References
- Baig, M. I.; Shuib, L.; Yadegaridehkordi, E. "Big data adoption: State of the art and research challenges," Inf. Process. Manag. 2019, vol. 56, no. 6, p. 1046495.
- Padgavankar, M. H.; Gupta, S. R. "Big data storage and challenges," Int. J. Comput. Sci. Inf. Technol. 2014, vol. 5, no. 2, pp. 2218-2223 .
- Bao, R. Chen, Z.; Obaidat, M. S. "Challenges and techniques in Big data security and privacy: A review," Secure. Priv. 2018, vol. 1, no. 4, p. e13. https://doi.org/10.1002/spy2.13
- Yang, P.; Xiong, N.; Ren, J. "Data Security and Privacy Protection for Cloud Storage: A Survey," IEEE Access, 2020, vol. 8, pp. 131723-131740. https://doi.org/10.1109/ACCESS.2020.3009876
- Woodie, Alex. "Global DataSphere to Hit 175 Zettabytes by 2025, IDC Says". Datanami. 2018.
- Subbalakshmi, S.; Madhavi, K. "Security challenges of Big Data storage in Cloud environment: A Survey," Int. J. Appl. Eng. Res. 2018, vol. 13, no. 17, pp. 13237-13244.
- Venkatraman, S.; Venkatraman, R. "Big data security challenges and strategies," AIMS Math. 2019, vol. 4, no.3, pp. 860-879. https://doi.org/10.3934/math.2019.3.860
- Akingbade, L. O. "Cloud Storage problems, benefits and solutions provided by Data De-duplication", International Journal of Engineering and Innovative Technology.2016,(5),6, 70-77.
- Sun, P. J. "Privacy protection and data security in cloud computing: a survey, challenges, and solutions," IEEE Access. 2019, vol. 7, pp. 147420-147452. https://doi.org/10.1109/ACCESS.2019.2946185
- Venkatraman, S.; Venkatraman, R. "Big data security challenges and strategies" AIMS Math. 2019, vol. 4, no. 3, pp. 860-879. https://doi.org/10.3934/math.2019.3.860
- Alaoui, I. E.; Gahi, Y.; Messoussi, R. "Full consideration of Big Data characteristics in sentiment analysis context," in 2019 IEEE 4th International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), 2019, pp. 126-130.
- Panimalar, A.; Shree, V.; Kathrine, V. "The 17 V's Of Big Data," Int. Res. J. Eng. Technol. 2017, vol. 4, no. 09, pp. 329-333.
- Desai, P. V. "A survey on big data applications and challenges," in 2018 second international conference on inventive communication and computational technologies (ICICCT), 2018, pp. 737-740.
- Shi, P.; Cui, Y.; Xu, K.; Zhang, M.; Ding, L. "Data Consistency Theory and Case Study for Scientific Big Data," Information.2019, vol. 10, no. 4, p. 137. https://doi.org/10.3390/info10040137
- Ramasamy A.; Chowdhury, S. "Big Data Quality Dimensions: A Systematic Literature Review," J. Inf. Syst. Technol. Manag. 2020, vol. 17.
- Yang, P.; Xiong, N.; Ren, J. "Data Security and Privacy Protection for Cloud Storage: A Survey," IEEE Access, 2020, vol. 8, pp. 131723-131740. https://doi.org/10.1109/ACCESS.2020.3009876
- Espinosa, J. A.; Kaiser, S.; Armour, F.; Money, W. "Big Data Redux: New Issues and Challenges Moving Forward", In Proceedings of the 52nd Hawaii International Conference on System Sciences.2019.
- Khare, S.; Totaro, M. "Big Data in IoT," in 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), 2019, pp. 1-7.
- Bertino, E.; Ferrari, E. "Big data security and privacy," in A Comprehensive Guide through the Italian Database Research over the Last 25 Years, Springer. 2018, pp. 425-439.
- BigDataWorkingGroup, "Expanded Top Ten Big Data Security and Privacy Challenges," 2013. [Online]. Available:https://downloads.cloudsecurityalliance.org/initiatives/bdwg/Expanded_Top_Ten_Big_Data_Security_and_Privacy_Challenges.pdf.[Accessed: 27-Feb2016].
- Joshi, N.; Kadhiwala, B. "Big data security and privacy issues-A survey," in 2017 Innovations in Power and Advanced Computing Technologies (i-PACT), 2017, pp. 1-5.
- Terzi, D. S.; Terzi, R.; Sagiroglu, S. "A survey on security and privacy issues in big data" in 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), 2015, pp. 202-207.
- Almarhabi, K.; Jambi, K.; Eassa, F.; Batarfi, O. "Survey on access control and management issues in cloud and BYOD environment,".2017, Vol.6, pg. 44-54.
- Reddy, Y. B. "Access control mechanisms in Big Data processing," Softw. Eng. Appl. Adv. Power Energy Syst. 2015, pp. 2015-2829.
- Xiao, Z.; Xiao, Y. "Achieving accountable MapReduce in cloud computing," Futur. Gener. Comput. Syst. 2014, vol. 30, pp. 1-13. https://doi.org/10.1016/j.future.2013.07.001
- Centonze, P.; Kim, D. Y.; Kim, S. "Security and privacy frameworks for access control big data systems," Comput. Mater. Contin. 2019, vol. 59, no. 2, pp. 361-374. https://doi.org/10.32604/cmc.2019.06223
- Kumar, T. K. A.; Liu, H.; Thomas, J. P.; Hou, X. "Content sensitivity based access control framework for Hadoop," Digit. Commun. Networks. 2017, vol. 3, no. 4, pp. 213-225. https://doi.org/10.1016/j.dcan.2017.07.007
- Gupta, M.; Patwa, F.; Sandhu, R. "An attribute-based access control model for secure big data processing in Hadoop ecosystem," in Proceedings of the Third ACM Workshop on Attribute-Based Access Control, 2018, pp. 13-24.
- Wang, M.; Wang, J.; Guo, L.; Harn, L. "Inverted XML access control model based on ontology semantic dependency," Comput. Mater. Contin. 2018, vol. 55, no. 3, pp. 465-482.
- Li, L. J. "Secured Cloud Storage Scheme Based On Blockchain," in 2019 IEEE 2nd International Conference on Electronic Information and Communication Technology (ICEICT), 2019, pp. 137-142.
- Fan, K.; Lou, S.; Su, R.; Li, H.; Yang, Y. "Secure and private key management scheme in big data networking," Peer-to-Peer Netw. 2018, Appl., vol. 11, no. 5, pp. 992-999. https://doi.org/10.1007/s12083-017-0579-z
- Zikratov, I.; Kuzmin, A.; Akimenko, V.; Niculichev, V.; Yalansky, L. "Ensuring data integrity using Blockchain technology," in 2017 20th Conference of Open Innovations Association (FRUCT), 2017, pp. 534-539.
- Sowmiya, M.; Adimoolam, M. "Secure cloud storage model with hidden policy attribute-based access control," in 2014 International Conference on Recent Trends in Information Technology, 2014, pp. 1-6.
- Maesa, D. D. F.; Mori, P.; Ricci, L. "Blockchain-based access control," in IFIP international conference on distributed applications and interoperable systems, 2017, pp. 206-220.
- Xue, J.; Xu, C.; Zhang, Y. Private Blockchain-Based Secure Access Control for Smart Home Systems. KSII Trans. Internet Inf. Syst. 2018, 12, 6057-6078. https://doi.org/10.3837/tiis.2018.12.024
- Nelson B.; Olovsson, T. "Security and privacy for big data: A systematic literature review," in 2016 IEEE international conference on big data (big data), 2016, pp. 3693-3702.
- Zhang, W.; Lin, Y.; Xiao, S.; Wu, J.; Zhou, S. "Privacy-Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing," in IEEE Transactions on Computers. 2016, vol. 65, no. 5, pp. 1566- 1577. https://doi.org/10.1109/TC.2015.2448099
- Wan Z.; Deng, R. H. "VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data," in IEEE Transactions on Dependable and Secure Computing.2016, vol. PP, no. 99, pp. 1-1.
- Jiang, X.; Yu, J.; Kong, F.; Cheng, X.; Hao, R. "A Novel Privacy Preserving Keyword Search Scheme over Encrypted Cloud Data," 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), Krakow. 2015, pp. 836-839.
- Javier Alvarez et al, "Efficient development of high performance data analytics in Python", Future Generation Computer Systems. October 2020,Volume 111 , Pages 570-581. https://doi.org/10.1016/j.future.2019.09.051
- N. Deepa et al, "sA Survey on Blockchain for Big Data: Approaches, Opportunities, and Future Directions", availableon:https://www.researchgate.net/publication/344066677_A_Survey_on_Blockchain_for_Big_Data_Approaches_Opportunities_and_Future_Directions.
- Geoffrey Charles Fox et al, ≪Contributions to High-Performance Big Data Computing",Technical report,available on: https://www.researchgate.net/publication/328090399_ Contributions_to_High-Performance_Big_Data_ Computing.
- S. Riaz, A. H. Khan, M. Haroon, S. Latif, and S. Bhatti, "Big data security and privacy: Current challenges and future research perspective in cloud environment" in 2020 International Conference on Information Management and Technology (ICIMTech), 2020, pp. 977-982.