Skip to main content

Big Data in the Cloud

Definitions

Then eventually discuss big data handling challenges, issues, and how big data can be stored, processed, and accessed in the cloud.

Overview

Cloud storage services have emerged to address the increasing demand to store and process huge amount of data, generally alluded as “Big Data” (Wu et al. 2014). Typically, organizations store the huge volume of data to various clouds.

Cloud computing offers organizations the ability to manage big data and process them without the cost and burden of maintaining and upgrading local computing resources. However, efficient utilization of clouds for big data imposes new challenges in several domains. In this chapter, we discuss challenges in big data storage, distribution, security, and real-time processing. It is also explained how clouds can be instrumental for big data generated by Internet of Things (IoT). An overview of popular tools that are available in clouds for big data analytics is depicted. Finally, there is a discussion on...

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-319-77525-8_40
  • Chapter length: 8 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   899.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-77525-8
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Hardcover Book
USD   1,099.99
Price excludes VAT (USA)
Big Data in the Cloud, Fig. 1
Big Data in the Cloud, Fig. 2
Big Data in the Cloud, Fig. 3

References

  • Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. J Comput Netw 54(15):2787–2805

    MATH  CrossRef  Google Scholar 

  • Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the 1st edition of the MCC workshop on mobile cloud computing, MCC’12, Bonomi- Helsinki, Finland, pp 13–16

    Google Scholar 

  • Cao N, Yang Z, Wang C, Ren K, Lou W (2011) Privacy-preserving query over encrypted graph-structured data in cloud computing. In: Proceedings of the 31st international conference on distributed computing systems. ICDCS’11. Washington, DC, pp 393–402. ISBN: 978-0-7695-4364-2

    Google Scholar 

  • Chen D, Zhao H (2012) Data security and privacy protection issues in cloud computing. In: Proceedings of international conference on computer science and electronics engineering, vol 1. ICC-SEE’12, pp 647–651

    Google Scholar 

  • Chen M, Mao S, Liu Y (2014) Big data: a survey. J Mob Netw Appl 19(2):171–209

    CrossRef  Google Scholar 

  • Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security. CCS’06, Virginia, USA, pp 79–88

    Google Scholar 

  • Darwich M, Beyazit E, Salehi MA, Bayoumi M (2017) Cost Efficient Repository Management for Cloud-Based On Demand Video Streaming. In: Proceedings of the 5th international conference on mobile cloud computing, services, and engineering. IEEE mobile cloud’17. San Francisco

    Google Scholar 

  • Dewangan AK, Verma G (2015) A security mechanism for cloud computing threats. Int J Comput Appl Comput Electron Welf Rural Masses 1:18

    Google Scholar 

  • Dignan L (2008) Amazon launches CloudFront; Content delivery network margins go kaboom. http://www.zdnet.com/article/amazon-launches-cloudfront-content-delivery-network-margins-go-kaboom/. Online; Accessed 13 Oct 2017

  • Dittrich J, Quiané-Ruiz J-A (2012) Efficient big data processing in Hadoop MapReduce. J VLDB Endowment 5(12):2014–2015

    CrossRef  Google Scholar 

  • Dolgov S (2017) AI marketplace: neural network in your shopping cart. https://www.linkedin.com/pulse/ai-marketplace-neural-network-your-shopping-cart-sergey-dolgov-1/. Online; Accessed 13 Oct 2017

  • Elumalai A, Starikova I, Tandon S (2016) IT as a service: from build to consume. https://www.mckinsey.com/industries/high-tech/our-insights/it-as-a-service-from-build-to-consume/. Online; Accessed 12 Oct 2017

  • Greenwald G, MacAskill E (2013) NSA Prism program taps in to user data of Apple, Google and others. J Guardian 7(6):1–43

    Google Scholar 

  • Hu H, Wen Y, Chua T-S, Li X (2014) Toward scalable systems for big data analytics: a technology tutorial. J IEEE Access 2:652–687

    CrossRef  Google Scholar 

  • Jagannathan S (2016) Real-time big data analytics architecture for remote sensing application. In: Proceedings of the 19th international workshop on software and compilers for embedded systems international conference on signal processing, communication, power and embedded system. SCOPES’16, Germany, pp 1912–1916

    Google Scholar 

  • Jourdren L, Bernard M, Dillies M-A, Le Crom S (2012) Eoulsan. J Bioinforma 28(11):1542–1543

    CrossRef  Google Scholar 

  • Lebdaoui I, El Hajji S, Orhanou G (2016) Managing big data integrity. In: Proceedings of international conference on engineering & MIS. ICEMIS’16, Agadir, Morocco, pp 1–6

    Google Scholar 

  • Li X, Salehi MA, Bayoumi M, Buyya R (2016) CVSS: a cost-efficient and QoS-aware video streaming using cloud services. In: Proceedings of the 16th IEEE/ACM international symposium on cluster, cloud and grid computing. CCGrid’16. IEEE, Cartagena, Colombia, pp 106–115

    Google Scholar 

  • Naehrig M, Lauter K, Vaikuntanathan V (2011) Can homomorphic encryption Be practical? In: Proceedings of the 3rd ACM workshop on cloud computing security workshop. CCSW’11. Chicago, pp 113–124

    Google Scholar 

  • Pierre G, Van Steen M (2006) Globule: a collaborative content delivery network. J Commun Mag 44(8):127–133

    CrossRef  Google Scholar 

  • Pusala MK, Salehi MA, Katukuri JR, Xie Y, Raghavan V (2016) Massive data analysis: tasks, tools, applications, and challenges. In: Big data analytics. Springer, New Delhi, India, pp 11–40

    Google Scholar 

  • Reddy CKK, Anisha PR, Srinivasulu Reddy K, Surender Reddy S (2012) Third party data protection applied to cloud and XACML implementation in the hadoop environment with sparql. J Int Organ Sci Res Comput Eng 2(1):39–46. ISSN: 2278-0661, New Delhi, India

    Google Scholar 

  • Sagiroglu, Sinanc (2013) Big data: a review. In: Proceedings of international conference on collaboration technologies and systems. CTS’13, San Diego, California, USA, pp 42–47

    Google Scholar 

  • Salehi MA, Caldwell T, Fernandez A, Mickiewicz E, Rozier EWD, Zonouz S, Redberg D (2014) RE-SeED: regular expression search over encrypted data in the cloud. In: Proceedings of the 7th international conference on cloud computing. CLOUD’14, pp 673–680

    Google Scholar 

  • Shimpi D, Chaudhari S (2012) An overview of graph databases. In: Proceedings of the 2nd international conference in recent trends in information technology and computer science. ICRTITCS’12, India, pp 16–22

    Google Scholar 

  • Sirivara S (2016) Windows Azure content delivery network. https://azure.microsoft.com/en-us/blog/azure-cdn-from-akamai-ga/. Online; Accessed 13 Oct 2017

  • Sultan (2015) Top 10 in-memory business intelligence analytics tools. https://www.mytechlogy.com/IT-blogs/9507/top-10-in-memory-business-intelligence-analytics-tools/. Online; Accessed 12 Oct 2017

  • Terzo O, Ruiu P, Bucci E, Xhafa F (2013) Data as a service (DaaS) for sharing and processing of large data collections in the cloud. In: Proceedings of the 7th international conference on complex, intelligent, and software intensive systems. CISIS’2013, Taichung, Taiwan, pp 475–480

    Google Scholar 

  • Tsai C-W, Lai C-F, Chiang M-C, Yang LT et al (2014) Data mining for internet of things: a survey. J IEEE Commun Surv Tutorials 16(1):77–97

    CrossRef  Google Scholar 

  • Vavilapalli VK et al (2013).Apache hadoop YARN: yet another resource negotiator. In: Proceedings of the 4th annual symposium on cloud computing. SOCC’13. New York, pp 5:1–5:16. ISBN: 978-1-4503-2428-1

    Google Scholar 

  • Wang C, Cao N, Li J, Ren K, Lou W (2010) Secure ranked keyword search over encrypted cloud data. In: Proceedings of the 30th international conference on distributed computing systems. ICDCS’10, Genoa, Italy, pp 253–262

    Google Scholar 

  • Woodworth J, Salehi MA, Raghavan V (2016) S3C: an architecture for spaceefficient semantic search over encrypted data in the cloud. In: Proceedings of international conference on Big data. Big Data’16, Washington DC, pp 3722–3731

    Google Scholar 

  • Wu J, Ping L, Ge X, Wang Y, Jianqing Fu (2010) Cloud storage as the infrastructure of cloud computing. In: Proceeding of 9th international conference on intelligent computing and cognitive informatics. ICICCI’10, Kuala Lumpur, Malaysia, pp 380–383

    Google Scholar 

  • Wu X, Zhu X, Wu G-Q, Ding W (2014) Data mining with big data. J IEEE Trans Knowl Data Eng 26(1):97–107

    CrossRef  Google Scholar 

  • Zhao R, Yue C, Tak B, Tang C (2015) SafeSky: a secure cloud storage middleware for end-user applications. In: Proceedings of the 34th IEEE symposium on reliable distributed systems. SRDS’15, Montreal, QC, Canada, pp 21–30

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohsen Amini Salehi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this entry

Verify currency and authenticity via CrossMark

Cite this entry

Zobaed, S.M., Salehi, M.A. (2019). Big Data in the Cloud. In: Sakr, S., Zomaya, A.Y. (eds) Encyclopedia of Big Data Technologies. Springer, Cham. https://doi.org/10.1007/978-3-319-77525-8_40

Download citation