The Role of IoT and Blockchain 2022
DOI: 10.1201/9781003048367-36
|View full text |Cite
|
Sign up to set email alerts
|

Cloud-Based Data Analytics: Applications, Security Issues, and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Cloud-based architectures are convenient for managing the vast amount of data that can be generated by wireless sensors without overwhelming local computer systems [23,24]. Still, the use of external public services raises a two-level issue regarding the privacy of the patient: (i) The monitoring platform must comply with the regulatory framework on sensitive data, e.g., the European GDPR [25], and (ii) technical solutions must be adopted to ensure secure access to the data without involving the cloud service, which, in general, could be an honest-but-curious or even malevolent actor.…”
Section: Introductionmentioning
confidence: 99%
“…Cloud-based architectures are convenient for managing the vast amount of data that can be generated by wireless sensors without overwhelming local computer systems [23,24]. Still, the use of external public services raises a two-level issue regarding the privacy of the patient: (i) The monitoring platform must comply with the regulatory framework on sensitive data, e.g., the European GDPR [25], and (ii) technical solutions must be adopted to ensure secure access to the data without involving the cloud service, which, in general, could be an honest-but-curious or even malevolent actor.…”
Section: Introductionmentioning
confidence: 99%
“…The term "edge analytics" refers to the collecting and analysis of data that takes place at or near a device's edge. Cloud-based analytics [3] are then performed on this data. In contrast to edge analytics, edge intelligence uses Artificial Intelligence to conduct operations directly at the edge of the network.…”
Section: Introductionmentioning
confidence: 99%