Proposing a model on Security challenges in cloud computing especially Social Media and Social Sites
Fayaz Ahmad Lone, Dr. Amit Kumar Chaturvedi "Proposing a model on Security challenges in cloud computing especially Social Media and Social Sites". International Journal of Computer Trends and Technology (IJCTT) V47(1):68-73, May 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
For big data application security
challenges, Social media is the next battleground.
Big social data can serve as an early warning
system of trouble brewing and a leading indicator
of imminent action by a potential troublemaker.
Mostly Social media listens for early detection of
adverse events and product quality surveillance. It
may also be used for product recommendation. In
this paper, we will focus to uncover ideas and open
problems with big data security in cloud computing
especially Social Media and Social Sites. We have
also proposed a model Information Measuring for
Social Media [IMSM] Model for improving the
contents and quality of information on social sites.
References
[1]. M. K. Kakhani, S. Kakhani, and S. R. Biradar, ?Research
Issues in Big Data Analytics?, International Journal of
Application or Innovation in Engineering & Management
(IJAIEM), Volume 2, Issue 8, August 2013 ISSN 2319 –
4847.
[2]. Jimmy Lin, Chris Dyer, Data-Intensive Text Processing
with MapReduce, Manuscript prepared April 11, 2010.
[3]. C.L. Hepsiba, J.G.R. Sathiaseelan , ?Security Issues in
Service Models of Cloud Computing, International
Journal of Computer Sc. and Mobile Computing, Vol. 5
Issue. 3, Mar 2016, pp. 610-615, ISSN 2320-088X.
[4]. Gayathri. K.S, T. Thomas, J. Jayasudha,, ?security issues
of Media Sharing in Social Cloud, International
Conference on Modelling, Optimisation and Computing
(ICMOC-2012), Elsevier, Procedia Engineering 38 (2012),
pp. 3806-3815.
[5]. A.Singh, K. Chatterjee, ?Cloud security issues and
challenges: A survey?, Journal of Network and Computer
Applications 79 (2017), Elsevier, pp 88-115
[6]. Sanjay P. Ahuja, Bryan Moore, ?A Survey of Cloud
Computing and Social Networks, Network and
Communication Technologies; Vol. 2, No. 2; 2013, ISSN
1927-064X E-ISSN 1927-0658, pp 11-16.
[7]. Christos Stergioua, Kostas E. Psannis, Byung-Gyu Kimb,
Brij Gupta, ?Secure integration of IoT and Cloud
Computing, Elsevier, Future Generation Computer
Systems, pp. 1-12, Dec 2016.
[8]. G. Manogarana, , C. Thota, M. Vijay Kumar,
?MetaCloudDataStorage Architecture for Big Data
Security in Cloud Computing, 4th International
Conference on Recent Trends in Computer Science &
Engineering, Procedia Computer Science 87 ( 2016 ), pp.
128 – 133.
[9]. Md. Tanzim Khorshed, A.B.M. Shawkat Ali, Saleh A.
Wasimi, ?A survey on gaps, threat remediation challenges
and some thoughts for proactive attack detection in cloud
computing, Future Generation Computer Systems 28
(2012) pp. 833–851.
[10]. Tom White, Hadoop: The Definitive Guide, O’Reilly
Media, Inc, 2009
[11]. S. .J. Samuel, Koundinya RVP, K. Sashidhar, and C.R.
Bharathi, ?A SURVEY ON BIG DATA AND ITS
RESEARCH CHALLENGES, ARPN Journal of
Engineering and Applied Sciences, VOL. 10, NO. 8, MAY
2015
[12]. M.M. Potel, C A Dhote, D.H. Sharma, ?Homomorphic
Encryption for Security of Cloud Data, Procedia
Computer Science 79 (2016), pp. 175-181.
[13]. Zhong Wang, Qian Yu, ?Privacy trust crisis of personal
data in China in the era of Big Data: The survey and
countermeasures, Computer Law & Security Review
31(2015), pp.782-792
[14]. N. Kshetri, ?Big data’s impact on privacy, security and
customer welfare, Telecommunicaitons Policy 38 (2014),
pp.1134-1145.
[15]. S.Akter, S.F.Wamba, A.Gunasekaran, R. Dubey, S.
J.Childe, ?How to improve firm performance using big
data analytics capability and business strategy
alignment?, International Journal of Production
Economics, 182 (2016), pp.113-131.
[16]. A. Siddiqa, I.A.T. Hashem, I.Yaqoob, M.Marjani, S.
Shamshirband, A. Gani, F.Nasaruddin, ?A Survey of big
data management: Taxonomy and state-of-the-art, 71
(2016), pp. 151-166.
[17]. R. Shaikh, M. Sasikumar, ?Trust Model for Measuring
Security Strength of Cloud Computing Service, Procedia
Computer Science 45 (2015), pp 380-389
[18]. Vennila.S, and Priyandarshini J. , ?Scalable Privacy
Preservation in Big Data A Survey, Procedia Computer
Science 50 (2015), pp. 369-373
[19]. B. H. Krishnaa, Dr. S. Kiranb, G. Muralia, R.P.K. Reddy,
?Security Issues In Service Model Of Cloud Computing
Environment, Procedia Computer Science 87 (2016),pp
246-251
[20]. N. Khana, A. Al-Yasirib, ?Identifying Cloud Security
Threats to Strengthen Cloud Computing Adoption
Framework, Procedia Computer Science 94 (2016), pp
485-490
[21]. S.A. Hussain, M.Fatima, A. Saeed, I. Raza, R. K. Shahzad,
?Multilevel classification of security concerns in cloud
computing, Applied Computing and Informatics, 2210-
8327, 2016, King Saud University Published by Elsevier
B.V.
[22]. C. Saadia, H. Chaouib, ?Cloud Computing Security Using
IDS-AM-Clust, Honeyd, Honeywall and Honeycomb,
Procedia Computer Science 85 (2016), pp 433-442.
Keywords
Social sites, cloud, big data, security,
information quality.