Ask a question from expert

Ask now

Outsourcing Data: Security and Privacy Issues

15 Pages4338 Words111 Views
   

Added on  2020-05-28

About This Document

IT IT [Name of the Student] [Name of the University] [Author note] Introduction: 2 Discussion: 2 Literature review: 2 Analysis of The Outsourcing Data and The Applications: 3 Analysis of The Security and The Privacy Challenges: 4 Analysis of the method and the material used in this paper: 5 Analysis of the Results: 5 Method for the Solving of problem: 8 Different evaluation criteria for addressing the Security of the Big Data: 9 Conclusion: 10 References: 11 Introduction: Big Data

Outsourcing Data: Security and Privacy Issues

   Added on 2020-05-28

BookmarkShareRelated Documents
Running head: IT
IT
[Name of the Student]
[Name of the University]
[Author note]
Outsourcing Data: Security and Privacy Issues_1
Table of Contents
Introduction:...............................................................................................................................2
Discussion:.................................................................................................................................2
Literature review:...................................................................................................................2
Analysis of The Outsourcing Data and The Applications:....................................................3
Analysis of The Security and The Privacy Challenges:.........................................................4
Analysis of the method and the material used in this paper:..................................................5
Analysis of the Results:..........................................................................................................5
Method for the Solving of problem:...........................................................................................8
Different evaluation criteria for addressing the Security of the Big Data:................................9
Conclusion:..............................................................................................................................10
References:...............................................................................................................................11
Outsourcing Data: Security and Privacy Issues_2
Introduction:
Big Data is considered to be very much important for the IT world. For this reason,
the Big Data cannot be overlooked in the IT world. The main reasons which lies behind this
is the prominent increase in the data along with the services that are related with this data. So
it becomes increasing important to explore this field along with looking into the matter of
improving the ways of Big data analysis especially in the clouds (Purcell 2014). These two
key aspects are the big data and the cloud computing. The Paper “An Evaluation of Major
Threats in Cloud Computing Associated with Big Data” by “Kamalpreet Kaur”, “Ali
Syed”, “Azeem Mohammad”, “Malka N. Halgamuge” states that most of the organisations
relies on the power of the databases. And when the organisations outsources their database in
the form of big data then they transfer all their data to the cloud (Hashem et al. 2015). The
paper also indicates that the security challenges act as one of the most prominent issues
related to the cloud computing and big data. Some of the major issues related to big data
were also observed in this paper. The paper also indicates that due to various security threats
clouds are not getting adopted on a larger scale despite of the presence of various advantages.
The data sources have been analysed in this paper which helped a lot in identification of the
gaps. The report provides the necessary solutions for the issues related to the analysis of the
big data in the cloud.
Discussion:
Literature review:
A very important role is played by the big data in the world of business. this is due to
fact that storing of the complex data in a secure way is one of the crucial aspects of the
corporate operations. Big data refers to the huge amount of data in the structured, semi-
structured, and unstructured form (Ji et al. 2012). There are 3V’s in the Big data and this
mainly includes the high volume of data, high velocity of data and high variety of different
Outsourcing Data: Security and Privacy Issues_3
types of information that are in need of getting mined. But the specific quantity of data is not
mentioned anywhere, and the data can be in petabytes or Exabyte (Demirkan and Delen
2013). Peter Skomoroch stated that it was not possible to process the big data due to the
difficulty, proneness to errors, and large time consuming nature of the data. This was difficult
before the invention of the various data technologies like the MapReduce and Hadoop. These
new technologies have greatly helped in the processing of the datasets than the traditional
processing tools.
There are many organisations which are associated with the collection of the complex
data. This data is collected by the doing the worldwide surveys so as to improve the process
of decision making that are extremely important for the sustaining of the healthy future for
the organisation’s business process (Fernández et al. 2014). It can be stated that there are
various security challenges which comes up with the use of the clouds.
Analysis of The Outsourcing Data and The Applications:
Cloud computing is something which is capable of providing access to the data
present in the clouds anytime anywhere. But the challenge remains that is checking of the
authorized entities (Inukollu Arsi and Ravuri 2014). The significant challenges arising due to
the monitoring of the clouds and many more results in the suffering of the cloud computing in
reaching its full potential. So the users have to rely on the third part and the cloud providers
for the purpose of making their data secure along with maintenance of the communication
related to the reliability with the customers. When a user is making use of the cloud for the
purpose of making decisions regarding the complex data and the platforms then it might seem
that there is no other computing which has been done here (Demchenko et al. 2012). This
happens due to the fact that there is no existence of any technical mechanism for the
prevention of the accessing the data of the users unethically by the cloud providers. So the
significance of building up a new layer increases for the purpose of supporting a contractual
negotiation phase between the providers of the cloud and the end-users. So it can be
Outsourcing Data: Security and Privacy Issues_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Report on Cloud Computing in Big Data Management
|11
|2358
|48

Big Data Challenges in IoT & Cloud
|12
|5442
|109

A Comprehensive Study on Big Data Security and Integrity over Cloud Storage
|16
|3783
|392

Cloud Computing: Security and Challenges
|12
|2975
|191

Cloud Computing Assignment Solution
|11
|2444
|54

(PDF) Security and Privacy Issues with IoT in Healthcare
|17
|3666
|40