The Review of Big Data Security Analytics for Protecting Cloud-based Virtualized Infrastructures
Abstract
Cloud computing is a popular model designed to deliver information technology services and security is one of the key concerns and is therefore designed to combat detected attacks in critical infrastructures. A virtualized framework has become an important target for cyber
attackers to initiate advance attacks. The virtualized framework contains virtual machines that rely on the multi-instance theme of the current hardware defined by the software. The paper deals with security majors for virtualized infrastructures and a comprehensive review of big data security analytics for the protection of virtualized infrastructures in the cloud environment.
How to cite this article: Ahmad H, Singh S. The Review of Big Data Security Analytics for Protecting Cloud-based Virtualized Infrastructures. J Engr Desg Anal 2020; 3(1): 35-38.
References
Niloufer B, Saritha VJ. Implementation of Big Data Protection Analytics in Virtualized Infrastructures. International Journal of Technical Innovation in Modern Engineering and Science (IJTIMES) 2018; 4(9).
Sridhar MB, Koushik A. A Study of Big Data Analytics in Clouds with a Security Perspective. International Journal of Engineering Research & Technology (IJERT), 2017; 6(1).
Stalin JLA, Narayanan MB, Deepak M. Security Analytics for Protecting Virtualized Infrastructures. Information Systems & eBusiness Network 2017.
Win TY, Tianfield H, Mair Q. Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing. IEEE 2017.
Yang C, Huang Q, Li Z et al. Big Data and cloud computing: innovation opportunities and challenges. International Journal of Digital Earth 2017; 10(1).
Prashanthi M. Analysis of Security Issues in Virtualization Cloud Computing. International Journal of Computer Science and Mobile ComputingIJCSMC 2016; 5(8).
Gholami A, Laure E. Big Data Security And Privacy Issues in The Cloud. International Journal of Network Security& Its Applications (IJNSA) 2016; 8(1).
Varsha, Wadhwa A, Gupta S. Study of Security Issues in Cloud Computing. International Journal of Computer Science and Mobile Computing IJCSMC 2015; 4(6).
Wang L, Alexander CA. Big Data in Distributed Analytics, Cybersecurity, Cyber Warfare and Digital Forensics. Science and Education Publishing 2015; 1(1).
Ahmed M, Hossain MA. Cloud Computing and Security Issues In the Cloud. International Journal of Network Security & Its Applications (IJNSA) 2014; 6(1).
Inukollu VN, Arsi S, Ravuri SR. Security Issues Associated With Big Data in Cloud Computing. International Journal of Network Security & Its Applications (IJNSA) 2014; 6(3).
Swathi T, Srikanth K, Reddy SR. Virtualization in Cloud Computing. International Journal of Computer Science and Mobile Computing IJCSMC 2014; 3(5).
Kazim M, Masood R, Shibli MA et al. Security Aspects of Virtualization in Cloud Computing 2013.
Sabahi F. Secure Virtualization for Cloud Environment Using Hypervisor-based Technology. International Journal of Machine Learning and Computing 2012; 2(1).
Liu W. Research on Cloud Computing Security Problem and Strategy IEEE 2012.
Sengupta S, Kaulgud V, Sharma VS. Cloud Computing Security - Trends and Research Directions IEEE 2011.
Neves PC, Schmerl B, Bernardino J et al. Big Data in Cloud Computing: features and issues.
Published
Issue
Section
Copyright (c) 2020 Journal of Engineering Design and Analysis
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
We, the undersigned, give an undertaking to the following effect with regard to our article entitled
“_______________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________________” submitted for publication in (Journal title)________________________________________________ _______________________________________________________Vol.________, Year _________:-
1. The article mentioned above has not been published or submitted to or accepted for publication in any form, in any other journal.
2. We also vouchsafe that the authorship of this article will not be contested by anyone whose name(s) is/are not listed by us here.
3. I/We declare that I/We contributed significantly towards the research study i.e., (a) conception, design and/or analysis and interpretation of data and to (b) drafting the article or revising it critically for important intellectual content and on (c) final approval of the version to be published.
4. I/We hereby acknowledge ADRs conflict of interest policy requirement to scrupulously avoid direct and indirect conflicts of interest and, accordingly, hereby agree to promptly inform the editor or editor's designee of any business, commercial, or other proprietary support, relationships, or interests that I/We may have which relate directly or indirectly to the subject of the work.
5. I/We also agree to the authorship of the article in the following sequence:-
Authors' Names (in sequence) Signature of Authors
1. _____________________________________ _____________________________________
2. _____________________________________ _____________________________________
3. _____________________________________ _____________________________________
4. _____________________________________ _____________________________________
5. _____________________________________ _____________________________________
6. _____________________________________ _____________________________________
7. _____________________________________ _____________________________________
8. _____________________________________ _____________________________________
Important
(I). All the authors are required to sign independently in this form in the sequence given above. In case an author has left the institution/ country and whose whereabouts are not known, the senior author may sign on his/ her behalf taking the responsibility.
(ii). No addition/ deletion/ or any change in the sequence of the authorship will be permissible at a later stage, without valid reasons and permission of the Editor.
(iii). If the authorship is contested at any stage, the article will be either returned or will not be
processed for publication till the issue is solved.