Risk assessment for Big Data in cloud computing: trust as an impact
Reduced IT cost, scalability, business continuity, collaboration efficiency and flexibility of work practice are some of the benefits that attract companies to move their business operation into the cloud. Cloud computing serves companies as IaaS, PaaS, and SaaS. Even though cloud has many benefits,...
| Main Authors: | Yusof Ali, Hazirah Bee, Abdullah, Lili Marziana, Kartiwi, Mira, Nordin, Azlin |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/80900/ http://irep.iium.edu.my/80900/7/ICCCBPM%202019%20Website%20Proof.pdf http://irep.iium.edu.my/80900/8/Istanbul-Turkey-Nov-07-08%2C-2019%2C-Part-III.pdf http://irep.iium.edu.my/80900/19/80900_Risk%20assessment%20for%20Big%20Data%20in%20cloud%20computing%20trust%20as%20an%20impact.pdf |
Similar Items
Risk assessment for big data in cloud:security, privacy and trust
by: Yusof Ali, Hazirah Bee, et al.
Published: (2018)
by: Yusof Ali, Hazirah Bee, et al.
Published: (2018)
A systematic literature mapping of risk analysis of big data in cloud computing environment
by: Yusof Ali, Hazirah Bee, et al.
Published: (2018)
by: Yusof Ali, Hazirah Bee, et al.
Published: (2018)
Dynamic remote data auditing for securing big data storage in cloud computing / Mehdi Sookhak
by: Sookhak, Mehdi
Published: (2015)
by: Sookhak, Mehdi
Published: (2015)
Trusting Cloud Computing for Personal Files
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Two objectives big data task scheduling using swarm intelligence in cloud computing
by: Diallo, Laouratou, et al.
Published: (2016)
by: Diallo, Laouratou, et al.
Published: (2016)
Building customer trust in cloud computing model
by: Pathan, Al-Sakib Khan
Published: (2015)
by: Pathan, Al-Sakib Khan
Published: (2015)
International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
SLA-Based Trust Model for Cloud Computing
by: Alhamad, Mohammed, et al.
Published: (2010)
by: Alhamad, Mohammed, et al.
Published: (2010)
An enhanced architecture for big data task scheduling in cloud environment
by: Diallo, Laouratou, et al.
Published: (2016)
by: Diallo, Laouratou, et al.
Published: (2016)
Unstructured big data processing in cloud computing environment by using Amazon Elastic Map Reduce
by: Busu, Norzaharawani
Published: (2017)
by: Busu, Norzaharawani
Published: (2017)
Big Data Processing in Cloud Computing Environments
by: Noraziah, Ahmad, et al.
Published: (2017)
by: Noraziah, Ahmad, et al.
Published: (2017)
Managing big RDF data in clouds: challenges, opportunities, and solutions
by: Nahla, Mohammed Elzein, et al.
Published: (2018)
by: Nahla, Mohammed Elzein, et al.
Published: (2018)
Building customer trust in cloud computing with an ICT-enabled global regulatory body
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
The rise of internet of things and big data on the cloud: challenges and future trends
by: Laouratou, Diallo, et al.
Published: (2017)
by: Laouratou, Diallo, et al.
Published: (2017)
Intersection of geospatial big data, geocomputation and cloud computing
by: Amirian, Pouria, et al.
Published: (2015)
by: Amirian, Pouria, et al.
Published: (2015)
Applying multiple case studies research to investigate IT development outsourcing project risks.
by: Abdullah, Lili Marziana
Published: (2011)
by: Abdullah, Lili Marziana
Published: (2011)
A Study in Data Security in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
Big data security
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014)
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014)
Cloud Computing: Locally Sub-Clouds instead of Globally One Cloud
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
A model for computing skyline data items in cloud incomplete databases
by: Gulzar, Yonis, et al.
Published: (2020)
by: Gulzar, Yonis, et al.
Published: (2020)
A multi-level framework for efficient sensitive data transmission in cloud computing
by: Muhasin, Haifaa Jassim
Published: (2019)
by: Muhasin, Haifaa Jassim
Published: (2019)
Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security
by: Manjunatha, V., et al.
Published: (2024)
by: Manjunatha, V., et al.
Published: (2024)
Data recovery and business continuity in cloud computing: a review of the research literature
by: Alshammari, Mohammad M., et al.
Published: (2016)
by: Alshammari, Mohammad M., et al.
Published: (2016)
Model of security level classification for data in hybrid cloud computing
by: Shakir, Mohanaad, et al.
Published: (2016)
by: Shakir, Mohanaad, et al.
Published: (2016)
Semantic Similarity Model for Risk Assessment in Forming Cloud Computing SLAs
by: Hussain, Omar, et al.
Published: (2010)
by: Hussain, Omar, et al.
Published: (2010)
Requirements elicitation and analysis: towards the automation of software project risk management
by: Nordin, Azlin, et al.
Published: (2014)
by: Nordin, Azlin, et al.
Published: (2014)
Data backup and recovery with a minimum replica plan in a multi-cloud environment
by: Alshammari, Mohammad Matar, et al.
Published: (2020)
by: Alshammari, Mohammad Matar, et al.
Published: (2020)
Impatient job scheduling under cloud computing
by: Mahdi, Nawfal A.
Published: (2012)
by: Mahdi, Nawfal A.
Published: (2012)
Sierpinski triangle based data-center network architecture in cloud computing / Qi Han
by: Qi, Han
Published: (2016)
by: Qi, Han
Published: (2016)
Disaster recovery in single-cloud and multi-cloud
environments: Issues and challenges
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
A new scheduling technique to improve data management in cloud computing
by: Khan, Nawsher
Published: (2013)
by: Khan, Nawsher
Published: (2013)
Cloud Computing: Analysis of Various Platforms
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
Comparative Study to Measure the Quality of Big Scholarly Data and Its Hypothetical Mapping towards Granular Computing
by: Ahmed, M. M., et al.
Published: (2018)
by: Ahmed, M. M., et al.
Published: (2018)
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Cloud Computing: Architecture for Efficient Provision of Services
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Similar Items
-
Risk assessment for big data in cloud:security, privacy and trust
by: Yusof Ali, Hazirah Bee, et al.
Published: (2018) -
A systematic literature mapping of risk analysis of big data in cloud computing environment
by: Yusof Ali, Hazirah Bee, et al.
Published: (2018) -
Dynamic remote data auditing for securing big data storage in cloud computing / Mehdi Sookhak
by: Sookhak, Mehdi
Published: (2015) -
Trusting Cloud Computing for Personal Files
by: Mazlina, Abdul Majid, et al.
Published: (2014) -
Two objectives big data task scheduling using swarm intelligence in cloud computing
by: Diallo, Laouratou, et al.
Published: (2016)