You are here

Back to top

Trustworthy Hybrid Cloud Architecture for Big Data Processing (Paperback)

Trustworthy Hybrid Cloud Architecture for Big Data Processing Cover Image
$32.00
Email or call for price

Description


Big data is the current trend and it gradually become a widely preferred topic of scientific

research and is used in many industries like private and public sectors, enterprises, businesses,

and domains where abundant data is used. As big data is used in many domains, securing

big data and effective analytics capability are increasingly concerned. Cloud computing

is an extremely realistic technology and draw the interest of huge number of investigators

to analyze it and to apply it in big data frameworks. Nowadays, cloud computing become

inevitable for big data storage and analytics and so the traditional cryptographic mechanisms

are inadequate or not suited for processing huge volume of big data outsourced to cloud.

Technological advancements are common in cloud technology because of its elastic properties

and metered services. This new model of cloud computing is efficient, since it provides cost

effective architectures that facilitates data submission, data storage, and computations over

data transmission, storage, and intensive computing of data. Though an organization benefits

by adopting cloud technology for analytics, this leads to security and privacy breaches. The

security issues are the barriers in adopting cloud computing for big data analytics. Also,

the cloud storage facilitates large amount of data storage and it also results in data leakage

and exposure of sensitive data. The responsibility of safeguarding data on cloud belongs

to cloud service provider. Though cloud provides efficient techniques, many challenging

scalability, computation, and communication issues arise due to loss of data control. Cloud

computing provides pool of resources that can be shared among multiple cloud tenants. This

co-existence of tenants can also results in security issues. The impacts of security breaches

affect both the data owner and the cloud service provider. The threat to data in cloud storage

results in losing trust of customers and service providers will lose their clients. If the data

owner loses his valuable sensitive data then it results in irrecoverable damage. In order

to protect user's sensitive data over cloud and to self-destruct it after specified time period

mechanisms is needed. This work concentrates on providing full life cycle protection of

sensitive data stored on cloud.

1.


Product Details
ISBN: 9781916706729
ISBN-10: 191670672X
Publisher: Self Publish
Publication Date: July 18th, 2023
Pages: 178
Language: English