Security Implications of Adopting a New Data Storage and Access Model in Big Data and Cloud Computing
Keywords:
Cloud Computing, Big Data, NoSQLAbstract
This article examines the security implications of using cloud computing and Big Data. It employs a mixed methodology of qualitative and quantitative research and takes a critical realist epistemological approach. The objective is to identify the components of a theory for predicting and explaining [1, 4] the security implications associated with adopting the services provided by cloud computing and Big Data. The integration of various information sources and the widespread use of computing across diverse fields have resulted in a significant increase in data volume, scale, quantity, and diversity. Consequently, data management, storage, retrieval, and access have undergone significant changes. The latest developments in IT have brought forth novel technologies such as Cloud Computing and Big Data. Big Data comprises of technologies that rely on NoSQL (Not only SQL) databases, which enable the growth of data volumes, numbers, and types on a large scale. The new NoSQL systems are seen as solutions for meeting scalability requirements of large IT firms. Multiple open-source and pay-as-you-go NoSQL models are available for purchase.
References
Adler P. S., Ferdows K. (1990), “The chief technology officer”, California Management Review, vol. 32, n°3, p. 55-62.
Armbrust M., Stoica I., Zaharia M., Fox A., Griffith R., Joseph A. D., Katz R., Konwinski A., Lee G., Patterson D., Rabkin A. (2010), “A view of cloud computing”, Communications of the ACM, vol. 53, p. 50-58. doi: 10.1145/1721654.1721672.
Becker J., Bailey, E. (2014), “A Comparison of IT Governance & Control Frameworks in Cloud Computing”, In: Proceedings of Americas Conference on Information Systems, Savannah, GA.
ernard J.-G., Rivard S., Aubert B. A. (2004), “L’exposition au risque d’implantation d’ERP?: éléments de mesure et d’atténuation”, Systèmes d’Information et Management, vol. 9, p. 25-50. doi : 10.9876/sim.v9i2.155. [5] D. Monthary and M. Platzer , building technology: All trades. Editions le Moniteur, ISBN 978-2-281-1144 6-1, (2006) 105 P.
Bouaynaya, W., Bidan, M. (2017), « Une exploration qualitative du rôle des opérateurs du Cloud Computing dans l’acheminement des données des PME », Management & Avenir, vol. 93, p. 65-83.
Burgelman, R. A. (1996), « A process model of strategic business exit: Implications for an evolutionary perspective on strategy », Strategic management journal, vol. 17, n°1, 193-214.
Buyya R., Ranjan R., Calheiros R. (2010), « Intercloud: Utility-oriented federation of cloud computing environments for scaling of application services », Algorithms and architectures for parallel processing, p. 13-31.
Objelean, A (2015). Introduction to Couchbase-NoSQL Document Database. http://alexo.github.io/articles/Introduction_to_couchbase_no_sql_document_database/. (Consulté en Mai 2023). [10] iang, Y (2012). HBase Administration Cookbook. Packt Publishing Open source community experience distilled. Isbn : 1849517142 9781849517140.
Journal du Net (2013). Comparatif des bases de données NoSQL. https://www.journaldunet.com/developpeur/outils/comparatif-des-bases-nosql/. (Consulté en juin 2023)
Hashem, H (2016). Modélisation intégratrice du traitement BigData. Thèse de Doctorat (Université Paris Saclay).
Hadrien, F (2015). SQL, NoSQL, NewSQL stratégie de choix, Bachelor HES (Haute École de Gestion de Genève).
Hecht, R, Jablonski, S (2011). NoSQL evaluation: A use case-oriented survey. In Proceedings of the International Conference on Cloud and Service Computing, IEEE. November 22-24 2012, Huashan Road, Shanghai, China pp. 336-341.
hitehorn, M (2015). Quand faut-il envisager d’utiliser une base de données NoSQL (plutôt qu’une base relationnelle) ? Le Grand Guide des Bases de Données (part. 2) : au-delà du relationnel (University de Dundee). [16] Fimbel, E. (2003), « Les facteurs décisionnels de l'externalisation des systèmes d'information: référentiels théoriques, éléments empiriques et proposition typologique », Systèmes d'information et management, vol. 8, n°4, Pp 31.
Fréry F., & Law-kheng F. (2007), « La réinternalisation, chaînon manquant des théories de la firme », Revue française de gestion, vol. 8, p. 163-179.
Oracle Real Application Clusters (RAC), (2013). An Oracle White Paper.
Kouedi, E (2012). Approche de migration d’une base de données relationnelle vers une base de données NoSQL orientée colonne, Mémoire de Master (Université de YaoundeI).
Lasalle, MF (2006). Cours du Relationnel à l’objet : Limites du Relationnel, http://circe.univ-fcomte.fr/Marie-France-Lasalle/bda/COURSHTM/cours/chap01/lec02/ page01.htm.
Maletras, X (2012). Le NoSQL - Cassandra, Thèse Professionnelle (Université Paris 13).
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 International Journal of Sciences: Basic and Applied Research (IJSBAR)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Authors who submit papers with this journal agree to the following terms.