• ورود به سامانه
      مشاهده مورد 
      •   صفحهٔ اصلی
      • نشریات انگلیسی
      • International Journal of Information, Security and Systems Management
      • Volume 7, Issue 1
      • مشاهده مورد
      •   صفحهٔ اصلی
      • نشریات انگلیسی
      • International Journal of Information, Security and Systems Management
      • Volume 7, Issue 1
      • مشاهده مورد
      JavaScript is disabled for your browser. Some features of this site may not work without it.

      Privacy and Security of Big Data in THE Cloud

      (ندگان)پدیدآور
      Naderi, NargesAlizadeh, Hasan
      Thumbnail
      دریافت مدرک مشاهده
      FullText
      اندازه فایل: 
      357.0کیلوبایت
      نوع فايل (MIME): 
      PDF
      نوع مدرک
      Text
      Research Paper
      زبان مدرک
      English
      نمایش کامل رکورد
      چکیده
      Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many organizations de- mand efficient solutions to store and analyze huge amount of information. Cloud computing as an enabler provides scalable resources and significant economic benefits in the form of reduced operational costs. This paradigm raises a broad range of security and privacy issues that must be taken into consideration. Multi-tenancy, loss of control, and trust are key challenges in cloud computing environments. In this paper, the recent research and de- velopment on security and privacy in big data is surveyed and reviews the existing technologies and a wide array of both earlier and state-of- the-art projects on cloud securi- ty and privacy. First, the effects of characteristics of big data on information security and privacy are described. Second, topics and issues on security are discussed and reviewed. Third, privacy-preserving trajectory data pub- lishing is studied due to its future utilization, especially in telecom operation. Forth, present an overview of the battle ground by defining the roles and operations of privacy systems. Fifth, we review the milestones of the current two major research categories of privacy: data clustering and privacy frameworks. Finally, we discuss the effort of privacy study from the perspectives of different disci- plines, respectively.
      کلید واژگان
      The cloud
      privacy preservation
      Security

      شماره نشریه
      1
      تاریخ نشر
      2018-06-01
      1397-03-11
      ناشر
      Islamic Azad University E-Branch
      سازمان پدید آورنده
      Islamic Azad University E-Campus
      Islamic Azad University E-Campus

      شاپا
      2251-9335
      2252-0279
      URI
      http://www.ijissm.org/article_614574.html
      https://iranjournals.nlai.ir/handle/123456789/80863

      مرور

      همه جای سامانهپایگاه‌ها و مجموعه‌ها بر اساس تاریخ انتشارپدیدآورانعناوینموضوع‌‌هااین مجموعه بر اساس تاریخ انتشارپدیدآورانعناوینموضوع‌‌ها

      حساب من

      ورود به سامانهثبت نام

      تازه ترین ها

      تازه ترین مدارک
      © کليه حقوق اين سامانه برای سازمان اسناد و کتابخانه ملی ایران محفوظ است
      تماس با ما | ارسال بازخورد
      قدرت یافته توسطسیناوب