Big Data and Cloud computing: Review and future trends
DOI:
https://doi.org/10.26438/ijcse/v6i12.361365Keywords:
Bigdata, CloudComputing, CloudsecurityAbstract
Cloud computing is a powerful technology used to perform massive scale computing. Cloud computing avoids high cost of hardware, software and other resources for computing in the local machine. Now a day’s massive amount of big data is generated through cloud system. Big data is complex in nature so analyzing it requires large computational infrastructure like cloud systems. In this paper, the use of big data in cloud system is reviewed. The comparison of big data and various cloud platforms are also discussed. Different issues of big data and how cloud platforms are addressed the above said issues are considered here .Furthermore, research challenges related to storage and securities are investigated. Finally open challenges that require high degree of research inputs and efforts are also summarized.
References
[1] X. Wu, X. Zhu, G. Q. Wu, W. Ding, “Data mining with big data,” IEEE Trans. Knowl. Data Eng., vol. 26, no. 1, pp. 97–107, 2014.
[2] M. Chen, S. Mao, and Y. Liu, “Big Data : A Survey,” no. January, pp. 171–209, 2014.
[3] J. C. Jackson, V. Vijayakumar, A. Quadir, and C. Bharathi, “Survey on Programming Models and Environments for Cluster , Cloud , and Grid Computing that defends Big Data,” Procedia - Procedia Comput. Sci., vol. 50, pp. 517–523, 2015.
[4] G. Yang, “The Application of MapReduce in the Cloud Computing,” 2011.
[5] V. Qxudgkd, L. Ndoedqgl, J. Frp, M. Ylw, and D. F. Lq,”A brief introduction on Big Data 5 V’s characteristics and Hadoop Technology” vol. 48, no. Iccc, pp. 319–324, 2015.
[6] Y. Li, K. Gai, L. Qiu, M. Qiu, and H. Zhao, “Intelligent cryptography approach for secure distributed big data storage in cloud computing,” Inf. Sci. (Ny)., vol. 0, pp. 1–13, 2016.
[7] C. Yang, Q. Huang, Z. Li, K. Liu, and F. Hu, “Big Data and cloud computing : innovation opportunities and challenges,” Int. J. Digit. Earth, vol. 0, no. 0, pp. 1–41, 2016.
[8] A. Fernández et al., “Big Data with Cloud Computing : an insight on the computing environment , MapReduce , and programming frameworks,” vol. 4, no. October, 2014.
[9] M. Sookhak, A. Gani, M. K. Khan, and R. Buyya, “Dynamic remote data auditing for securing big data storage in cloud computing,” Inf. Sci. (Ny)., 2015Lin C., Lee B., “Exploration of Routing Protocols in Wireless Mesh Network”, In the Proceedings of the 2015 IEEE Symposium on Colossal Big Data Analysis and Networking Security, Canada, pp.111-117, 2015.
[10] V. N. Inukollu, S. Arsi, and S. R. Ravuri, “SECURITY I SSUES A SSOCIATED WITH B IG DATA IN CLOUD COMPUTING,” vol. 6, no. 3, pp. 45–56, 2014.
[11] M. Gu, X. Li, and Y. Cao, “Optical storage arrays : a perspective for future big data storage,” no. March, 2014.
[12] C. Liu, J. Chen, S. Member, L. T. Yang, and X. Zhang, “Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates,” vol. 25, no. 9, pp. 2234–2244, 2014.
[13] J. P. D. Comput, M. D. Assunção, R. N. Calheiros, S. Bianchi, M. A. S. Netto, and R. Buyya, “Big Data computing and clouds : Trends and future directions,” J. Parallel Distrib. Comput., vol. 79–80, pp. 3–15, 2015.
[14] G. Lafuente, “The big data security,” Netw. Secur., vol. 2015, no. 1, pp. 12–14, 2015.
[15] Ertaul, L. and Singhal, S. 2009. Security Challenges in Cloud Computing. California State University, East Bay.
[16] H. K. Patil and R. Seshadri, “Big data security and privacy issues in healthcare,” pp. 775–778, 2014.
[17] V. Thayananthan and A. Albeshri, “Big data security issues based on quantum cryptography and privacy with authentication for mobile data center,” Procedia - Procedia Comput. Sci., vol. 50, pp. 149–156, 2015.
[18] L. E. I. Xu, C. Jiang, and J. Wang, “Information Security in Big Data : Privacy and Data Mining,” pp. 1149–1176, 2014.
[19] C. Ji, Y. Li, W. Qiu, U. Awada, and K. Li, “Big Data Processing in Cloud Computing Environments,” pp. 17–23, 2012.
[20] D. Singh and C. K. Reddy, “A survey on platforms for big data analytics,” pp. 1–20, 2014.
[21] L. E. I. Xu, C. Jiang, and J. Wang, “Information Security in Big Data : Privacy and Data Mining,” pp. 1149–1176, 2014
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
