Security and Privacy Issue of Big Data over the Cloud Computing: A Comprehensive Analysis
Mudassir Khan1, Mohd Dilshad Ansari2

1Mudassir Khan, Department of Computer Science, College of Science & Arts, King Khalid University, Saudi Arabia.
2Mohd Dilshad Ansari, Department of Computer Science & Engineering, CMR College of Engineering & Technology, Hyderabad (Telangana), India.
Manuscript received on 23 March 2019 | Revised Manuscript received on 04 April 2019 | Manuscript Published on 18 April 2019 | PP: 413-417 | Volume-7 Issue-6S March 2019 | Retrieval Number: F02810376S19/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: To date, health concern organizations has not entirely hold the possible profit to be obtained from big data analytics technologies. Although the continually rising body of educational investigation on big data analytics is generally technology leaning, an enhanced consideration of the planned implications of big data is immediately required. Cloud computing and big data are two emerging paradigms in the modern evolution of information technology. The cloud computing as a supporter provides innovative facility and important financial interest in the variety of compact operational expenses. This standard elevates large domain of security and privacy concerns that must be approached into reflection. Many key challenges present in cloud computing environments alike multi-possession, loss of supremacy, and trust. The Big data is a promising example useful to datasets whose dimension is away from the capability of regularly used application software tools to confine, handle, and process the information inside a supportable elapsed time. This paper reviews the most significant characteristics in how computing infrastructures should be designed and wisely handled to attain the most remarkably security aspects necessary by Big Data applications. We classify the accessible experimentation according to the cloud orientation architecture orchestration, source manage, corporal source, and cloud service activities in different additional managed layers, in accumulation to analyzing the latest evolution for increasing the Apache Hadoop security is enhance establish big data infrastructures or environment. We additionally sketch out the demarcation study on privacy-preserving information-intensive software approaches in cloud computing alike privacy-risk modeling and privacy increasing results.
Keywords: Big Data Privacy; Big Data Protection; Big Data Security; Cloud Computing; Privacy Security.
Scope of the Article: Cloud Computing