Answer To: Annotated Bibliography Value: 25% Due date: 26-Apr-2018 Return date: 17-May-2018 Length: 2000 words...
Perla answered on Apr 26 2020
Security of IOT and Big Data – Annotated Bibliography
Running Header: Security of IOT and Big Data – Annotated Bibliography
Title: Security of IOT and Big Data – Annotated Bibliography
Presented By:
Presented To:
Date: 25/04/2018
1) Patil, H. K., & Seshadri, R. (2014, June). Big data security and privacy issues in healthcare. In Big Data (BigData Congress), 2014 IEEE International Congress on (pp. 762-765). IEEE.
The security aspects of the big data are discussed in the current article. The emphasis is on the big data from healthcare domain. The key concern of the security functions are about keeping up the privacy matters secured in the big data information. The article worked on to emphasize the security aspects in health care industry big data. It is indicated in the article that there is scope to leverage collective intelligence by leveraging the distribution across different sources. It is expected that such distributive information will render better security of the information.
2) Ahmed, E. S. A., & Saeed, R. A. (2014). A survey of big data cloud computing security. International Journal of Computer Science and Software Engineering (IJCSSE), 3(1), 78-85.
The article discusses the security profile of the operations where in the big data is integrated with the cloud computing operations. The discussion emphasizes the fact that the Information technology services will offer very high efficient and effective solutions to variety of problems. The articles emphasizes on the matters how the security problems of the big data can be overcome, further there is also specific focus on the security for the big data in cloud computing operations. Survey of big data with cloud computing security and the mechanisms that can be employed to protect and secure the big data are discussed here in this report that can work for the betterment of the privacy of big data on the available clouds at present. It is indicated that the volume, variety and velocity are new axioms of the big data being used in cloud computing and the new security measures need to overcome the new challenges of security barriers and they should work on to enhance the efficiency of the security aspects of the big data.
3) AlMutairi, A. M., AlBukhary, R. A. T., & Kar, J. (2015). Security and privacy of big data in various applications. Int J Big Data Secur Intell, 2(1), 19-24.
The article works on to present an overview of the evolution of the big data. More specifically how the big data has evolved from the changing paradigms of the technology applications and also there is very detailed focus on the way the big data is becoming critical. It is indicated that as the massive information quantity is getting collected on diverse application areas like health care, social networks, e-commerce, government and telecommunication applications the criticality of the sensitive information is also growing. In this connection an opinion is expressed to take up additional measures of security in line with the changing criticality and the changing paradigm of application landscape of big data.
4) Khan, I. U., & ur Rehman, S. (2017). A review on big data security and privacy in healthcare applications. In Big Data Management (pp. 71-89). Springer, Cham.
The challenges of big data security and more specifically in the health care applications are discussed in the article. Diverse aspects of big data in connection with the health care industry are discussed in the current article. There is focussed discussion on the aspects like data security, data privacy, user access protocols and user access technologies, further there is also discussion on the aspects of user authorization protocols. While appreciating the need for the security connected with the big data, the article proposes variety of means and procedures to counter the security lapses in the big data applications and different types of security mechanisms are proposed to take care of security requirements in the big data applications.
5) Ma, L., & Jiang, M. (2014, August). Chances and challenges confronting securities industry and the countermeasures in big data and cloud computing era. In Computer Science & Education (ICCSE), 2014 9th International Conference on (pp. 177-182). IEEE.
It is indicated in the article that the big data is both a challenge as well as an opportunity for securities industry. The key focus on the article is on the ways of the data mining and the possible security measures which can be integrated with the data...