2020
DOI: 10.25100/iyc.v23i1.9484
|View full text |Cite
|
Sign up to set email alerts
|

Risks and security solutions existing in the Internet of things (IoT) in relation to Big Data

Abstract: The technological advance of the new era has led to the interconnection of devices, applications, people and data, giving way to the generation of the Internet of Things (IoT). The multiple data collected is so voluminous and variable that it must be stored in Big Data architectures. This evolution has provided the opportunity to have better access, quality and analysis of information, but at the same time, there is a challenge to prevent and mitigate the security risks associated with the relationship between… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 24 publications
0
0
0
Order By: Relevance
“…The sensitivity and privacy issues arise as any form of attack could compromise confidentiality, integrity and the availability of the big data leading to ID theft, Intellectual property theft, breach of trust and litigation issues. Vulnerabilities that come with such 5 V's data stored can be vulnerable to breaches and cyberattacks, which can lead to the loss or theft of sensitive information [8]. Deploying big data in cloud computing environments is a rapidly growing technology that has a significant impact on organizations and provides benefits such as demand-driven access to computational services, a distorted version of infinite computing capacity, and assistance with demand-driven scaling up, scaling down, and scaling out.…”
Section: Introductionmentioning
confidence: 99%
“…The sensitivity and privacy issues arise as any form of attack could compromise confidentiality, integrity and the availability of the big data leading to ID theft, Intellectual property theft, breach of trust and litigation issues. Vulnerabilities that come with such 5 V's data stored can be vulnerable to breaches and cyberattacks, which can lead to the loss or theft of sensitive information [8]. Deploying big data in cloud computing environments is a rapidly growing technology that has a significant impact on organizations and provides benefits such as demand-driven access to computational services, a distorted version of infinite computing capacity, and assistance with demand-driven scaling up, scaling down, and scaling out.…”
Section: Introductionmentioning
confidence: 99%