{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T12:07:54Z","timestamp":1754482074258,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319571409"},{"type":"electronic","value":"9783319571416"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-57141-6_22","type":"book-chapter","created":{"date-parts":[[2017,4,7]],"date-time":"2017-04-07T06:14:00Z","timestamp":1491545640000},"page":"209-219","source":"Crossref","is-referenced-by-count":2,"title":["Guaging the Effectivity of Existing Security Measures for Big Data in Cloud Environment"],"prefix":"10.1007","author":[{"given":"Chhaya S.","family":"Dule","sequence":"first","affiliation":[]},{"given":"H. A.","family":"Girijamma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,8]]},"reference":[{"key":"22_CR1","unstructured":"Lohr, S.: The age of Big Data, vol. 11. New York Times (2012)"},{"issue":"2","key":"22_CR2","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1089\/big.2012.0002","volume":"1","author":"M Swan","year":"2013","unstructured":"Swan, M.: The quantified self: fundamental disruption in big data science and biological discovery. Big Data 1(2), 85\u201399 (2013)","journal-title":"Big Data"},{"issue":"1","key":"22_CR3","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1089\/big.2013.1508","volume":"1","author":"F Provost","year":"2013","unstructured":"Provost, F., Fawcett, T.: Data science and its relationship to big data and data-driven decision making. Big Data 1(1), 51\u201359 (2013)","journal-title":"Big Data"},{"key":"22_CR4","unstructured":"Analytics, Big Data. Big data analytics for security (2013)"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Wang, C.: Privacy-preserving public auditing for data storage security in cloud computing. In: Infocom, 2010 Proceedings IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"22_CR6","first-page":"xxvii","volume":"11","author":"O Tene","year":"2012","unstructured":"Tene, O., Polonetsky, J.: Big data for all: Privacy and user control in the age of analytics. Nw. J. Tech. Intell. Prop 11, xxvii (2012)","journal-title":"Nw. J. Tech. Intell. Prop"},{"key":"22_CR7","volume-title":"Big Data: What It Is and Why You Should Care","author":"RL Villars","year":"2011","unstructured":"Villars, R.L., Olofson, C.W., Eastwood, M.: Big Data: What It Is and Why You Should Care. White Paper, IDC, Framingham (2011)"},{"issue":"1","key":"22_CR8","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.infsof.2008.09.009","volume":"51","author":"B Kitchenham","year":"2009","unstructured":"Kitchenham, B., et al.: Systematic literature reviews in software engineering\u2013a systematic literature review. Inf. Softw. Technol. 51(1), 7\u201315 (2009)","journal-title":"Inf. Softw. Technol."},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Rubinstein, I.: Big data: the end of privacy or a new beginning? In: International Data Privacy Law (Forthcoming), pp. 12\u201356 (2013)","DOI":"10.1093\/idpl\/ips036"},{"key":"22_CR10","unstructured":"James, B.D.: Security and privacy challenges in cloud computing environments. 8, 24\u201331 (2010)"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Katal, A., Wazid, M., Goudar, R.H.: Big data: issues, challenges, tools and good practices. In: Sixth International Conference on Contemporary Computing (IC3). IEEE (2013)","DOI":"10.1109\/IC3.2013.6612229"},{"issue":"05","key":"22_CR12","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Based Syst."},{"key":"22_CR13","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.is.2014.07.006","volume":"47","author":"I Hashem","year":"2015","unstructured":"Hashem, I., Targio, A.: The rise of \u201cbig data\u201d on cloud computing: review and open research issues. Inf. Syst. 47, 98\u2013115 (2015)","journal-title":"Inf. Syst."},{"key":"22_CR14","unstructured":"5 Hadoop Security Projects. \nhttps:\/\/www.xplenty.com\/blog\/2014\/11\/5-hadoop-security-projects\/"},{"key":"22_CR15","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1109\/ACCESS.2014.2362522","volume":"2","author":"X Lei","year":"2014","unstructured":"Lei, X., Jiang, C., Wang, J., Yuan, J., Ren, Y.: Information security in big data: privacy and data mining. IEEE Access 2, 1149\u20131176 (2014)","journal-title":"IEEE Access"},{"issue":"5","key":"22_CR16","doi-asserted-by":"crossref","first-page":"2423","DOI":"10.1109\/TSG.2016.2563461","volume":"7","author":"J Hu","year":"2016","unstructured":"Hu, J., Vasilakos, A.V.: Energy big data analytics and security: challenges and opportunities. IEEE Trans. Smart Grid 7(5), 2423\u20132436 (2016)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"2","key":"22_CR17","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/TBDATA.2016.2587659","volume":"2","author":"Z Yan","year":"2016","unstructured":"Yan, Z., Ding, W., Yu, X., Zhu, H., Deng, R.H.: Deduplication on encrypted big data in cloud. IEEE Trans. Big Data 2(2), 138\u2013150 (2016)","journal-title":"IEEE Trans. Big Data"},{"issue":"2","key":"22_CR18","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MC.2016.43","volume":"49","author":"L Xu","year":"2016","unstructured":"Xu, L., Jiang, C., Chen, Y., Wang, J., Ren, Y.: A framework for categorizing and applying privacy-preservation techniques in big data mining. Computer 49(2), 54\u201362 (2016)","journal-title":"Computer"},{"issue":"8","key":"22_CR19","doi-asserted-by":"crossref","first-page":"1578","DOI":"10.1109\/TIFS.2015.2419186","volume":"10","author":"K Liang","year":"2015","unstructured":"Liang, K., Susilo, W., Liu, J.K.: Privacy-preserving ciphertext multi-sharing control for big data storage. IEEE Trans. Inf. Forensics Secur. 10(8), 1578\u20131589 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"22_CR20","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MITP.2015.34","volume":"17","author":"C Perera","year":"2015","unstructured":"Perera, C., Ranjan, R., Wang, L., Khan, S.U., Zomaya, A.Y.: Big data privacy in the internet of things era. IT Professional 17(3), 32\u201339 (2015)","journal-title":"IT Professional"},{"issue":"3","key":"22_CR21","first-page":"10","volume":"4","author":"B Nedelcu","year":"2013","unstructured":"Nedelcu, B.: About big data and its challenges and benefits in manufacturing. Database Syst. J. 4(3), 10\u201319 (2013)","journal-title":"Database Syst. J."},{"issue":"6","key":"22_CR22","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1109\/MC.2014.161","volume":"47","author":"BM Gaff","year":"2014","unstructured":"Gaff, B.M., Sussman, H.E., Geetter, J.: Privacy and big data. Computer 47(6), 7\u20139 (2014)","journal-title":"Computer"},{"issue":"6","key":"22_CR23","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MSP.2013.138","volume":"11","author":"AA C\u00e1rdenas","year":"2013","unstructured":"C\u00e1rdenas, A.A., Manadhata, P.K., Rajan, S.P.: Big data analytics for security. IEEE Secur. Priv. 11(6), 74\u201376 (2013)","journal-title":"IEEE Secur. Priv."},{"issue":"99","key":"22_CR24","first-page":"1","volume":"PP","author":"S Yu","year":"2016","unstructured":"Yu, S., Liu, M., Dou, W., Liu, X., Zhou, S.: Networking for big data: a survey. IEEE Commun. Surv. Tutorials PP(99), 1 (2016)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"2","key":"22_CR25","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1109\/TCC.2014.2359460","volume":"3","author":"J Baek","year":"2015","unstructured":"Baek, J., Vu, Q.H., Liu, J.K., Huang, X., Xiang, Y.: A secure cloud computing based framework for big data information management of smart grid. IEEE Trans. Cloud Comput. 3(2), 233\u2013244 (2015)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"1","key":"22_CR26","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/TST.2015.7040516","volume":"20","author":"X Dong","year":"2015","unstructured":"Dong, X., Li, R., He, H., Zhou, W., Xue, Z., Wu, H.: Secure sensitive data sharing on a big data platform. Tsinghua Sci. Technol. 20(1), 72\u201380 (2015)","journal-title":"Tsinghua Sci. Technol."}],"container-title":["Advances in Intelligent Systems and Computing","Software Engineering Trends and Techniques in Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-57141-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,12]],"date-time":"2017-07-12T11:31:51Z","timestamp":1499859111000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-57141-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319571409","9783319571416"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-57141-6_22","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}