2016
DOI: 10.1007/978-981-10-1454-3_16
|View full text |Cite
|
Sign up to set email alerts
|

Big Data Gets Cloudy: Challenges and Opportunities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…We have found the key differences for the issues of 'Un-authorized data access issue', 'Legal Amenabilities', and 'Assets issues' across different databases. Below is the table for identified challenges through SLR across various databases [8,12,25,35,42,43].…”
Section: A) Practices To Enhance Data Secrecy Issuementioning
confidence: 99%
See 2 more Smart Citations
“…We have found the key differences for the issues of 'Un-authorized data access issue', 'Legal Amenabilities', and 'Assets issues' across different databases. Below is the table for identified challenges through SLR across various databases [8,12,25,35,42,43].…”
Section: A) Practices To Enhance Data Secrecy Issuementioning
confidence: 99%
“…Trust issue: Cloud computing have a trust issue because the storage location of data not the same as that of customer, moreover customer has no idea of their critical data and its security. So that's why customer do not trust on cloud computing and refer to store their personal data on their own system at home instead of cloud environment [8,12,25,35,42,43]. Technical Network issue: In cloud computing data communication occur through unsecured network such as Internet, where every node can easily change data or inter node communication so that to breach the entire connection of the system [16,42,44,45].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Uncontrolled access of critical data: In cloud computing, multiple nodes are connected for data storing and processing, where each node has freely got access to the critical data, which can make the opportunity for some malevolent nodes to make changes or steal the entire critical data. This uncontrolled organizational admittance of every node to the pivotal administrative data is a critical issue in cloud computing 14,26,28,30,31 …”
Section: Literature Reviewmentioning
confidence: 99%
“…Data loss issue: When data loss occurred in a cloud environment due to any reason, then it is impossible to completely recover all the deleted data as some of the data will be eternally deleted, and also finding an exact node of data loss for retrieval is not an easy task in the cloud computing 15,26,31,36,37 …”
Section: Literature Reviewmentioning
confidence: 99%