Abstract
With data volumes constantly growing, cloud computing provides a model for Big Data Analytics where solutions can benefit from rapid elasticity and scalability. This model changes the level of control that cloud service customers have on their data. Understanding how data is handled by cloud service providers is therefore critical in achieving data quality objectives. This paper presents an analysis on the applicability of ISO/IEC standards to Big Data Analytics cloud services, focusing on data quality. Based on results, we provide observations, identify challenges, and offer recommendations on the application of standards and future development.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
References
Assuno, M.D., et al.: Big data computing and clouds: trends and future directions. J. Parallel Distrib. Comput. 79, 3–15 (2015)
ISO/IEC 17788: Information technology – Cloud computing – Overview and vocabulary (2014)
Krishna, P., Varma, K.: Cloud analytics: A path towards next generation affordable BI. White paper, Infosys (2012)
Krippendorff, K.: Computing Krippendorff’s alpha reliability. Departmental papers (ASC), p. 43 (2007)
Suryn, W.: Software Quality Engineering: A Practitioner’s Approach. Wiley, Hoboken (2013)
ISO/IEC 25010: Systems and software engineering – Systems and software Quality Requirements and Evaluation (SQuaRE) – System and software quality models (2010)
ISO/IEC 25012: Software engineering – Software product Quality Requirements and Evaluation (SQuaRE) – Data quality model (2008)
ISO/IEC 17789: Information technology – Cloud Computing – Reference Architecture (CCRA) (2014)
ISO/IEC 19086-1: Information technology – Cloud computing – Service Level Agreement (SLA) framework – Part 1: Overview and concepts (2015)
ISO/IEC 19086-2: Information technology – Cloud computing – Service level agreement (SLA) framework – Part 2: Metric Model
ISO/IEC 19086-3: Information technology – Cloud computing – Service level agreement (SLA) framework – Part 3: Core conformance requirements
ISO/IEC 19086-4: Information technology – Cloud computing – Service level agreement (SLA) framework – Part 4: Security and privacy
ISO/IEC 27018: Information technology – Security techniques – Code of practice for PII protection in public clouds acting as PII processors (2014)
ISO/IEC 27017: Information technology – Security techniques – Code of practice for information security controls based on ISO/IEC 27002 for cloud services (2015)
Cheikhi, L., Abran, A.: Investigation of the relationships between the software quality models of the ISO 9126 standard: an empirical study using the Taguchi method. Softw. Qual. Prof. 14(2), 22–34 (2012)
ISO/IEC 29100: Information technology – Security techniques – Privacy framework (2011)
Villalpando, L.E.B., April, A., Abran, A.: Performance analysis model for big data applications in cloud computing. J. Cloud Comput. 3(1), 1–20 (2014)
Bautista, L., Abran, A., April, A.: Design of a performance measurement framework for cloud computing. J. Softw. Eng. Appl. 5(2), 69–75 (2012)
ISO/IEC 25023: Systems and software engineering – Systems and software Quality Requirements and Evaluation (SQuaRE) – Measurement of system and software product quality (2014)
Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. Commun. ACM 51(1), 107–113 (2008)
Merino, J., et al.: A data quality in use model for big data. Future Gener. Comput. Syst. 63, 123–130 (2015)
Laranjeiro, N., Soydemir, S.N., Bernardino, J.: A survey on data quality: classifying poor data. In: 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE (2015)
Kemp, R.: ISO 27018 and personal information in the cloud: first year scorecard. Comput. Law Secur. Rev. 31(4), 553–555 (2015)
Mitchell, C.: Privacy, compliance and the cloud. In: Zhu, S.Y., Hill, R., Trovati, M. (eds.) Guide to Security Assurance for Cloud Computing, pp. 3–14. Springer, Heidelberg (2015)
Panth, D., Mehta, D., Shelgaonkar, R.: A survey on security mechanisms of leading cloud service providers. Int. J. Comput. Appl. 98, 24 (2014)
ISO/IEC 27001: Information technology – Security techniques – Information security management systems – Requirements (2013)
Liu, Y., et al.: A survey of security and privacy challenges in cloud computing: solutions and future directions. J. Comput. Sci. Eng. 9(3), 119–133 (2015)
Krippendorff, K.: Content Analysis: An Introduction to its Methodology. Sage, Thousand Oaks (2004)
Hayes, A.F., Krippendorff, K.: Answering the call for a standard reliability measure for coding data. Commun. Methods Measures 1(1), 77–89 (2007)
Abadi, D.J.: Data management in the cloud: limitations and opportunities. IEEE Data Eng. Bull. 32(1), 3–12 (2009)
Abbasi, A., Sarker, S., Chiang, R.: Big data research in information systems: toward an inclusive research agenda. J. Assoc. Inf. Syst. 17(2), 3 (2016)
Sun, X., et al.: A cost-effective approach to delivering analytics as a service. In: 2012 IEEE 19th International Conference on Web Services (ICWS). IEEE (2012)
Kambatla, K., et al.: Trends in big data analytics. J. Parallel Distrib. Comput. 74(7), 2561–2573 (2014)
Che, D., Safran, M., Peng, Z.: From big data to big data mining: challenges, issues, and opportunities. In: Hong, B., Meng, X., Chen, L., Winiwarter, W., Song, W. (eds.) DASFAA 2013. LNCS, vol. 7827, pp. 1–15. Springer, Heidelberg (2013). doi:10.1007/978-3-642-40270-8_1
Davey, J., Mansmann, F., Kohlhammer, J., Keim, D.: Visual analytics: towards intelligent interactive internet and security solutions. In: Álvarez, F., Cleary, F., Daras, P., Domingue, J., Galis, A., Garcia, A., Gavras, A., Karnourskos, S., Krco, S., Li, M.-S., Lotz, V., Müller, H., Salvadori, E., Sassen, A.-M., Schaffers, H., Stiller, B., Tselentis, G., Turkama, P., Zahariadis, T. (eds.) FIA 2012. LNCS, vol. 7281, pp. 93–104. Springer, Heidelberg (2012). doi:10.1007/978-3-642-30241-1_9
Sweller, J.: Cognitive load during problem solving: effects on learning. Cogn. Sci. 12(2), 257–285 (1988)
Bolognini, L., Bistolfi, C.: Pseudonymization and impacts of big (personalanonymous) data processing in the transition from the directive 9546EC to the new EU general data protection regulation. Comput. Law Secur. Rev. 33, 171–181 (2017)
Hashem, I.A.T., et al.: The rise of “big data” on cloud computing: review and open research issues. Inf. Syst. 47, 98–115 (2015)
Kumar, R.S., Saxena, A.: Data integrity proofs in cloud storage. In: 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011). IEEE (2011)
Khan, N., et al.: Big data: survey, technologies, opportunities, and challenges. Sci. World J. 34, 518–522 (2014)
Fayyad, U., Piatetsky-Shapiro, G., Smyth, P.: The KDD process for extracting useful knowledge from volumes of data. Commun. ACM 39(11), 27–34 (1996)
Tu, S., et al.: Processing analytical queries over encrypted data. Proc. VLDB Endowment 6, 289–300 (2013). VLDB Endowment
International Organization for Standardization: “Pseudonymization” – new ISO specification supports privacy protection in health informatics (2009)
ISO/TS 25237: Health informatics – Pseudonymization (2008)
ISO/IEC 15944-8: Information technology – Business operational view – Part 8: Identification of privacy protection requirements as external constraints on business transactions (2012)
ISO/IEC N15297: Proposal for a new work item on Privacy enhancing data de-identification techniques, June 2015
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Roy, J., Terfas, H., Suryn, W. (2017). On the Use of ISO/IEC Standards to Address Data Quality Aspects in Big Data Analytics Cloud Services. In: Abramowicz, W. (eds) Business Information Systems. BIS 2017. Lecture Notes in Business Information Processing, vol 288. Springer, Cham. https://doi.org/10.1007/978-3-319-59336-4_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-59336-4_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-59335-7
Online ISBN: 978-3-319-59336-4
eBook Packages: Computer ScienceComputer Science (R0)