ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

A Comprehensive Study on Big Data Security and Integrity over Cloud Storage

Verified

Added on  2023/04/20

|16
|3783
|392
AI Summary
This research proposal aims to study the security challenges and methods to secure big data in cloud storage. It discusses the relevance and significance of the topic, literature review, and the approach used in the study.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: RESEARCH PROPOSAL
A comprehensive study on the big data security and integrity over the cloud storage
Name of the Student:
Name of the University:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1RESEARCH PROPOSAL
Table of Contents
Background......................................................................................................................................2
General context............................................................................................................................2
Settings........................................................................................................................................2
Basis for the proposed research...................................................................................................2
Problem Statement...........................................................................................................................3
Presentation of literature-supported open research question.......................................................3
Problem statement.......................................................................................................................3
Goal..................................................................................................................................................4
Relevance and Significance.............................................................................................................4
Literature Review............................................................................................................................6
Big data security issues in cloud computing................................................................................6
Secure big data in cloud...............................................................................................................7
Cloud and big data.......................................................................................................................8
Approach..........................................................................................................................................9
Discussion of methodology used.................................................................................................9
Research milestone with explanation........................................................................................10
References......................................................................................................................................12
Document Page
2RESEARCH PROPOSAL
Document Page
3RESEARCH PROPOSAL
A comprehensive study on the big data security and integrity over the cloud storage
Background
General context
The research proposal is based on comprehensive study on the big data security and
integrity over the cloud storage. The cloud computing is scalable which can provide facilities
over the internet. It is service based classical on the internet that can provide as an infrastructure
to share and collect of resources like storage server, software, hardware with lower cost. Hashem
et al., (2015) stated that the cloud computing is grouped in three service models such as software
as a service, platform as a service and infrastructure as a service. The objective of the cloud
computing is providing effective services over the internet, all the security challenges are related
to the storage of data within the cloud.
Settings
The security breaches in the cloud threat trust among the customer as well as service
provider. The cloud service provider ensures that the security challenges like confirmation of the
users, data exactness, and data accessibility besides loss of the data are main losses which are
required to prevent so that there is proper sharing of the data among the users and cloud
providers (Ali, Khan, & Vasilakos, 2015). There is storage of user’s data within the cloud service
provider which set the servers which can run into the distributed fashion.
Basis for the proposed research
The base of the proposed research is based on data storage security challenges besides
discussion on the approaches which can adopt to make sure that the security issues are to be
modified. The encryption based method can secure the data (Chang & Ramachandran, 2016).

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4RESEARCH PROPOSAL
The cloud system provides secured storage mechanisms to implement accepted security model.
The research paper presents the security issues which are related to store big data into the clouds.
Problem Statement
Presentation of literature-supported open research question
In marketing as well as research, most of the organizations are used of big data; however
they have no such assets from the security perspectives. Most of the companies are used of
technologies for storing as well as analyzing the data related to the company (Botta et al., 2016).
The literature work supports a study on the security threats in the cloud and in order to make the
big data secured, various security mechanisms such as encryption, access control and other
methods are required (Siddiqa et al., 2016). Those methods help to detect the threats and analyze
various data sources. The research questions are as follows:
1. What are security issues associated with the big data in the cloud computing?
2. What are the possible methods to secure the big data into the cloud environments?
Problem statement
The problem statement of this research study is related to security concerns related to the
big data into the cloud. Achievement of the security into the big data becomes a key significant
barrier which can slow down spread of the technologies without guarantee of the security
mechanisms (Liu et al., 2015). The big data is not achieving needed level of the trust. The data is
unstructured which signified that traditional system is not able to analyze the data. The
companies are wished to extract information from higher volume with varieties of data.
Document Page
5RESEARCH PROPOSAL
The purpose of this research proposal is to emphasize the security challenges which can
influence the big data along with the explanations which the researcher has proposed to deal with
the security threats. The problem is to carry out the empirical investigation by identifying all the
big data security threats in the cloud computing (Yang, Li, & Niu, 2015). Therefore, the
researcher has identified some of the major threats which are occurred and hampered the cloud
environment.
Goal
The goal of the research study is to evaluate the possible security threats in big data over
the cloud computing and determine the security methods which would prevent the data threats in
the cloud. The goal is accomplished by assessing an empirical investigation with an aim to obtain
whole setting related to security problems as regards to the big data plus its planned solutions
(Sookhak et al., 2017). Data is required to carry out each day activities and helped the business
administration to get goals and build finest decisions based on the extracted information. The big
data increases measure of the challenges linked to the secrecy as well as security as they can
address conventional security management (Bayramusta & Nasir, 2016). As the data is being
stored as well as analyzed by organizations, then regulations are required to address the security
concerns.
Relevance and Significance
The relevance and significance of this research topic is that big data is employed in the
company to build extraction of data along with aggregation tools. The big data permits advantage
to help the larger companies modify the products to meet with requirements of system users
(Milani & Navimipour, 2016). Secured big data becomes a vital importance for the organization
Document Page
6RESEARCH PROPOSAL
for better future. Big data security over the cloud environment is useful as it avoids unauthorized
access, secured big data sources; separates transfer of sensitive data and analyze the performance
of the data sharing among the individuals. Big data technologies as well as fundamental research
on cloud computing becomes a main focus on this research study. The big data contains wealth
of the communal information and therefore it is sighted as a network map to the society (Khan &
Zomaya, 2015). The study analyse the big data security issues and summarizing the security
methods to overcome with identified issues in cloud environment.
Throughout the research study, integration as well as accurate analysis of big data
security helps to predict future trends of big data events. It is probable to analyze big data to
support of sustainable developments of the civilization with provide birth to new industries
interrelated to the data services (Assuncao et al., 2015). The study also signifies to analyze the
potential challenges of big data, sorting from the design of the processing systems at minor layer
to examine means next to the senior layer. The emergence of the big data offers extraordinary
huge scale samples when deals with the computational issues. There is primary problem is how
to devise and explain the complexity over the big data (Yang et al., 2017). By analyzing the
security mechanisms of big data used to process the big data into concrete basis for the big data
computing.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7RESEARCH PROPOSAL
Literature Review
Big data security issues in cloud computing
Jain, Gyanchandani and Khare (2016) stated that big data is utilized to raise in volume of
the data which is hard to store, procedure along with evaluate throughout the database
technologies. The big data is involved to recognize plus translate the data into new insights.
Coronel and Morris (2016) argued that big data is new within IT as well as business. The big
data is amount of such data which is beyond capability to store, direct as well as procedure work
successfully. Kune et al., (2016) illustrated that big data is set of techniques in addition to
database technologies which need new forms of data integration for uncovering the larger hidden
values from larger databases. Following are the big data security issues which are identified in
the cloud environment such as:
Vulnerability to data generation: Bayramusta and Nasir (2016) analyzed that there are
operational security challenges of the big data which is included of concerns of fake generation
of data. The cybercriminals can fabricate of the data. In the manufacturing industry, the company
can use of sensor data to detect the processes of production; cybercriminals can able to penetrate
the system and make the sensors show fake.
High speed of NoSQL databases evolution and lack of security: NoSQL databases are
honed with the features. In most of the organizations, the security of data is mistreated. Ali, Khan
and Vasilakos (2015) stated that NoSQL solutions are built as a tool to operate with large
framework, leaves the security to parent system. NoSQL is a solution for the multi-sourced data
that can leave the data to vulnerable attack.
Document Page
8RESEARCH PROPOSAL
Lack of designed security: Khan and Zomaya (2015) argued that the big data is used of
various platforms which are not designed to address the security concerns. It means most of the
platforms are not having proper encryption and risk management features.
Anonymity concerns: Most of the customers are feeling uncomfortable with an idea that
the business is not able to collect detailed information about identities and sensitive facts. Yang
et al., (2017) discussed that the company is responded to the security concerns with data masking
policies and aggregation of the data sets.
Data breaches: Larson and Chang (2016) stated that sometimes it is possible that the
organization is sharing data as well as information through use of electronic medium. Therefore,
the hackers are stolen data from the user‘s accounts at the time of sharing of data from one
medium to other. Data breaches is most common big data security issues which are required to
be overcome unless it can hamper the reputation of the company.
Secure big data in cloud
In the cloud computing, there are different methods which are used to secure the big data
in the environment and those methods are described as below:
Validation and filtering: Lins, Schneider and Sunyaev (2018) discussed that the data are
impending after various sources with distinguished formats as well as vendors. The storage
specialist can authenticate the source before data storage into the cloud. The data are to be
filtered into the entry such that there is proper maintenance of security.
Application of software security: Larson and Chang (2016) explained that the main
unease of the big data is storage large volume of the data as well as safety of data and
Document Page
9RESEARCH PROPOSAL
information. It is suggested to use of secured version of the software for data accessing.
Throughout the open source software, it is resulted in security breaches.
Access control and authentication: The cloud storage worker should execute of secured
access control as well as devices related to authentication. Chang, Kuo and Ramachandran
(2016) stated that it is difficult to impose the security mechanisms are that the requests are to be
varied due to distinguished locations. The cloud service providers can provide authentication as
well as access control only to the registered IP addresses which ensure of the security
vulnerabilities.
Secured data management: The security issues are to be dealt and based on the business
model. The functions are related to build in-house properly. Rittinghouse & Ransome (2016)
analyzed that the infrastructure is under which the big data is to be accumulated. It is required to
protected and achieve by imposing stronger network of the firewalls, secured devices as well as
traffic monitoring devices.
Cloud and big data
Rittinghouse and Ransome (2016) discussed that the big data architecture supports higher
velocity of data capturing, gathering and investigating. The big data is required of higher
quantity of storage. Data into the big data is consisted of shapeless format without a average
forma moreover data sources are ahead of the traditional database. Bayramusta and Nasir (2016)
argued that storage of data into the cloud as big data is best possible alternative for analyzing the
data. The big data stored into the cloud environment is analyzed by use of programming methods
such as MapReduce. It is such that a query is being passed and data are being fetched.
Throughout MapReduce algorithm usage into the big data, it is schema free as well as index free.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10RESEARCH PROPOSAL
The feature integrated framework that can combine MapReduce and DBMS are proposed and
termed as Hadoop, it can increase task processing time into the cloud environment (Chang &
Ramachandran, 2016). Big data is dealt with high amount of data, therefore it is require storing
data into the cloud with a cost efficient method. It is needed to improve data to be gathered into
the cloud by means of low price. Deduplication is such a process which can remove duplication
of copies of data. Deduplication tool is analyzed to track data and store huge amounts of data
(Yang, Li, J. & Niu, 2015). Cloud storage environments target the duplication of data and it can
remove redundant of data which can improve the cloud storage competence.
Approach
Discussion of methodology used
Effective research methodology is used to address the challenges for the big data and
analyze the possible solutions of the security challenges. In this research study, deductive
approach is used which help to evaluate various types of existing approaches with support of the
data analysis. The deductive approach is used to test the research questions and observations of
objectives of research project. This approach can adopt and evaluate various existing theories
related to the research topic big data security in cloud. The findings, as well as the study of the
data, rationalize the research theories related to big data.
Data collection methods help the researcher to get expected results related to selected
research topic. The objectives of research proposal are to perform an assessment of diverse
impacts of big data to institute a connection with the objectives of the investigate study. The data
collection method helps to give dependable as well as suitable results based on the exacting
research project. In this research study, primary data collection method is used where there is
Document Page
11RESEARCH PROPOSAL
performing of survey in order to analysis the reliabilities furthermore validity of collected data.
The method of data analysis of this exacting research project is more time consuming to gather
data for analysis. The data sources allow collect of data from the personnel having experience
regards to the phenomenon being researched.
Quantitative data analysis is used for this study where statistical analysis of collected data
is being performed. This method can facilitate collection of data from a larger population size.
Survey over the population is being performed by questioning on the selected research proposal
topic is a tool in order to assess the big data security issues. By surveying questionnaire, the
researcher can capable to obtain the precise statistical outcome.
Research milestone with explanation
Activities in the
particular research
study
Expected start
date
Explanation
Select research proposal
topic
12/09/2018 The researcher has to select a research proposal topic
based on the database management and knowledge
domain.
Analyze the research
questions
12/16/2018 Based on selected topic, the researcher identifies two of
the research questions based on which the literature
study is carried out.
Literature Review 12/29/2018 The literature study is carried out based on two of the
research questions such as:
Document Page
12RESEARCH PROPOSAL
1. What are security issues associated with the big
data in the cloud computing?
2. What are the possible methods to secure the big
data into the cloud environments?
Select Research methods 1/3/2019 The researcher selects research approaches and
methods to collect data based on the topic. Deductive
approach is used to get information on big data security
issues and possible solutions.
Findings and review the
research study
1/5/2019 The final findings from the research study are reviewed
so that the reader can understand the research
outcomes.
Final submission of
research report
1/7/2019 There is final submission of the research proposal
report to the supervisor on the submission date so that
there is no delay in submission of work.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13RESEARCH PROPOSAL
References
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities
and challenges. Information sciences, 305, 357-383.
Assunção, M. D., Calheiros, R. N., Bianchi, S., Netto, M. A., & Buyya, R. (2015). Big Data
computing and clouds: Trends and future directions. Journal of Parallel and
Distributed Computing, 79, 3-15.
Bayramusta, M., & Nasir, V. A. (2016). A fad or future of IT?: A comprehensive literature
review on the cloud computing research. International Journal of Information
Management, 36(4), 635-644.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing
and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Chang, V., & Ramachandran, M. (2016). Towards achieving data security with the cloud
computing adoption framework. IEEE Trans. Services Computing, 9(1), 138-151.
Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption framework:
A security framework for business clouds. Future Generation Computer Systems, 57,
24-41.
Coronel, C., & Morris, S. (2016). Database systems: design, implementation, &
management. Cengage Learning.
Document Page
14RESEARCH PROPOSAL
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The
rise of “big data” on cloud computing: Review and open research issues. Information
systems, 47, 98-115.
Jain, P., Gyanchandani, M., & Khare, N. (2016). Big data privacy: a technological
perspective and review. Journal of Big Data, 3(1), 25.
Khan, S. U., & Zomaya, A. Y. (Eds.). (2015). Handbook on data centers. Sprin
Kune, R., Konugurthi, P. K., Agarwal, A., Chillarige, R. R., & Buyya, R. (2016). The
anatomy of big data computing. Software: Practice and Experience, 46(1), 79-105.
Larson, D., & Chang, V. (2016). A review and future direction of agile, business intelligence,
analytics and data science. International Journal of Information Management, 36(5),
700-710.
Lins, S., Schneider, S., & Sunyaev, A. (2018). Trust is good, control is better: Creating
secure clouds by continuous auditing. IEEE Transactions on Cloud Computing, 6(3),
890-903.
Liu, C., Yang, C., Zhang, X., & Chen, J. (2015). External integrity verification for
outsourced big data in cloud and IoT: A big picture. Future generation computer
systems, 49, 58-67.
Milani, B. A., & Navimipour, N. J. (2016). A comprehensive review of the data replication
techniques in the cloud environments: Major trends and future directions. Journal of
Network and Computer Applications, 64, 229-238.
Document Page
15RESEARCH PROPOSAL
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation,
management, and security. CRC press.
Siddiqa, A., Hashem, I. A. T., Yaqoob, I., Marjani, M., Shamshirband, S., Gani, A., &
Nasaruddin, F. (2016). A survey of big data management: Taxonomy and state-of-
the-art. Journal of Network and Computer Applications, 71, 151-166.
Sookhak, M., Gani, A., Khan, M. K., & Buyya, R. (2017). Dynamic remote data auditing for
securing big data storage in cloud computing. Information Sciences, 380, 101-116.
Yang, C., Huang, Q., Li, Z., Liu, K., & Hu, F. (2017). Big Data and cloud computing:
innovation opportunities and challenges. International Journal of Digital
Earth, 10(1), 13-53.
Yang, J. J., Li, J. Q., & Niu, Y. (2015). A hybrid solution for privacy preserving medical data
sharing in the cloud environment. Future Generation Computer Systems, 43, 74-86.
1 out of 16
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]