Normurodov et al., 2021 - Google Patents
Cyber security challenges of big data applications in cloud computing: A state of the artNormurodov et al., 2021
- Document ID
- 13738215269741828311
- Author
- Normurodov O
- Al-Absi M
- Al-Absi A
- Sain M
- Publication year
- Publication venue
- International conference on smart computing and cyber security: strategic foresight, security challenges and innovation
External Links
Snippet
Data is the blood of the network and the core of sustainable development in the information age. The fast growth of the Internet of Things and cloud computing technology has triggered the explosive growth of data scale and the highly complex data model. Big data technology …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Alghofaili et al. | Secure cloud infrastructure: A survey on issues, current solutions, and open challenges | |
| Ahmad et al. | Cyber security in iot-based cloud computing: A comprehensive survey | |
| Alani | Big data in cybersecurity: a survey of applications and future trends | |
| Chayal et al. | Review of machine learning and data mining methods to predict different cyberattacks | |
| Rawindaran et al. | Cost benefits of using machine learning features in NIDS for cyber security in UK small medium enterprises (SME) | |
| Nguyen Duc et al. | Identifying security risks of digital transformation-an engineering perspective | |
| Aswathy et al. | Privacy breaches through cyber vulnerabilities: Critical issues, open challenges, and possible countermeasures for the future | |
| Kommaragiri | Enhancing Telecom Security Through Big Data Analytics and Cloud-Based Threat Intelligence | |
| Saracoglu | Metaverse and new cybersecurity threats | |
| Thakral et al. | Cybersecurity and ethics for IoT system: A massive analysis | |
| Atoum et al. | Big data management: Security and privacy concerns | |
| Kaushik et al. | Advanced Techniques and Applications of Cybersecurity and Forensics | |
| Kapoor et al. | Platform and Model Design for Responsible AI | |
| Kaur et al. | Introduction to cybersecurity | |
| Ezeji | Cyber policy for monitoring and regulating cyberspace and cyber security measures for combating technologically enhanced crime in South Africa | |
| Hathaliya et al. | A systematic survey on security and privacy issues of medicine supply chain: Taxonomy, framework, and research challenges | |
| Almasri | Towards generating a practical SUNBURST attack dataset for network attack detection | |
| Enberg | Behavior Analytics in Cyber Security | |
| Normurodov et al. | Cyber security challenges of big data applications in cloud computing: A state of the art | |
| Sharma et al. | Categorizing threat types and cyber-assaults over Internet of Things-equipped gadgets | |
| Jain et al. | Big Data Analytics and Security Over the Cloud: Characteristics, Analytics, Integration and Security | |
| Sonthi et al. | Imminent threat with authentication methods for AI data using blockchain security | |
| Esegbona-Isikeh et al. | Cybersecurity issues on e-healthcare cloud data warehouse system: Blockchain-based federated learning approach | |
| Demchenko et al. | Big Data Security and Compliance, Data Privacy Protection | |
| Vincent et al. | Implementation of critical information infrastructure protection techniques against cyber attacks using big data analytics |