IT IT [Name of the Student] [Name of the University] [Author note] Introduction: 2 Discussion: 2 Literature review: 2 Analysis of The Outsourcing Data and The Applications: 3 Analysis of The Security and The Privacy Challenges: 4 Analysis of the method and the material used in this paper: 5 Analysis of the Results: 5 Method for the Solving of problem: 8 Different evaluation criteria for addressing the Security of the Big Data: 9 Conclusion: 10 References: 11 Introduction: Big Data
Outsourcing Data: Security and Privacy Issues
Added on 2020-05-28
BookmarkShareRelated Documents
Running head: IT IT [Name of the Student] [Name of the University] [Author note]
Table of Contents Introduction:...............................................................................................................................2 Discussion:.................................................................................................................................2 Literature review:...................................................................................................................2 Analysis of The Outsourcing Data and The Applications:....................................................3 Analysis of The Security and The Privacy Challenges:.........................................................4 Analysis of the method and the material used in this paper:..................................................5 Analysis of the Results:..........................................................................................................5 Method for the Solving of problem:...........................................................................................8 Different evaluation criteria for addressing the Security of the Big Data:................................9 Conclusion:..............................................................................................................................10 References:...............................................................................................................................11
Introduction: Big Data is considered to be very much important for the IT world. For this reason, the Big Data cannot be overlooked in the IT world. The main reasons which lies behind this is the prominent increase in the data along with the services that are related with this data. So it becomes increasing important to explore this field along with looking into the matter of improving the ways of Big data analysis especially in the clouds (Purcell 2014). These two key aspects are the big data and the cloud computing. The Paper “An Evaluation of Major Threats in Cloud Computing Associated with Big Data”by “Kamalpreet Kaur”, “Ali Syed”, “Azeem Mohammad”, “Malka N. Halgamuge” states that most of the organisations relies on the power of the databases. And when the organisations outsources their database in the form of big data then they transfer all their data to the cloud (Hashem et al. 2015). The paper also indicates that the security challenges act as one of the most prominent issues related to the cloud computing and big data.Some of the major issues related to big data were also observed in this paper. The paper also indicates that due to various security threats clouds are not getting adopted on a larger scale despite of the presence of various advantages. The data sources have been analysed in this paper which helped a lot in identification of the gaps. The report provides the necessary solutions for the issues related to the analysis of the big data in the cloud. Discussion: Literature review: A very important role is played by the big data in the world of business. this is due to fact that storing of the complex data in a secure way is one of the crucial aspects of the corporate operations. Big data refers to the huge amount of data in the structured, semi- structured, and unstructured form (Ji et al. 2012). There are 3V’s in the Big data and this mainly includes the high volume of data, high velocity of data and high variety of different
types of information that are in need of getting mined. But the specific quantity of data is not mentioned anywhere, and the data can be in petabytes or Exabyte (Demirkan and Delen 2013). Peter Skomoroch stated that it was not possible to process the big data due to the difficulty, proneness to errors, and large time consuming nature of the data. This was difficult before the invention of the various data technologies like the MapReduce and Hadoop. These new technologies have greatly helped in the processing of the datasets than the traditional processing tools. There are many organisations which are associated with the collection of the complex data. This data is collected by the doing the worldwide surveys so as to improve the process of decision making that are extremely important for the sustaining of the healthy future for the organisation’s business process (Fernández et al. 2014). It can be stated that there are various security challenges which comes up with the use of the clouds. Analysis of The Outsourcing Data and The Applications: Cloud computing is something which is capable of providing access to the data present in the clouds anytime anywhere. But the challenge remains that is checking of the authorized entities (Inukollu Arsi and Ravuri 2014). The significant challenges arising due to the monitoring of the clouds and many more results in the suffering of the cloud computing in reaching its full potential. So the users have to rely on the third part and the cloud providers for the purpose of making their data secure along with maintenance of the communication related to the reliability with the customers. When a user is making use of the cloud for the purpose of making decisions regarding the complex data and the platforms then it might seem that there is no other computing which has been done here (Demchenko et al. 2012). This happens due to the fact that there is no existence of any technical mechanism for the prevention of the accessing the data of the users unethically by the cloud providers. So the significance of building up a new layer increases for the purpose of supporting a contractual negotiation phase between the providers of the cloud and the end-users. So it can be
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Report on Cloud Computing in Big Data Managementlg...
|11
|2358
|48
Big Data Challenges in IoT & Cloudlg...
|12
|5442
|109
A Comprehensive Study on Big Data Security and Integrity over Cloud Storagelg...
|16
|3783
|392
Cloud Computing: Security and Challengeslg...
|12
|2975
|191
Cloud Computing Assignment Solutionlg...
|11
|2444
|54
(PDF) Security and Privacy Issues with IoT in Healthcarelg...