Proposing a model on Security challenges in cloud computing especially Social Media and Social Sites

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2017 by IJCTT Journal
Volume-47 Number-1
Year of Publication : 2017
Authors : Fayaz Ahmad Lone, Dr. Amit Kumar Chaturvedi
DOI :  10.14445/22312803/IJCTT-V47P108

MLA

Fayaz Ahmad Lone, Dr. Amit Kumar Chaturvedi "Proposing a model on Security challenges in cloud computing especially Social Media and Social Sites". International Journal of Computer Trends and Technology (IJCTT) V47(1):68-73, May 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
For big data application security challenges, Social media is the next battleground. Big social data can serve as an early warning system of trouble brewing and a leading indicator of imminent action by a potential troublemaker. Mostly Social media listens for early detection of adverse events and product quality surveillance. It may also be used for product recommendation. In this paper, we will focus to uncover ideas and open problems with big data security in cloud computing especially Social Media and Social Sites. We have also proposed a model Information Measuring for Social Media [IMSM] Model for improving the contents and quality of information on social sites.

References
[1]. M. K. Kakhani, S. Kakhani, and S. R. Biradar, ?Research Issues in Big Data Analytics?, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 2, Issue 8, August 2013 ISSN 2319 – 4847.
[2]. Jimmy Lin, Chris Dyer, Data-Intensive Text Processing with MapReduce, Manuscript prepared April 11, 2010.
[3]. C.L. Hepsiba, J.G.R. Sathiaseelan , ?Security Issues in Service Models of Cloud Computing, International Journal of Computer Sc. and Mobile Computing, Vol. 5 Issue. 3, Mar 2016, pp. 610-615, ISSN 2320-088X.
[4]. Gayathri. K.S, T. Thomas, J. Jayasudha,, ?security issues of Media Sharing in Social Cloud, International Conference on Modelling, Optimisation and Computing (ICMOC-2012), Elsevier, Procedia Engineering 38 (2012), pp. 3806-3815.
[5]. A.Singh, K. Chatterjee, ?Cloud security issues and challenges: A survey?, Journal of Network and Computer Applications 79 (2017), Elsevier, pp 88-115
[6]. Sanjay P. Ahuja, Bryan Moore, ?A Survey of Cloud Computing and Social Networks, Network and Communication Technologies; Vol. 2, No. 2; 2013, ISSN 1927-064X E-ISSN 1927-0658, pp 11-16.
[7]. Christos Stergioua, Kostas E. Psannis, Byung-Gyu Kimb, Brij Gupta, ?Secure integration of IoT and Cloud Computing, Elsevier, Future Generation Computer Systems, pp. 1-12, Dec 2016.
[8]. G. Manogarana, , C. Thota, M. Vijay Kumar, ?MetaCloudDataStorage Architecture for Big Data Security in Cloud Computing, 4th International Conference on Recent Trends in Computer Science & Engineering, Procedia Computer Science 87 ( 2016 ), pp. 128 – 133.
[9]. Md. Tanzim Khorshed, A.B.M. Shawkat Ali, Saleh A. Wasimi, ?A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing, Future Generation Computer Systems 28 (2012) pp. 833–851.
[10]. Tom White, Hadoop: The Definitive Guide, O’Reilly Media, Inc, 2009
[11]. S. .J. Samuel, Koundinya RVP, K. Sashidhar, and C.R. Bharathi, ?A SURVEY ON BIG DATA AND ITS RESEARCH CHALLENGES, ARPN Journal of Engineering and Applied Sciences, VOL. 10, NO. 8, MAY 2015
[12]. M.M. Potel, C A Dhote, D.H. Sharma, ?Homomorphic Encryption for Security of Cloud Data, Procedia Computer Science 79 (2016), pp. 175-181.
[13]. Zhong Wang, Qian Yu, ?Privacy trust crisis of personal data in China in the era of Big Data: The survey and countermeasures, Computer Law & Security Review 31(2015), pp.782-792
[14]. N. Kshetri, ?Big data’s impact on privacy, security and customer welfare, Telecommunicaitons Policy 38 (2014), pp.1134-1145.
[15]. S.Akter, S.F.Wamba, A.Gunasekaran, R. Dubey, S. J.Childe, ?How to improve firm performance using big data analytics capability and business strategy alignment?, International Journal of Production Economics, 182 (2016), pp.113-131.
[16]. A. Siddiqa, I.A.T. Hashem, I.Yaqoob, M.Marjani, S. Shamshirband, A. Gani, F.Nasaruddin, ?A Survey of big data management: Taxonomy and state-of-the-art, 71 (2016), pp. 151-166.
[17]. R. Shaikh, M. Sasikumar, ?Trust Model for Measuring Security Strength of Cloud Computing Service, Procedia Computer Science 45 (2015), pp 380-389
[18]. Vennila.S, and Priyandarshini J. , ?Scalable Privacy Preservation in Big Data A Survey, Procedia Computer Science 50 (2015), pp. 369-373
[19]. B. H. Krishnaa, Dr. S. Kiranb, G. Muralia, R.P.K. Reddy, ?Security Issues In Service Model Of Cloud Computing Environment, Procedia Computer Science 87 (2016),pp 246-251
[20]. N. Khana, A. Al-Yasirib, ?Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework, Procedia Computer Science 94 (2016), pp 485-490
[21]. S.A. Hussain, M.Fatima, A. Saeed, I. Raza, R. K. Shahzad, ?Multilevel classification of security concerns in cloud computing, Applied Computing and Informatics, 2210- 8327, 2016, King Saud University Published by Elsevier B.V.
[22]. C. Saadia, H. Chaouib, ?Cloud Computing Security Using IDS-AM-Clust, Honeyd, Honeywall and Honeycomb, Procedia Computer Science 85 (2016), pp 433-442.

Keywords
Social sites, cloud, big data, security, information quality.