A systematic literature mapping of risk analysis of big data in cloud computing environment

This paper investigates previous literature that focusses on the three elements: risk assessment, big data and cloud. We use a systematic literature mapping method to search for journals and proceedings. The systematic literature mapping process is utilized to get a properly screened and focused...

Full description

Saved in:
Bibliographic Details
Main Authors: Yusof Ali, Hazirah Bee, Abdullah, Lili Marziana, Kartiwi, Mira, Nordin, Azlin, Salleh, Norsaremah, Awang Abu Bakar, Normi Sham
Format: Conference or Workshop Item
Language:English
English
English
Published: IOP Publishing 2018
Subjects:
Online Access:http://irep.iium.edu.my/64137/1/64137%20A%20Systematic%20Literature%20Mapping.pdf
http://irep.iium.edu.my/64137/2/64137%20A%20Systematic%20Literature%20Mapping%20SCOPUS.pdf
http://irep.iium.edu.my/64137/13/64137_A%20systematic%20literature%20mapping%20of%20risk%20analysis%20_wos.pdf
http://irep.iium.edu.my/64137/
http://iopscience.iop.org/article/10.1088/1742-6596/1018/1/012017/pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
English
English
id my.iium.irep.64137
record_format dspace
spelling my.iium.irep.641372019-08-08T08:31:56Z http://irep.iium.edu.my/64137/ A systematic literature mapping of risk analysis of big data in cloud computing environment Yusof Ali, Hazirah Bee Abdullah, Lili Marziana Kartiwi, Mira Nordin, Azlin Salleh, Norsaremah Awang Abu Bakar, Normi Sham T Technology (General) This paper investigates previous literature that focusses on the three elements: risk assessment, big data and cloud. We use a systematic literature mapping method to search for journals and proceedings. The systematic literature mapping process is utilized to get a properly screened and focused literature. With the help of inclusion and exclusion criteria, the search of literature is further narrowed. Classification helps us in grouping the literature into categories. At the end of the mapping, gaps can be seen. The gap is where our focus should be in analysing risk of big data in cloud computing environment. Thus, a framework of how to assess the risk of security, privacy and trust associated with big data and cloud computing environment is highly needed IOP Publishing 2018-06-01 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/64137/1/64137%20A%20Systematic%20Literature%20Mapping.pdf application/pdf en http://irep.iium.edu.my/64137/2/64137%20A%20Systematic%20Literature%20Mapping%20SCOPUS.pdf application/pdf en http://irep.iium.edu.my/64137/13/64137_A%20systematic%20literature%20mapping%20of%20risk%20analysis%20_wos.pdf Yusof Ali, Hazirah Bee and Abdullah, Lili Marziana and Kartiwi, Mira and Nordin, Azlin and Salleh, Norsaremah and Awang Abu Bakar, Normi Sham (2018) A systematic literature mapping of risk analysis of big data in cloud computing environment. In: 1st International Conference on Big Data and Cloud Computing (ICoBiC) 2017, 25th–27th November 2017, Kuching, Sarawak, Malaysia. http://iopscience.iop.org/article/10.1088/1742-6596/1018/1/012017/pdf 10.1088/1742-6596/1018/1/012017
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
English
English
topic T Technology (General)
spellingShingle T Technology (General)
Yusof Ali, Hazirah Bee
Abdullah, Lili Marziana
Kartiwi, Mira
Nordin, Azlin
Salleh, Norsaremah
Awang Abu Bakar, Normi Sham
A systematic literature mapping of risk analysis of big data in cloud computing environment
description This paper investigates previous literature that focusses on the three elements: risk assessment, big data and cloud. We use a systematic literature mapping method to search for journals and proceedings. The systematic literature mapping process is utilized to get a properly screened and focused literature. With the help of inclusion and exclusion criteria, the search of literature is further narrowed. Classification helps us in grouping the literature into categories. At the end of the mapping, gaps can be seen. The gap is where our focus should be in analysing risk of big data in cloud computing environment. Thus, a framework of how to assess the risk of security, privacy and trust associated with big data and cloud computing environment is highly needed
format Conference or Workshop Item
author Yusof Ali, Hazirah Bee
Abdullah, Lili Marziana
Kartiwi, Mira
Nordin, Azlin
Salleh, Norsaremah
Awang Abu Bakar, Normi Sham
author_facet Yusof Ali, Hazirah Bee
Abdullah, Lili Marziana
Kartiwi, Mira
Nordin, Azlin
Salleh, Norsaremah
Awang Abu Bakar, Normi Sham
author_sort Yusof Ali, Hazirah Bee
title A systematic literature mapping of risk analysis of big data in cloud computing environment
title_short A systematic literature mapping of risk analysis of big data in cloud computing environment
title_full A systematic literature mapping of risk analysis of big data in cloud computing environment
title_fullStr A systematic literature mapping of risk analysis of big data in cloud computing environment
title_full_unstemmed A systematic literature mapping of risk analysis of big data in cloud computing environment
title_sort systematic literature mapping of risk analysis of big data in cloud computing environment
publisher IOP Publishing
publishDate 2018
url http://irep.iium.edu.my/64137/1/64137%20A%20Systematic%20Literature%20Mapping.pdf
http://irep.iium.edu.my/64137/2/64137%20A%20Systematic%20Literature%20Mapping%20SCOPUS.pdf
http://irep.iium.edu.my/64137/13/64137_A%20systematic%20literature%20mapping%20of%20risk%20analysis%20_wos.pdf
http://irep.iium.edu.my/64137/
http://iopscience.iop.org/article/10.1088/1742-6596/1018/1/012017/pdf
_version_ 1643619722783096832