A systematic literature mapping of risk analysis of big data in cloud computing environment
This paper investigates previous literature that focusses on the three elements: risk assessment, big data and cloud. We use a systematic literature mapping method to search for journals and proceedings. The systematic literature mapping process is utilized to get a properly screened and focused...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English English English |
Published: |
IOP Publishing
2018
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/64137/1/64137%20A%20Systematic%20Literature%20Mapping.pdf http://irep.iium.edu.my/64137/2/64137%20A%20Systematic%20Literature%20Mapping%20SCOPUS.pdf http://irep.iium.edu.my/64137/13/64137_A%20systematic%20literature%20mapping%20of%20risk%20analysis%20_wos.pdf http://irep.iium.edu.my/64137/ http://iopscience.iop.org/article/10.1088/1742-6596/1018/1/012017/pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Islam Antarabangsa Malaysia |
Language: | English English English |
id |
my.iium.irep.64137 |
---|---|
record_format |
dspace |
spelling |
my.iium.irep.641372019-08-08T08:31:56Z http://irep.iium.edu.my/64137/ A systematic literature mapping of risk analysis of big data in cloud computing environment Yusof Ali, Hazirah Bee Abdullah, Lili Marziana Kartiwi, Mira Nordin, Azlin Salleh, Norsaremah Awang Abu Bakar, Normi Sham T Technology (General) This paper investigates previous literature that focusses on the three elements: risk assessment, big data and cloud. We use a systematic literature mapping method to search for journals and proceedings. The systematic literature mapping process is utilized to get a properly screened and focused literature. With the help of inclusion and exclusion criteria, the search of literature is further narrowed. Classification helps us in grouping the literature into categories. At the end of the mapping, gaps can be seen. The gap is where our focus should be in analysing risk of big data in cloud computing environment. Thus, a framework of how to assess the risk of security, privacy and trust associated with big data and cloud computing environment is highly needed IOP Publishing 2018-06-01 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/64137/1/64137%20A%20Systematic%20Literature%20Mapping.pdf application/pdf en http://irep.iium.edu.my/64137/2/64137%20A%20Systematic%20Literature%20Mapping%20SCOPUS.pdf application/pdf en http://irep.iium.edu.my/64137/13/64137_A%20systematic%20literature%20mapping%20of%20risk%20analysis%20_wos.pdf Yusof Ali, Hazirah Bee and Abdullah, Lili Marziana and Kartiwi, Mira and Nordin, Azlin and Salleh, Norsaremah and Awang Abu Bakar, Normi Sham (2018) A systematic literature mapping of risk analysis of big data in cloud computing environment. In: 1st International Conference on Big Data and Cloud Computing (ICoBiC) 2017, 25th–27th November 2017, Kuching, Sarawak, Malaysia. http://iopscience.iop.org/article/10.1088/1742-6596/1018/1/012017/pdf 10.1088/1742-6596/1018/1/012017 |
institution |
Universiti Islam Antarabangsa Malaysia |
building |
IIUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
International Islamic University Malaysia |
content_source |
IIUM Repository (IREP) |
url_provider |
http://irep.iium.edu.my/ |
language |
English English English |
topic |
T Technology (General) |
spellingShingle |
T Technology (General) Yusof Ali, Hazirah Bee Abdullah, Lili Marziana Kartiwi, Mira Nordin, Azlin Salleh, Norsaremah Awang Abu Bakar, Normi Sham A systematic literature mapping of risk analysis of big data in cloud computing environment |
description |
This paper investigates previous literature that focusses on the three elements: risk
assessment, big data and cloud. We use a systematic literature mapping method to search for
journals and proceedings. The systematic literature mapping process is utilized to get a
properly screened and focused literature. With the help of inclusion and exclusion criteria, the
search of literature is further narrowed. Classification helps us in grouping the literature into
categories. At the end of the mapping, gaps can be seen. The gap is where our focus should be
in analysing risk of big data in cloud computing environment. Thus, a framework of how to
assess the risk of security, privacy and trust associated with big data and cloud computing
environment is highly needed |
format |
Conference or Workshop Item |
author |
Yusof Ali, Hazirah Bee Abdullah, Lili Marziana Kartiwi, Mira Nordin, Azlin Salleh, Norsaremah Awang Abu Bakar, Normi Sham |
author_facet |
Yusof Ali, Hazirah Bee Abdullah, Lili Marziana Kartiwi, Mira Nordin, Azlin Salleh, Norsaremah Awang Abu Bakar, Normi Sham |
author_sort |
Yusof Ali, Hazirah Bee |
title |
A systematic literature mapping of risk analysis of big data in cloud computing environment |
title_short |
A systematic literature mapping of risk analysis of big data in cloud computing environment |
title_full |
A systematic literature mapping of risk analysis of big data in cloud computing environment |
title_fullStr |
A systematic literature mapping of risk analysis of big data in cloud computing environment |
title_full_unstemmed |
A systematic literature mapping of risk analysis of big data in cloud computing environment |
title_sort |
systematic literature mapping of risk analysis of big data in cloud computing environment |
publisher |
IOP Publishing |
publishDate |
2018 |
url |
http://irep.iium.edu.my/64137/1/64137%20A%20Systematic%20Literature%20Mapping.pdf http://irep.iium.edu.my/64137/2/64137%20A%20Systematic%20Literature%20Mapping%20SCOPUS.pdf http://irep.iium.edu.my/64137/13/64137_A%20systematic%20literature%20mapping%20of%20risk%20analysis%20_wos.pdf http://irep.iium.edu.my/64137/ http://iopscience.iop.org/article/10.1088/1742-6596/1018/1/012017/pdf |
_version_ |
1643619722783096832 |