Open Access Open Access  Restricted Access Subscription or Fee Access

A Novel Idea for Infrastructure Security and Privacy Protection for Cloud Environment

H. Sundmaeker, A. Mehmood


There is a major change in people’s lifestyle, daily behavior and modes of thinking in the big data. Big data plays a major role in research industry and academia. It delivers convenience to people but also brings certain risks. The storage and usage of data can easily lead to the leakage of personal information and it is hard to find out. In the current stage of research, it is a major problem to ensure big data security and privacy protection. This article deals with big data and its infrastructure and analyzes the security problems in big data, and proposes protection strategies for big data security and privacy.


Big Data Security, Information Privacy, Cloud Environment.

Full Text:



B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu, “Privacy-preserving data publishing: A survey of recent developments,” ACM Computing Surveys, vol. 42, no. 4, Jun. 2010, pp. 14.

Fan Yan. Big data security and privacy protection [J]. Electronic Technology and Software Engineering, 2016(1): 227.

Fang W. Heterogeneity of Inferring Reputation of Cooperative Behaviors for the Prisoners’ Dilemma Game [J]. Physic A: Statistical Mechanics and its Applications, 2015, 433: 367–378.

Hashem, Ibrahim Abaker Targio, et al. "The rise of “big data” on cloud computing: Review and open research issues." Information systems 47 (2015): 98-115.

Hugo Honshu. Exploration of Security and Privacy Protection Technology in the Big Data era [J]. Cyber Security Technology and Applications, 2016, 11(05):79-88.

J. M. Bohlen, G. O. Kareem, Z. Liu, and C. A. Reuter, “Outsourced proofs of irretrievability,” in Proc. of ACM Conf. on Computer and Communications Security, Nov. 2014, pp. 831–843.

Lou Ying. Research on big data security and privacy protection [J]. Information Communication, 2016(1):162-163.

Mehmood, Abid, et al. "Protection of big data privacy." IEEE access 4 (2016): 1821-1834.

R. Burns, J. Herring, O. Khan, Z. Peterson, and D. Song, “Remote data checking using provable data possession,” Information and System Security, vol. 14, no. 1, p. Article 12, May 2011.

R. C. W. Wong and A. W. C. Fu, “Privacy-preserving data publishing: An overview,” Synthesis Lectures Data Management, vol. 2, no. 1, pp. 1–138, 2010.

Wei Caiman, Wang Jean, Ran Chui. A Survey of big data security protection technology. Journal of network and information security, 2016, 2(4).

Xu, Xun. "From cloud computing to cloud manufacturing." Robotics and computer-integrated manufacturing 28.1 (2012): 75-86.

Zhang Min, Li Yu, big data security and privacy protection [J]. Chinese Journal of Computers, 2014, 37(1): 246-258.

Zhang, Dongpo. "Big data security and privacy protection." 8th International Conference on Management and Computer Science (ICMCS 2018). Atlantis Press, 2018.

Zhang, Qi, Lu Cheng, and Raouf Boutaba. "Cloud computing: state-of-the-art and research challenges." Journal of internet services and applications 1.1 (2010): 7-18.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.