Security Implications of Adopting a New Data Storage and Access Model in Big Data and Cloud Computing

Authors

  • Mathias Philippe Totto Ndong Energy, Materials, Modeling and Methods research laboratory (E3M), National Higher Polytechnic School of Douala, P.O.Box 2701 Douala-Cameroon
  • Agnes Enangue Energy, Materials, Modeling and Methods research laboratory (E3M), National Higher Polytechnic School of Douala, P.O.Box 2701 Douala-Cameroon
  • Essomba Mbondjo Richard Energy, Materials, Modeling and Methods research laboratory (E3M), National Higher Polytechnic School of Douala, P.O.Box 2701 Douala-Cameroon
  • Samuel Batambock Energy, Materials, Modeling and Methods research laboratory (E3M), National Higher Polytechnic School of Douala, P.O.Box 2701 Douala-Cameroon
  • Jean Nyatte Nyatte Energy, Materials, Modeling and Methods research laboratory (E3M), National Higher Polytechnic School of Douala, P.O.Box 2701 Douala-Cameroon
  • Kikmo W C Energy, Materials, Modeling and Methods research laboratory (E3M), National Higher Polytechnic School of Douala, P.O.Box 2701 Douala-Cameroon

Keywords:

Cloud Computing, Big Data, NoSQL

Abstract

This article examines the security implications of using cloud computing and Big Data. It employs a mixed methodology of qualitative and quantitative research and takes a critical realist epistemological approach. The objective is to identify the components of a theory for predicting and explaining [1, 4] the security implications associated with adopting the services provided by cloud computing and Big Data. The integration of various information sources and the widespread use of computing across diverse fields have resulted in a significant increase in data volume, scale, quantity, and diversity. Consequently, data management, storage, retrieval, and access have undergone significant changes. The latest developments in IT have brought forth novel technologies such as Cloud Computing and Big Data. Big Data comprises of technologies that rely on NoSQL (Not only SQL) databases, which enable the growth of data volumes, numbers, and types on a large scale. The new NoSQL systems are seen as solutions for meeting scalability requirements of large IT firms. Multiple open-source and pay-as-you-go NoSQL models are available for purchase.

References

Adler P. S., Ferdows K. (1990), “The chief technology officer”, California Management Review, vol. 32, n°3, p. 55-62.

Armbrust M., Stoica I., Zaharia M., Fox A., Griffith R., Joseph A. D., Katz R., Konwinski A., Lee G., Patterson D., Rabkin A. (2010), “A view of cloud computing”, Communications of the ACM, vol. 53, p. 50-58. doi: 10.1145/1721654.1721672.

Becker J., Bailey, E. (2014), “A Comparison of IT Governance & Control Frameworks in Cloud Computing”, In: Proceedings of Americas Conference on Information Systems, Savannah, GA.

ernard J.-G., Rivard S., Aubert B. A. (2004), “L’exposition au risque d’implantation d’ERP?: éléments de mesure et d’atténuation”, Systèmes d’Information et Management, vol. 9, p. 25-50. doi : 10.9876/sim.v9i2.155. [5] D. Monthary and M. Platzer , building technology: All trades. Editions le Moniteur, ISBN 978-2-281-1144 6-1, (2006) 105 P.

Bouaynaya, W., Bidan, M. (2017), « Une exploration qualitative du rôle des opérateurs du Cloud Computing dans l’acheminement des données des PME », Management & Avenir, vol. 93, p. 65-83.

Burgelman, R. A. (1996), « A process model of strategic business exit: Implications for an evolutionary perspective on strategy », Strategic management journal, vol. 17, n°1, 193-214.

Buyya R., Ranjan R., Calheiros R. (2010), « Intercloud: Utility-oriented federation of cloud computing environments for scaling of application services », Algorithms and architectures for parallel processing, p. 13-31.

Objelean, A (2015). Introduction to Couchbase-NoSQL Document Database. http://alexo.github.io/articles/Introduction_to_couchbase_no_sql_document_database/. (Consulté en Mai 2023). [10] iang, Y (2012). HBase Administration Cookbook. Packt Publishing Open source community experience distilled. Isbn : 1849517142 9781849517140.

Journal du Net (2013). Comparatif des bases de données NoSQL. https://www.journaldunet.com/developpeur/outils/comparatif-des-bases-nosql/. (Consulté en juin 2023)

Hashem, H (2016). Modélisation intégratrice du traitement BigData. Thèse de Doctorat (Université Paris Saclay).

Hadrien, F (2015). SQL, NoSQL, NewSQL stratégie de choix, Bachelor HES (Haute École de Gestion de Genève).

Hecht, R, Jablonski, S (2011). NoSQL evaluation: A use case-oriented survey. In Proceedings of the International Conference on Cloud and Service Computing, IEEE. November 22-24 2012, Huashan Road, Shanghai, China pp. 336-341.

hitehorn, M (2015). Quand faut-il envisager d’utiliser une base de données NoSQL (plutôt qu’une base relationnelle) ? Le Grand Guide des Bases de Données (part. 2) : au-delà du relationnel (University de Dundee). [16] Fimbel, E. (2003), « Les facteurs décisionnels de l'externalisation des systèmes d'information: référentiels théoriques, éléments empiriques et proposition typologique », Systèmes d'information et management, vol. 8, n°4, Pp 31.

Fréry F., & Law-kheng F. (2007), « La réinternalisation, chaînon manquant des théories de la firme », Revue française de gestion, vol. 8, p. 163-179.

Oracle Real Application Clusters (RAC), (2013). An Oracle White Paper.

Kouedi, E (2012). Approche de migration d’une base de données relationnelle vers une base de données NoSQL orientée colonne, Mémoire de Master (Université de YaoundeI).

Lasalle, MF (2006). Cours du Relationnel à l’objet : Limites du Relationnel, http://circe.univ-fcomte.fr/Marie-France-Lasalle/bda/COURSHTM/cours/chap01/lec02/ page01.htm.

Maletras, X (2012). Le NoSQL - Cassandra, Thèse Professionnelle (Université Paris 13).

Downloads

Published

2023-10-15

How to Cite

Mathias Philippe Totto Ndong, Agnes Enangue, Essomba Mbondjo Richard, Samuel Batambock, Jean Nyatte Nyatte, & Kikmo W C. (2023). Security Implications of Adopting a New Data Storage and Access Model in Big Data and Cloud Computing. International Journal of Sciences: Basic and Applied Research (IJSBAR), 70(1), 345–361. Retrieved from https://gssrr.org/index.php/JournalOfBasicAndApplied/article/view/16179

Issue

Section

Articles