{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:17:21Z","timestamp":1730200641539,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/bigdata.2015.7363960","type":"proceedings-article","created":{"date-parts":[[2015,12,28]],"date-time":"2015-12-28T21:36:21Z","timestamp":1451338581000},"page":"1865-1870","source":"Crossref","is-referenced-by-count":8,"title":["Current security threats and prevention measures relating to cloud services, Hadoop concurrent processing, and big data"],"prefix":"10.1109","author":[{"given":"Ather","family":"Sharif","sequence":"first","affiliation":[]},{"given":"Sarah","family":"Cooney","sequence":"additional","affiliation":[]},{"given":"Shengqi","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Drew","family":"Vitek","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Big data analytics and data security in the cloud via fully homomorphic encryption","volume":"9","author":"waziri","year":"2015","journal-title":"International Journal of Computer Control Quantum and Information Engineering"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataService.2015.71"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.225"},{"key":"ref13","article-title":"Hadoop security design","author":"o'malley","year":"0","journal-title":"Yahoo Inc Tech Rep 2009"},{"article-title":"Security architecture","year":"2014","author":"communications","key":"ref14"},{"article-title":"Idc releases first worldwide hadoop-mapreduce ecosystem software forecast, strong growth will continue to accelerate as talent and tools develop [press release]","year":"2012","author":"corporation","key":"ref4"},{"article-title":"A history of cloud computing","year":"2009","author":"mohamed","key":"ref3"},{"article-title":"Security failing to keep pace with cloud technology adoption, report finds","year":"2015","author":"bourne","key":"ref6"},{"article-title":"The cloud hits the mainstream: More than half of u.s. businesses now use cloud computing","year":"2013","author":"cohen","key":"ref5"},{"year":"2015","key":"ref8","article-title":"What makes a cloud secure"},{"key":"ref7","article-title":"The notorious nine: Cloud computing top threats in 2013","author":"alliance","year":"0","journal-title":"Cloud Security Alliance Tech Rep 2013"},{"key":"ref2","article-title":"Big data: The next frontier for innovation, competition, and productivity","author":"manyika","year":"2011","journal-title":"McKinsey Global Institute"},{"article-title":"Big-data computing: creating revolutionary breakthroughs in commerce, science and society","year":"2008","author":"bryant","key":"ref1"},{"article-title":"Securing big data","year":"2015","author":"sowmyanarayanan","key":"ref9"}],"event":{"name":"2015 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2015,10,29]]},"location":"Santa Clara, CA, USA","end":{"date-parts":[[2015,11,1]]}},"container-title":["2015 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7347101\/7363706\/07363960.pdf?arnumber=7363960","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T00:36:24Z","timestamp":1490402184000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7363960\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2015.7363960","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}