Big Data Services Security and Security Challenges in Cloud Environment

This paper explores security issues of storage in the cloud and the methodologies that can be used to improve the security level. This study is concluded with a discussion of current problems and the future direction of cloud computing. Big data analysis can also be classified into memory level analysis, business intelligence (BI) level analysis, and massive level analysis. This research paper is based on cloud computing security and data storage issues that organizations face when they upload their data to the cloud in order to share it with their customers. Most of these issues are acknowledged in this paper, and there is also discussion of the various perspectives on cloud computing issues.

[1]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[2]  Yanpei Chen,et al.  What's New About Cloud Computing Security? , 2010 .

[3]  J. Bowyer Bell The Irish troubles analyzed , 1993 .

[4]  Sadie Creese,et al.  The Cloud: Understanding the Security, Privacy and Trust Challenges , 2011 .

[5]  Rusli Abdullah,et al.  Security framework of cloud data storage based on Multi Agent system architecture - A pilot study , 2012, 2012 International Conference on Information Retrieval & Knowledge Management.

[6]  Richard G. Vedder,et al.  Privacy and security , 1996, CSOC.

[7]  Victor I. Chang,et al.  Risk Analysis of Business Intelligence in Cloud Computing , 2015, 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom).

[8]  Victor I. Chang,et al.  The development that leads to the Cloud Computing Business Framework , 2013, Int. J. Inf. Manag..

[9]  Muthu Ramachandran,et al.  A resiliency framework for an enterprise cloud , 2016, Int. J. Inf. Manag..

[10]  Victor I. Chang,et al.  The Business Intelligence as a Service in the Cloud , 2014, Future Gener. Comput. Syst..

[11]  Victor I. Chang,et al.  Cloud Storage in a Private Cloud Deployment - Lessons for Data Intensive Research , 2012, CLOSER.

[12]  Ralph O’Brien,et al.  Privacy and security , 2016 .

[13]  Judith Bell,et al.  教育与社科研究入门指南(第三版) = Doing Your Research Project , 1999 .

[14]  Robert John Walters,et al.  Cloud Computing and Frameworks for Organisational Cloud Adoption , 2015 .

[15]  Victor Chang,et al.  Delivery and Adoption of Cloud Computing Services in Contemporary Organizations , 2015 .

[16]  T. S. Raghu,et al.  Privacy and Security Practices in the Arena of Cloud Computing - A Research in Progress , 2010, AMCIS.

[17]  Naser Movahhedinia,et al.  A Model for User Trust in Cloud Computing , 2012, CloudCom 2012.

[18]  Junsheng Zhang,et al.  Data Security and Privacy in Cloud Computing , 2014 .

[19]  Victor Chang,et al.  A proposed model to analyse risk and return for Cloud adoption , 2014 .

[20]  Rusli Abdullah,et al.  Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture , 2012, J. Information Security.

[21]  John Biggam,et al.  Succeeding with your Master's Dissertation: A Step-by-Step Handbook , 2008 .

[22]  Victor I. Chang,et al.  Towards a Big Data system disaster recovery in a Private Cloud , 2015, Ad Hoc Networks.

[23]  Muthu Ramachandran,et al.  Cloud Computing Adoption Framework – a security framework for business clouds , 2015 .

[24]  Mary Tate,et al.  A Descriptive Literature Review and Classification of Cloud Computing Research , 2012, Commun. Assoc. Inf. Syst..