Database Reference
In-Depth Information
19 Security in Big Data and
Cloud Computing
Challenges, Solutions,
and Open Problems
Ragib Hasan
CONTENTS
19.1 Introduction .................................................................................................. 580
19.1.1 Motivation ....................................................................................... 580
19.1.2 Topics Covered ................................................................................ 581
19.1.3 Organization .................................................................................... 582
19.2 Background ................................................................................................... 582
19.2.1 Cloud Computing ............................................................................ 582
19.2.2 Big Data........................................................................................... 584
19.2.3 What Makes Cloud Security Different? .......................................... 584
19.2.3.1 Multi-Tenancy ................................................................... 584
19.2.3.2 Trust Asymmetry ............................................................. 584
19.2.3.3 Global Reach and Insider Threats .................................... 584
19.3 Research Questions in Cloud Security ......................................................... 585
19.3.1 Exploitation of Co-Tenancy ............................................................ 585
19.3.2 Secure Architecture for the Cloud .................................................. 585
19.3.3 Accountability for Outsourced Big Data Sets ................................ 586
19.3.4 Confidentiality of Data and Computation ....................................... 587
19.3.5 Privacy ............................................................................................ 587
19.3.6 Verifying Outsourced Computation ............................................... 588
19.3.7 Verifying Capability ....................................................................... 588
19.3.8 Cloud Forensics .............................................................................. 588
19.3.9 Misuse Detection ............................................................................ 589
19.3.10 Resource Accounting and Economic Attacks ................................ 589
19.4 Open Problems ............................................................................................. 589
19.4.1 Detachment from Reality ................................................................ 590
19.4.2 Regulatory Compliance .................................................................. 590
19.4.3 Legal Issues ..................................................................................... 590
19.5 Conclusion .................................................................................................... 590
Author Biography .................................................................................................. 591
References .............................................................................................................. 591
579
 
Search WWH ::




Custom Search