2017
DOI: 10.1007/978-3-319-51207-5_17
|View full text |Cite
|
Sign up to set email alerts
|

Challenges and Opportunities in Big Data and Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…That has led to the popularity of Analytics as a Service (AaaS) as a quicker and more effective method to connect, manipulate, and display various kinds of data. Data Analytics [11].…”
Section: Cloud Management For Massive Data Setsmentioning
confidence: 99%
“…That has led to the popularity of Analytics as a Service (AaaS) as a quicker and more effective method to connect, manipulate, and display various kinds of data. Data Analytics [11].…”
Section: Cloud Management For Massive Data Setsmentioning
confidence: 99%
“…Technical network‐level issue: Cloud computing used unsecured networks like the internet for data communication; due to this insecurity of computer networks, each node can freely alter or internode communication so that to break the whole connection of the system 14,32–34 …”
Section: Literature Reviewmentioning
confidence: 99%
“…Furthermore, the users do not know their critical data and their data security. That's why customers do not trust cloud computing services and prefer to store their critical data on their own IT system at home instead of the cloud 8,11,23,24,33,35 …”
Section: Literature Reviewmentioning
confidence: 99%
“…So that's why customer do not trust on cloud computing and refer to store their personal data on their own system at home instead of cloud environment [8,12,25,35,42,43]. Technical Network issue: In cloud computing data communication occur through unsecured network such as Internet, where every node can easily change data or inter node communication so that to breach the entire connection of the system [16,42,44,45]. Un-controlled access of Data: In cloud computing all the nodes are inter linked with each other for data processing.…”
Section: Introductionmentioning
confidence: 99%