Encyclopedia of Big Data Technologies 2018
DOI: 10.1007/978-3-319-63962-8_40-1
|View full text |Cite
|
Sign up to set email alerts
|

Big Data in the Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
7
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…Specifically, a query is searched against the index and the result‐set, referencing the relevant documents with respect to the query, is retrieved for the user. However, using enterprise search services implies outsourcing contents to the cloud that in certain domains, such as law‐enforcement and healthcare reports, have raised serious data privacy concerns, 4,5 particularly, after numerous recent data privacy violations 6 in the cloud environments. In one incident, 7 more than 14 million Verizon customer accounts information were exposed from their cloud repository in 2018.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Specifically, a query is searched against the index and the result‐set, referencing the relevant documents with respect to the query, is retrieved for the user. However, using enterprise search services implies outsourcing contents to the cloud that in certain domains, such as law‐enforcement and healthcare reports, have raised serious data privacy concerns, 4,5 particularly, after numerous recent data privacy violations 6 in the cloud environments. In one incident, 7 more than 14 million Verizon customer accounts information were exposed from their cloud repository in 2018.…”
Section: Introductionmentioning
confidence: 99%
“…Client‐side encryption, 4,9 in which documents are encrypted with the user's key before outsourcing to the cloud, is a promising method to achieve the desired data privacy. In this method, only the client has the ability to decrypt the documents, hence, it can potentially provide confidentiality against both internal and external attackers 6,10 . However, the limitation of this method is the lack of processing (e.g., search and clustering) ability on the encrypted documents.…”
Section: Introductionmentioning
confidence: 99%
“…To satisfy all of the aforementioned desires of a particular user, our main idea in this research is to separate the intelligence aspect of the enterprise search from its pattern matching aspect. According to this idea, we propose to leverage onpremises edge computing [11], [12] to handle the search intelligence and user-side encryption. For that purpose, the edge-based mechanism, called Smartness At Edge (SAED), is developed to extract both contextualized and personalized semantics from the search query and the user's search history as well.…”
Section: Introductionmentioning
confidence: 99%
“…As such, organizations use cloud services to relieve from the burden of storing large volume of data locally. However, the outsourced contents (documents) often contain private or sensitive information (e.g., criminal or financial reports [38]) that need to be protected against internal and external cloud attackers. In fact, data security and privacy concerns have made many organizations reluctant to use cloud.…”
Section: Introductionmentioning
confidence: 99%