Encyclopedia of Big Data Technologies

Living Edition
| Editors: Sherif Sakr, Albert Zomaya

Big Data in the Cloud

Living reference work entry
DOI: https://doi.org/10.1007/978-3-319-63962-8_40-1

Definition

Then eventually discuss big data handling challenges, issues, and how big data can be stored, processed, and accessed in the cloud.

Overview

Cloud storage services have emerged to address the increasing demand to store and process huge amount of data, generally alluded as “Big Data” (Wu et al. 2014). Typically, organizations store the huge volume of data to various clouds.

Cloud computing offers organizations the ability to manage big data and process them without the cost and burden of maintaining and upgrading local computing resources. However, efficient utilization of clouds for big data imposes new challenges in several domains. In this chapter, we discuss challenges in big data storage, distribution, security, and real-time processing. It is also explained how clouds can be instrumental for big data generated by Internet of Things (IoT). An overview of popular tools that are available in clouds for big data analytics is depicted. Finally, there is a discussion on...

This is a preview of subscription content, log in to check access

References

  1. Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. J Comput Netw 54(15):2787–2805CrossRefGoogle Scholar
  2. Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the 1st edition of the MCC workshop on mobile cloud computing, MCC’12, Bonomi- Helsinki, Finland, pp 13–16Google Scholar
  3. Cao N, Yang Z, Wang C, Ren K, Lou W (2011) Privacy-preserving query over encrypted graph-structured data in cloud computing. In: Proceedings of the 31st international conference on distributed computing systems. ICDCS’11. Washington, DC, pp 393–402. ISBN: 978-0-7695-4364-2Google Scholar
  4. Chen D, Zhao H (2012) Data security and privacy protection issues in cloud computing. In: Proceedings of international conference on computer science and electronics engineering, vol 1. ICC-SEE’12, pp 647–651Google Scholar
  5. Chen M, Mao S, Liu Y (2014) Big data: a survey. J Mob Netw Appl 19(2):171–209CrossRefGoogle Scholar
  6. Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security. CCS’06, Virginia, USA, pp 79–88Google Scholar
  7. Darwich M, Beyazit E, Salehi MA, Bayoumi M (2017) Cost Efficient Repository Management for Cloud-Based On Demand Video Streaming. In: Proceedings of the 5th international conference on mobile cloud computing, services, and engineering. IEEE mobile cloud’17. San FranciscoGoogle Scholar
  8. Dewangan AK, Verma G (2015) A security mechanism for cloud computing threats. Int J Comput Appl Comput Electron Welf Rural Masses 1:18Google Scholar
  9. Dignan L (2008) Amazon launches CloudFront; Content delivery network margins go kaboom. http://www.zdnet.com/article/amazon-launches-cloudfront-content-delivery-network-margins-go-kaboom/. Online; Accessed 13 Oct 2017
  10. Dittrich J, Quiané-Ruiz J-A (2012) Efficient big data processing in Hadoop MapReduce. J VLDB Endowment 5(12):2014–2015CrossRefGoogle Scholar
  11. Dolgov S (2017) AI marketplace: neural network in your shopping cart. https://www.linkedin.com/pulse/ai-marketplace-neural-network-your-shopping-cart-sergey-dolgov-1/. Online; Accessed 13 Oct 2017
  12. Elumalai A, Starikova I, Tandon S (2016) IT as a service: from build to consume. https://www.mckinsey.com/industries/high-tech/our-insights/it-as-a-service-from-build-to-consume/. Online; Accessed 12 Oct 2017
  13. Greenwald G, MacAskill E (2013) NSA Prism program taps in to user data of Apple, Google and others. J Guardian 7(6):1–43Google Scholar
  14. Hu H, Wen Y, Chua T-S, Li X (2014) Toward scalable systems for big data analytics: a technology tutorial. J IEEE Access 2:652–687CrossRefGoogle Scholar
  15. Jagannathan S (2016) Real-time big data analytics architecture for remote sensing application. In: Proceedings of the 19th international workshop on software and compilers for embedded systems international conference on signal processing, communication, power and embedded system. SCOPES’16, Germany, pp 1912–1916Google Scholar
  16. Jourdren L, Bernard M, Dillies M-A, Le Crom S (2012) Eoulsan. J Bioinforma 28(11):1542–1543CrossRefGoogle Scholar
  17. Lebdaoui I, El Hajji S, Orhanou G (2016) Managing big data integrity. In: Proceedings of international conference on engineering & MIS. ICEMIS’16, Agadir, Morocco, pp~1–6Google Scholar
  18. Li X, Salehi MA, Bayoumi M, Buyya R (2016) CVSS: a cost-efficient and QoS-aware video streaming using cloud services. In: Proceedings of the 16th IEEE/ACM international symposium on cluster, cloud and grid computing. CCGrid’16. IEEE, Cartagena, Colombia, pp 106–115Google Scholar
  19. Naehrig M, Lauter K, Vaikuntanathan V (2011) Can homomorphic encryption Be practical? In: Proceedings of the 3rd ACM workshop on cloud computing security workshop. CCSW’11. Chicago, pp 113–124Google Scholar
  20. Pierre G, Van Steen M (2006) Globule: a collaborative content delivery network. J Commun Mag 44(8):127–133CrossRefGoogle Scholar
  21. Pusala MK, Salehi MA, Katukuri JR, Xie Y, Raghavan V (2016) Massive data analysis: tasks, tools, applications, and challenges. In: Big data analytics. Springer, New Delhi, India, pp 11–40Google Scholar
  22. Reddy CKK, Anisha PR, Srinivasulu Reddy K, Surender Reddy S (2012) Third party data protection applied to cloud and XACML implementation in the hadoop environment with sparql. J Int Organ Sci Res Comput Eng 2(1):39–46. ISSN: 2278-0661, New Delhi, IndiaGoogle Scholar
  23. Sagiroglu, Sinanc (2013) Big data: a review. In: Proceedings of international conference on collaboration technologies and systems. CTS’13, San Diego, California, USA, pp 42–47Google Scholar
  24. Salehi MA, Caldwell T, Fernandez A, Mickiewicz E, Rozier EWD, Zonouz S, Redberg D (2014) RE-SeED: regular expression search over encrypted data in the cloud. In: Proceedings of the 7th international conference on cloud computing. CLOUD’14, pp 673–680Google Scholar
  25. Shimpi D, Chaudhari S (2012) An overview of graph databases. In: Proceedings of the 2nd international conference in recent trends in information technology and computer science. ICRTITCS’12, India, pp 16–22Google Scholar
  26. Sirivara S (2016) Windows Azure content delivery network. https://azure.microsoft.com/en-us/blog/azure-cdn-from-akamai-ga/. Online; Accessed 13 Oct 2017
  27. Sultan (2015) Top 10 in-memory business intelligence analytics tools. https://www.mytechlogy.com/IT-blogs/9507/top-10-in-memory-business-intelligence-analytics-tools/. Online; Accessed 12 Oct 2017
  28. Terzo O, Ruiu P, Bucci E, Xhafa F (2013) Data as a service (DaaS) for sharing and processing of large data collections in the cloud. In: Proceedings of the 7th international conference on complex, intelligent, and software intensive systems. CISIS’2013, Taichung, Taiwan, pp 475–480Google Scholar
  29. Tsai C-W, Lai C-F, Chiang M-C, Yang LT et al (2014) Data mining for internet of things: a survey. J IEEE Commun Surv Tutorials 16(1):77–97CrossRefGoogle Scholar
  30. Vavilapalli VK et al (2013).Apache hadoop YARN: yet another resource negotiator. In: Proceedings of the 4th annual symposium on cloud computing. SOCC’13. New York, pp 5:1–5:16. ISBN: 978-1-4503-2428-1Google Scholar
  31. Wang C, Cao N, Li J, Ren K, Lou W (2010) Secure ranked keyword search over encrypted cloud data. In: Proceedings of the 30th international conference on distributed computing systems. ICDCS’10, Genoa, Italy, pp 253–262Google Scholar
  32. Woodworth J, Salehi MA, Raghavan V (2016) S3C: an architecture for spaceefficient semantic search over encrypted data in the cloud. In: Proceedings of international conference on Big data. Big Data’16, Washington DC, pp 3722–3731Google Scholar
  33. Wu J, Ping L, Ge X, Wang Y, Jianqing Fu (2010) Cloud storage as the infrastructure of cloud computing. In: Proceeding of 9th international conference on intelligent computing and cognitive informatics. ICICCI’10, Kuala Lumpur, Malaysia, pp 380–383Google Scholar
  34. Wu X, Zhu X, Wu G-Q, Ding W (2014) Data mining with big data. J IEEE Trans Knowl Data Eng 26(1):97–107CrossRefGoogle Scholar
  35. Zhao R, Yue C, Tak B, Tang C (2015) SafeSky: a secure cloud storage middleware for end-user applications. In: Proceedings of the 34th IEEE symposium on reliable distributed systems. SRDS’15, Montreal, QC, Canada, pp 21–30Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.High Performance Cloud Computing (HPCC) laboratoryUniversity of Louisiana at LafayetteLafayetteUSA

Section editors and affiliations

  • Rodrigo N. Calheiros
    • 1
  • Marcos Dias de Assuncao
    • 2
  1. 1.School of Computing, Engineering and MathematicsPenrithAustralia
  2. 2.Inria, LIP, ENS LyonLyonFrance