Big data in cloud computing and the related security issues

  • Authors

    • Bajes Zeyad Aljunaedi Ajloun National University
    • Mohammad Bani Younes Ajloun National University
    2018-12-06
    https://doi.org/10.14419/ijet.v7i4.20600
  • Big Data, Security, Cloud Computing, Hadoop Component, Challenges.
  • Abstract

    This paper discusses the security issues associated with cloud computing environment. Additionally, big data, Map Reduce and Hadoop environment have also been catered through this research. The use of big data applications is rising over time because of the benefits of managing massive amount of data easily. Both small scale and large scale organizations use the big data application. Furthermore, the solutions of the problems of cloud computing have been discussed along with Hadoop. This security is developing rapidly and it includes security of the information, computer security, security of the network, and data privacy. The use of cloud computing is evident in policies, technologies, controls, and big data tools that are being used currently. The technology of Cloud computing, big data and its applications are going to form the future of science.

     

     

  • References

    1. [1] J. W. Lichtman, H. Pfister, N. Shavit, C. Biology, and C. Science, “The big data challenges of connectomics,†vol. 17, no. 11, pp. 1448–1454, 2015.

      [2] A. Katal, M. Wazid, and R. H. Goudar, “Big data: Issues, challenges, tools and Good practices,†2013 sixth Int. Conf. Contemp. Comput. IC3 2013, pp. 404–409, 2013.

      [3] C. L. Philip Chen and C. Y. Zhang, “Data-intensive applications, challenges, techniques and technologies: A survey on Big Data,†Inf. Sci. (Ny). vol. 275, pp. 314–347, 2014. https://doi.org/10.1016/j.ins.2014.01.015.

      [4] M. Batty, “Big data, smart cities and city planning,†Dialogues Hum. Geogr, vol. 3, no. 3, pp. 274–279, 2013. https://doi.org/10.1177/2043820613513390.

      [5] A. A. Tole, “Big Data Challenges,†Database Syst. J. vol., vol. IV, no. 3, pp. 31–40, 2013.

      [6] J. Singh, “Big Data: Tools and Technologies in Big Data,†Int. J. Comput. Appl., vol. 112, no. 15, pp. 975–8887, 2015.

      [7] D. Che, M. Safran, and Z. Peng, “From Big Data to Big Data Mining : Challenges, Issues, and Opportunities,†18th Int. Conf. DASFAA, pp. 1–15, 2013. https://doi.org/10.1007/978-3-642-40270-8_1.

      [8] H. R. Varian, “Big Data: New Tricks for Econometrics,†J. Econ. Perspect., vol. 28, no. 2, pp. 3–28, 2014. https://doi.org/10.1257/jep.28.2.3.

      [9] R. Kitchin, “The real-time city? Big data and smart urbanism,†GeoJournal, vol. 79, no. 1, pp. 1–14, 2014. https://doi.org/10.1007/s10708-013-9516-8.

      [10] I. A. T. Hashem, I. Yaqoob, N. B. Anuar, S. Mokhtar, A. Gani, and S. Ullah Khan, “The rise of ‘big data’ on cloud computing: Review and open research issues,†Inf. Syst., vol. 47, pp. 98–115, 2015. https://doi.org/10.1016/j.is.2014.07.006.

      [11] A. B. Wei Fan, “Mining big data: current status, and forecast to the future,†ACM SIGKDD Explor. Newsl, vol. 14, no. 2, pp. 1–5, 2012. https://doi.org/10.1145/2481244.2481246.

      [12] G.-H. Kim, S. Trimi, and J.-H. Chung, “Big-data applications in the government sector,†Commun. ACM, vol. 57, no. 3, pp. 78–85, 2014. https://doi.org/10.1145/2500873.

      [13] O. Tene and J. Polonetsky, Big data for all: Privacy and user control in the age of analytics, vol. 11, and no. 5. 2013.

      [14] H. V Jagadish, J. Gehrke, A. Labrinidis, Y. Papakonstantinou, J. M. Patel, R. Ramakrishnan, and C. Shahabi, “Big Data and Its Technical Challenges,†Assoc. Comput. Mach. Commun. ACM, vol. 57, no. 7, p. 86, 2014. https://doi.org/10.1145/2611567.

      [15] H. Hu, Y. Wen, T. S. Chua, and X. Li, “Toward scalable systems for big data analytics: A technology tutorial,†IEEE Access, vol. 2, pp. 652–687, 2014. https://doi.org/10.1109/ACCESS.2014.2332453.

      [16] S. Kaisler, F. Armour, J. A. Espinosa, and W. Money, “Big Data: Issues and Challenges Moving Forward,†2013 46th Hawaii Int. Conf. Syst. Sci., pp. 995–1004, 2013. https://doi.org/10.1109/HICSS.2013.645.

      [17] F. Provost and T. Fawcett, “Data Science and its Relationship to Big Data and Data-Driven Decision Making,†Big Data, vol. 1, no. 1, pp. 51–59, 2013. https://doi.org/10.1089/big.2013.1508.

      [18] V. Inukollu, S. Arsi, and S. Ravuri, “Security Issues Associated With Big Data in Cloud Computing,†Int. J. Netw. Secur. It is Appl., vol. 6, no. 3, pp. 45–56, 2014.

      [19] I. Brief, “Healthcare Cloud Security Healthcare Cloud Security,†no. January 2013.

      [20] S. Möller, N. Ben-Asher, K.-P. Engelbrecht, R. Englert, and J. Meyer, “Modeling the behavior of users who are confronted with security mechanisms,†Comput. Secur. vol. 30, no. 4, pp. 242–256, Jun. 2011. https://doi.org/10.1016/j.cose.2011.01.001.

      [21] M. Doheir, B. Hussin, A. Samad, H. Basari, and M. B. Alazzam, “Structural Design of Secure Transmission Module for Protecting Patient Data in Cloud-Based Healthcare Environment,†Middle-East J. Sci. Res., vol. 23, no. 12, pp. 2961–2967, 2015.

      [22] A Zanella, N. Bui, a Castellani, L. Vangelista, and M. Zorzi, “Internet of Things for Smart Cities,†IEEE Internet Things J., vol. 1, no. 1, pp. 22–32, 2014. https://doi.org/10.1109/JIOT.2014.2306328.

      [23] K. Kambatla, G. Kollias, V. Kumar, and A. Grama, “Trends in big data analytics,†J. Parallel Distrib. Comput. vol. 74, no. 7, pp. 2561–2573, 2014. https://doi.org/10.1016/j.jpdc.2014.01.003.

      [24] M. J. Khoury, J. P. A. Ioannidis, P. Alto, and J. Snow, “HHS Public Access,†vol. 346, no. 6213, pp. 1054–1055, 2015.

      [25] M. B. Alazzam, Y. M. Al-sharo, and M. K. Al-, “DEVELOPING (UTAUT 2) MODEL OF ADOPTION MOBILE HEALTH APPLICATION IN JORDAN E- GOVERNMENT,†vol. 96, no. 12, 2018.

      [26] G. Garrison, C. M. Rebman, and S. H. Kim, “An identification of factors motivating individuals’ use of cloud-based services,†J. Comput. Inf. Syst., vol. 58, no. 1, pp. 19–29, 2018. https://doi.org/10.1080/08874417.2016.1180653.

      [27] M. R. Ramli, Z. A. Abas, M. I. Desa, Z. Z. Abidin, and M. B. Alazzam, “Enhanced convergence of Bat Algorithm based on dimensional and inertia weight factor,†J. King Saud Univ. - Comput. Inf. Sci., 2018.

      [28] T. Piliouras, V. K. a. Siddaramaiah, N. Sultana, E. Meyer, and R. Harrington, “Trust in a cloud-based healthcare environment,†2011 8th Int. Conf. Expo Emerg. Technol. a Smarter World, pp. 1–6, Nov. 2011.

      [29] J. Matysiewicz and S. Smyczek, “Consumer Trust - Challenge for E-healthcare,†2009 Fourth Int. Conf. Coop. Promot. Inf. Resour. Sci. Technol., pp. 333–338, Nov. 2009. https://doi.org/10.1109/COINFO.2009.40.

      [30] M. B. Alazzam, A. B. D. Samad, H. Basari, and A. Samad, “PILOT STUDY OF EHRS ACCEPTANCE IN JORDAN HOSPITALS BY UTAUT2,†vol. 85, no. 3, 2016.

      [31] S. M.Alazzam, BASARI, “EHRs Acceptance in Jordan Hospitals by UTAUT2 Model: Preliminary Result,†J. Theor. Appl. Inf. Technol., vol. 3178, no. 3, pp. 473–482, 2015.

      [32] A. Bahga and V. K. Madisetti, “A Cloud-based Approach for Interoperable Electronic Health Records (EHRs),†IEEE J. Biomed. Heal. Informatics, vol. 17, no. 5, pp. 894–906, Sep. 2013.

      [33] A. Botta, W. De Donato, V. Persico, and A. Pescapé, “Integration of Cloud computing and Internet of Things: A survey,†Futur. Gener. Comput. Syst., vol. 56, pp. 684–700, 2016. https://doi.org/10.1016/j.future.2015.09.021.

      [34] M. Warkentin, S. Sharma, D. Gefen, P. Pavlou, and G. Rose, “Government of the People, By the People: A Look at Trust in eGovernment,†18th Am. Conf. Inf. Syst. (AMCIS 2012), pp. 1–10, 2012.

  • Downloads

  • How to Cite

    Zeyad Aljunaedi, B., & Bani Younes, M. (2018). Big data in cloud computing and the related security issues. International Journal of Engineering & Technology, 7(4), 3936-3940. https://doi.org/10.14419/ijet.v7i4.20600