BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD

[1]  M. Anand,et al.  Cloud Monitor: Monitoring Applications in Cloud , 2012, 2012 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).

[2]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[3]  Erwin Laure,et al.  Advanced Cloud Privacy Threat Modeling , 2016, ArXiv.

[4]  Christoph Fiehe,et al.  Scalable Monitoring System for Clouds , 2013, 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing.

[5]  Anderson Santana de Oliveira,et al.  Platform-level Support for Authorization in Cloud Services with OAuth 2 , 2014, 2014 IEEE International Conference on Cloud Engineering.

[6]  Helen J. Wang,et al.  Enabling Security in Cloud Storage SLAs with CloudProof , 2011, USENIX ATC.

[7]  Martin Gilje Jaatun,et al.  Accountability for cloud and other future Internet services , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.

[8]  Vijay Varadharajan,et al.  Integrating Trust with Cryptographic Role-Based Access Control for Secure Cloud Data Storage , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[9]  Emiliano De Cristofaro,et al.  The Chills and Thrills of Whole Genome Sequencing , 2013, Computer.

[10]  Tal Garfinkel,et al.  Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.

[11]  Erik Elmroth,et al.  A Synchronization Mechanism for Cloud Accounting Systems , 2014, 2014 International Conference on Cloud and Autonomic Computing.

[12]  Ricardo Azevedo,et al.  E-Id Authentication and Uniform Access to Cloud Storage Service Providers , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[13]  Ralph Deters,et al.  SaaS Authentication Middleware for Mobile Consumers of IaaS Cloud , 2013, 2013 IEEE Ninth World Congress on Services.

[14]  Johnny Wong,et al.  Proliferating Cloud Density through Big Data Ecosystem, Novel XCLOUDX Classification and Emergence of as-a-Service Era , 2016 .

[15]  Hassan Takabi,et al.  Policy Management as a Service: An Approach to Manage Policy Heterogeneity in Cloud Computing Environment , 2012, 2012 45th Hawaii International Conference on System Sciences.

[16]  Michael Naehrig,et al.  Private Computation on Encrypted Genomic Data , 2014, LATINCRYPT.

[17]  Gabriel Antoniu,et al.  Managing Data Access on Clouds: A Generic Framework for Enforcing Security Policies , 2011, 2011 IEEE International Conference on Advanced Information Networking and Applications.

[18]  Ahmad-Reza Sadeghi,et al.  Swap and Play: Live Updating Hypervisors and Its Application to Xen , 2014, CCSW.

[19]  Jennifer Harris,et al.  Genomic cloud computing: legal and ethical points to consider , 2014, European Journal of Human Genetics.

[20]  Sateesh K. Peddoju,et al.  Classification and comparison of NoSQL big data models , 2015, Int. J. Big Data Intell..

[21]  Matthew Portnoy,et al.  Virtualization Essentials , 2012 .

[22]  Erwin Laure,et al.  ScaBIA: Scalable Brain Image Analysis in the Cloud , 2013, CLOSER.

[23]  Dharmesh Kakadia,et al.  Virtualization vs Containerization to Support PaaS , 2014, 2014 IEEE International Conference on Cloud Engineering.

[24]  Rohitash Kumar Banyal,et al.  Multi-factor Authentication Framework for Cloud Computing , 2013, 2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation.

[25]  Jim Dowling,et al.  A security framework for population-scale genomics analysis , 2015, 2015 International Conference on High Performance Computing & Simulation (HPCS).

[26]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[27]  Erwin Laure,et al.  Privacy-Preservation for Publishing Sample Availability Data with Personal Identifiers , 2015 .

[28]  Mats Näslund,et al.  A Framework for Authentication and Authorization Credentials in Cloud Computing , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[29]  Srikanta Patnaik,et al.  Leading NoSQL models for handling Big Data: a brief review , 2016, Int. J. Bus. Inf. Syst..

[30]  Murat Kantarcioglu,et al.  Policy Enforcement Framework for Cloud Data Management , 2012, IEEE Data Eng. Bull..

[31]  Sophie Stalla-Bourdillon Liability Exemptions Wanted! Internet Intermediaries’ Liability under UK Law , 2012 .

[32]  Qi Li,et al.  Multi-tenancy authorization models for collaborative cloud services , 2013, CTS.

[33]  Tobias Pulls,et al.  How can Cloud Users be Supported in Deciding on, Tracking and Controlling How their Data are Used? , 2013, Privacy and Identity Management.

[34]  Gabi Dreo Rodosek,et al.  ICEMAN: An architecture for secure federated inter-cloud identity management , 2013, 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013).

[35]  Krishna P. Gummadi,et al.  Towards Trusted Cloud Computing , 2009, HotCloud.

[36]  Guang Gong,et al.  Fuzzy Authorization for Cloud Storage , 2014, IEEE Transactions on Cloud Computing.

[37]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[38]  Yong Wang,et al.  Hypervisor-based cloud intrusion detection system , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).

[39]  Elisa Bertino,et al.  Big Data - Security and Privacy , 2015, 2015 IEEE International Congress on Big Data.

[40]  Joni da Silva Fraga,et al.  Integral Federated Identity Management for Cloud Computing , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).

[41]  Ruby B. Lee,et al.  Characterizing hypervisor vulnerabilities in cloud computing servers , 2013, Cloud Computing '13.

[42]  Carlos Becker Westphall,et al.  Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth , 2012, ICON 2012.

[43]  Siani Pearson,et al.  Privacy, Security and Trust in Cloud Computing , 2013 .

[44]  Adam Molyneaux,et al.  Privacy-Preserving Processing of Raw Genomic Data , 2013, DPM/SETOP.

[45]  Hyunwoo Kim,et al.  X.509 Authentication and Authorization in Fermi Cloud , 2014, 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing.

[46]  Mark I. McCarthy,et al.  SAIL—a software system for sample and phenotype availability across biobanks and cohorts , 2010, Bioinform..

[47]  Howard Gobioff,et al.  The Google file system , 2003, SOSP '03.

[48]  Yin Chen,et al.  The user support programme and the training infrastructure of the EGI Federated Cloud , 2015, 2015 International Conference on High Performance Computing & Simulation (HPCS).

[49]  Ian Goldberg,et al.  Outsourced private information retrieval , 2013, WPES.

[50]  Sugam Sharma,et al.  Evolution of as-a-Service Era in Cloud , 2015, ArXiv.

[51]  Peng Ning,et al.  Enhancing security of Hadoop in a public cloud , 2015, 2015 6th International Conference on Information and Communication Systems (ICICS).