ramachandran M.
AU - Chang V.
PY - 2016
SP - 461
EP - 468
DO - 10.5220/0005948904610468