Analysis TableTable for checking effective big data management based on the variablesSl.No.AuthorDetailsYearCloudComputingHadoopFDFSOptimizationAnalysisCryptographyBigdataAnalyticsDataSecurityDataIntegrityNovelRDAApproachJointOptimizationDataManagement&CostBusinessIntelligenceEfficientCloudArchitectureResponsivecloudArchitecture1Hashem, I.A.,Yaqoob, I.,Anuar, N.B.,Mokhtar,S., Gani,A.,&UllahKhan, S.20152Baek, J.,Vu, Q. H.,Liu, J. K.,Huang, X.,& Xiang,Y.20153Schoenherr, T., &Speier-Pero, C.20154Najafabadi,M.,Villanustre,F.,Khoshgoftaar, T.,Seliya, N.,Wald, R.,&Muharemagic, E.20155Harris, I.,Wang, Y.,& Wang,H.20156Zakir, J.,2015
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Article on Use of Cloud Computing and Security Issueslg...
|17
|4899
|86
Educational use of Mobile Technology Assignmentlg...
|17
|3968
|40
Security Issues in Cloud Computing- Documentlg...
|7
|1373
|77
Big Data in Healthcare: Challenges and Solutionslg...
|11
|526
|372
Cloud Computing for Smith Security Ltdlg...
|10
|665
|480
Addressing Cyber Security Risks Information 2022lg...