[go: up one dir, main page]

Normurodov et al., 2021 - Google Patents

Cyber security challenges of big data applications in cloud computing: A state of the art

Normurodov et al., 2021

Document ID
13738215269741828311
Author
Normurodov O
Al-Absi M
Al-Absi A
Sain M
Publication year
Publication venue
International conference on smart computing and cyber security: strategic foresight, security challenges and innovation

External Links

Snippet

Data is the blood of the network and the core of sustainable development in the information age. The fast growth of the Internet of Things and cloud computing technology has triggered the explosive growth of data scale and the highly complex data model. Big data technology …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Similar Documents

Publication Publication Date Title
Alghofaili et al. Secure cloud infrastructure: A survey on issues, current solutions, and open challenges
Ahmad et al. Cyber security in iot-based cloud computing: A comprehensive survey
Alani Big data in cybersecurity: a survey of applications and future trends
Chayal et al. Review of machine learning and data mining methods to predict different cyberattacks
Rawindaran et al. Cost benefits of using machine learning features in NIDS for cyber security in UK small medium enterprises (SME)
Nguyen Duc et al. Identifying security risks of digital transformation-an engineering perspective
Aswathy et al. Privacy breaches through cyber vulnerabilities: Critical issues, open challenges, and possible countermeasures for the future
Kommaragiri Enhancing Telecom Security Through Big Data Analytics and Cloud-Based Threat Intelligence
Saracoglu Metaverse and new cybersecurity threats
Thakral et al. Cybersecurity and ethics for IoT system: A massive analysis
Atoum et al. Big data management: Security and privacy concerns
Kaushik et al. Advanced Techniques and Applications of Cybersecurity and Forensics
Kapoor et al. Platform and Model Design for Responsible AI
Kaur et al. Introduction to cybersecurity
Ezeji Cyber policy for monitoring and regulating cyberspace and cyber security measures for combating technologically enhanced crime in South Africa
Hathaliya et al. A systematic survey on security and privacy issues of medicine supply chain: Taxonomy, framework, and research challenges
Almasri Towards generating a practical SUNBURST attack dataset for network attack detection
Enberg Behavior Analytics in Cyber Security
Normurodov et al. Cyber security challenges of big data applications in cloud computing: A state of the art
Sharma et al. Categorizing threat types and cyber-assaults over Internet of Things-equipped gadgets
Jain et al. Big Data Analytics and Security Over the Cloud: Characteristics, Analytics, Integration and Security
Sonthi et al. Imminent threat with authentication methods for AI data using blockchain security
Esegbona-Isikeh et al. Cybersecurity issues on e-healthcare cloud data warehouse system: Blockchain-based federated learning approach
Demchenko et al. Big Data Security and Compliance, Data Privacy Protection
Vincent et al. Implementation of critical information infrastructure protection techniques against cyber attacks using big data analytics