Algorithms for Big Data in Advanced Communication Systems and Cloud Computing

Communication Systems are becoming significant in many areas of modern everyday life. Through this field several technologies grow and contribute to the improvement of people's everyday life. Big Data (BD) appears as a technology created and developed through communication systems. Big Data refers to the large-scale amounts of data used, transferred and managed through a network. Due to data usage and even large-scale amounts of data, the use of storage space without restrictions on its use becomes necessary. This storage space provided through a technology called Cloud Computing (CC). This technology mentions to a substructure in which data storage and data processing occur in real time outside of the user's device. This work surveys BD and CC and their basic features, with a focus on the security and privacy issues of both technologies. In addition to this, we will try to combine the functionality of BD and CC with the aim to examine the frequent features, and also to discover the benefits related in security issues of their integration.

[1]  Shingo Yamaguchi,et al.  Analysis of Various Security Issues and Challenges in Cloud Computing Environment: A Survey , 2016 .

[2]  R. H. Chile,et al.  Modeling of Acoustic Wave Absorption in Ocean , 2010 .

[3]  Dijiang Huang,et al.  Mobile Cloud Computing Taxonomy , 2018 .

[4]  Paul Rodrigues,et al.  State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment , 2012, ICACCI '12.

[5]  Yaser Jararweh,et al.  Internet of surveillance: a cloud supported large-scale wireless surveillance system , 2016, The Journal of Supercomputing.

[6]  Kostas E. Psannis,et al.  Efficient and secure BIG data delivery in Cloud Computing , 2017, Multimedia Tools and Applications.

[7]  George Mastorakis,et al.  Efficient entertainment services provision over a novel network architecture , 2016, IEEE Wireless Communications.

[8]  Joe Celko Big Data and Cloud Computing , 2014 .

[9]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[10]  Saman A. Zonouz,et al.  CloudID: Trustworthy cloud-based and cross-enterprise biometric identification , 2015, Expert Syst. Appl..

[11]  Abdullah Gani,et al.  A Study on Strategic Provisioning of Cloud Computing Services , 2014, TheScientificWorldJournal.

[12]  M. Sasikumar,et al.  Data Classification for Achieving Security in Cloud Computing , 2015 .

[13]  Shashank Gupta,et al.  Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms , 2016 .

[14]  A A Izang,et al.  Big Data and Cloud Computing Issues , 2016 .

[15]  Yutaka Ishibashi,et al.  IoT-based surveillance system for ubiquitous healthcare , 2016, IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society.

[16]  Brij B. Gupta,et al.  Security challenges in cloud computing: state-of-art , 2017, Int. J. Big Data Intell..

[17]  JakoB,et al.  6 Top Tools for Taming Big Data , 2012 .

[18]  George Mastorakis,et al.  An evaluation of cloud-based mobile services with limited capacity: a linear approach , 2016, Soft Computing.

[19]  Franklin Rajkumar. v Entropy based Robust Watermarking Scheme using Hadamard Transformation Technique , 2011 .

[20]  Sachchidanand Singh,et al.  Big Data analytics , 2012 .

[21]  J. Wenny Rahayu,et al.  Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..

[22]  Narasimha Rao Vajjhala,et al.  Big Data using Cloud Computing - Opportunities for Small and Medium-sized Enterprises , 2016 .

[23]  Rajkumar Buyya,et al.  A framework for ranking of cloud computing services , 2013, Future Gener. Comput. Syst..

[24]  Hai Jin,et al.  Differentially Private Online Learning for Cloud-Based Video Recommendation With Multimedia Big Data in Social Networks , 2015, IEEE Transactions on Multimedia.

[25]  Sreekanth Rallapalli,et al.  Impact of Processing and Analyzing Healthcare Big Data on Cloud Computing Environment by Implementing Hadoop Cluster , 2016 .

[26]  Kostas E. Psannis,et al.  Recent advances delivered by Mobile Cloud Computing and Internet of Things for Big Data applications: a survey , 2017, Int. J. Netw. Manag..

[27]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[28]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[29]  Martin Hilbert,et al.  The World’s Technological Capacity to Store, Communicate, and Compute Information , 2011, Science.

[30]  Kostas E. Psannis,et al.  Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..

[31]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[32]  Stavros Valsamidis,et al.  Proposed cloud infrastructure of wearable and ubiquitous medical services , 2015, 2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC).

[33]  Mohit Bhansali,et al.  Enhancing Cloud Computing Security using AES Algorithm , 2013 .