Significance of Implementing Cloud Security Solutions in Big Data Management
This research proposal depicts the importance of implementing Cloud security issues and its respective solutions in Big data Management. Big data is referred to as a voluminous set of data that holds different information regarding the desired. Most of the large to medium enterprises and even online shopping carts are even currently suing the concept of big data management to resolving the technical issues associated to cloud platform (Duncan et al., 2017). With the effective growth of technology the business organizations have started using advanced technical advances. These platforms are definitely helpful but at the same due to lack of operational and functional experiences these technologies might hamper the entire data and even business flow of the enterprises as well.
With the rapidly increasing number of consumers the amounts of information are also growing however, in the traditional platform storing those data have become very difficult. In order to resolve this cloud based issues the business organizations are willing to implement big data management system. After identifying the main problem of implementing cloud computing technologies the significance of the study and the way through which the issues of cloud computing can be diminished with big data solution are implemented in this research proposal. It is expected that implementation of big data management tool will lead the research towards measurable success.
In both the field of innovation and interventions big data has become one of the major technical forces. This particular paradigm is represented as an effort for understanding to gain insight from the huge set of information set. Big data helps to provide a summarized document to the enterprises over the huge information set (Demchenko et al., 2016). Security is referred to as one of the most important factors that are strictly required to be analyzed by the management heads of the business enterprises to gain competitive advantages over the working domain. For storing large set of information cloud platform with proper big data management tools is needed to be incorporated (Chang & Ramachandran, 2016). It helps to serve explicit security and extensive control over the security issues. Different computing resources could be shared properly with the help of the cloud platform because the aim of using cloud computing technology in the business enterprises to execute and share millions of information between the stakeholders within fraction of seconds (Zhou, Fu & Yang, 2016). In order to make successful data processing among the servers the cloud computing platform uses specialized connection.
Big Data Management to Mitigate Cloud Platform Security Challenges
In these kinds of system the users are allowed to install single software through which the employees and the associates will be able to access data set through the help of the web based services. It also helps to host all the programs those are strictly needed y the users accordingly. In the cloud computing system these workload can be shifted even easily. If cloud computing technology is implemented by the user then for running the applications properly, local computers will be no longer the only responsible device. As in case of cloud platform the data access approach become much easier thus, the rate of security related issues also start to grow apparently (Botta et al., 2016). If proper security aspects are not installed by the enterprise security departments then data hijacking will become a easy job for the external attackers. While studying the cloud security issues it is defined that in order to resolve these issues the most suitable solution could be served by the big data management tool. Different big data management tools are there but among them in order to resolve the data management oriented issues, Hadoop tool is referred to as the most suitable one from the business perspectives.
It has been defined that from the evolutionary phase internet systems security, privacy and trust are highlighted as the existing issues. If any small or large enterprise wills to process data in the loud platform then, chances of occurrences of inherent risks also increases accordingly. It is the responsibility of the enterprise head to ensure that the data those have been stored in the server must be retrieved whenever needed by the employees. On the other hand, the data server are needed to be secured from the external attackers, due to lack server authorization and system authentication external users will be able to easily access data stored in the storage (Vajjhala & Ramollari, 2016). The business organization has to compromise about the data consistency, data storage. With the development of proper trust models and security protocols the information of stored in the server will be kept as a secured one. The main objectives of the study are as follow:
This particular research works aims to develop a framework for the business organizations to understand the security issues associated to cloud platform and in order to mitigate the security challenges the big data management tool that has to be implemented are elaborated in this proposal.
- To identify the security challenges that organizations are facing due to the implementation of cloud platform
- To analyze the security protocols those should be implemented to resolve the security threats
- To define the most suitable big data management tools for diminishing the security issues
The Role of Hadoop as the Most Suitable Big Data Management Tool
It is expected that with the successful implementation of the study the readers and the enterprise owners will be able to understand the security challenges that their companies might face due to incorrect usage of big data management tools. The different ways through which the cloud platform issues will be mitigated are elaborated and analyzed in this research proposal.
- What are the major security levels of threats that continuously affecting the enterprise which are using cloud platform?
- What are the different security protocols those are required to be used by the enterprise?
- From considering the technical characteristics determine which is the most suitable big data management tool for resolving the cloud platform issues?
2.1 Design
‘In order to collect detail about the research topic, mixed research design is needed to be used by the researchers. It implies that both primary and secondary data collection approach are used considering arrangement of survey questionnaires and also already published journals and books. For gathering data the existing users of cloud service and big data are nominated. Deductive research approach and exploratory methods should be used by the researchers to get further information about the topic.
After conducting survey both the qualitative and quantitative data are collected and the proposed sampling technique to be used for the research is Simple Random Sampling (SRS).
After gathering data the analysis methods those are proposed to be used by the researchers are qualitative data analysis.
2.4 Ethical consideration
For this research work a survey is being conducted with the development of a survey questionnaire. However, while conducting the survey the moral mindset of the participants should not be influenced. Additionally, the data those are collected are stated to be true and logical as well.
2.5 Research limitation
The main limitations of the research are limited time and information resources. Due to lack of time and sources information those are gathered are limited.
It is expected that after going through the details of the research topic the enterprise owners will be able to identify the major cloud security challenges and after the identification proper big data management tool that has to be used will also be identified.
Conclusion
From the overall discussion it can be concluded that with the help of the big data management system the key issues of cloud computing can be reduced rather resolved. Different skills are available that most of the business organizations already use on the other hand, another skill is that the organizations will to use to gain competitive advantages and measurable revenue structure. For these particularly highlighted issues Hadoop big data management tools is proposed to be used to fix the cloud computing issues. Though this tool is expensive but still it is expected that after incorporating big data management tool the cloud platform based issues will be completely minimized. On the other hand, integration of new information with the existing data is another major problem that hampers the normal data flow and information access of the organization. In order to integrate data with the existing information set, Hadoop big data tool stands very successful. Hadoop big data management tool provides matured and successful solution to the enterprises to resolve the security issues. Based on the quality and type of the cloud platform proper solution in terms of big data management is needed to be implemented by the companies. An appropriate research methodology should be selected by the researcher while proposing the most suitable big data solution to resolve the cloud platform based issues.
Conclusion
References
Azim, R., Barua, S., Rahman, J., & Rahman, A. M. (2016). Enterprise Knowledge Collaboration for Decision Making Based on Cloud Big Data Using HDFS. INNOVATION AND MANAGEMENT, 1801.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Chang, V., & Ramachandran, M. (2016). Towards achieving data security with the cloud computing adoption framework. IEEE Transactions on Services Computing, 9(1), 138-151.
Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption framework: A security framework for business clouds. Future Generation Computer Systems, 57, 24-41.
Demchenko, Y., Turkmen, F., de Laat, C., Blanchet, C., & Loomis, C. (2016, July). Cloud based big data infrastructure: Architectural components and automated provisioning. In High Performance Computing & Simulation (HPCS), 2016 International Conference on (pp. 628-636). IEEE.
Duncan, B., Whittington, M., Jaatun, M. G., & Zúñiga, A. R. R. (2017). Could the Outsourcing of Incident Response Management Provide a Blueprint for Managing Other Cloud Security Requirements?. In Enterprise Security (pp. 19-39). Springer, Cham.
Kuila, S., Shridhar, S., Patel, C., & Iyengar, N. C. S. (2016). Cloud Computing Security by Using Mobile OTP and an Encryption Algorithm for Hospital Management. Journal of Computer and Mathematical Sciences, 7(11), 558-565.
Li, Y., Gai, K., Qiu, L., Qiu, M., & Zhao, H. (2017). Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, 103-115.
Rahman, A. F. A., Daud, M., & Mohamad, M. Z. (2016, March). Securing sensor to cloud ecosystem using internet of things (iot) security framework. In Proceedings of the International Conference on Internet of things and Cloud Computing (p. 79). ACM.
Ramachandran, M., & Chang, V. (2016). Towards performance evaluation of cloud service providers for cloud data security. International Journal of Information Management, 36(4), 618-625.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.
Vajjhala, N. R., & Ramollari, E. (2016). Big data using cloud computing-opportunities for small and medium-sized enterprises. Eur J Econ Bus Stud, 1(4), 129-137.
Vatsalan, D., Sehili, Z., Christen, P., & Rahm, E. (2017). Privacy-Preserving Record Linkage for Big Data: Current Approaches and Research Challenges. In Handbook of Big Data Technologies (pp. 851-895). Springer International Publishing.
Venkatachalapathy, D. K., Thiyagarajan, V. S., Ayyasamy, A., & Ranjani, K. (2016). Big Data with Cloud Virtualization for Effective Resource Handling. International Journal of control Theory and Applications, 9(1).
Zhou, K., Fu, C., & Yang, S. (2016). Big data driven smart energy management: From big data to big insights. Renewable and Sustainable Energy Reviews, 56, 215- Satapathy, S. K., Moharana, S. K., & Ojha, A. K. (2016). Implication of Security Issues Associated With Big Data In Cloud Computing. International Journal of Recent Trends in Engineering & Research (IJRTER), 2(04), 2455-1457.