CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Convergence of Internet of things, Cloud Computing, Big Data and Security

by Hitisha Damani, Rajavi Mehta, Neha Katre
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 4
Year of Publication: 2018
Authors: Hitisha Damani, Rajavi Mehta, Neha Katre
10.5120/ijca2018917532

Hitisha Damani, Rajavi Mehta, Neha Katre . Convergence of Internet of things, Cloud Computing, Big Data and Security. International Journal of Computer Applications. 181, 4 ( Jul 2018), 43-47. DOI=10.5120/ijca2018917532

@article{ 10.5120/ijca2018917532,
author = { Hitisha Damani, Rajavi Mehta, Neha Katre },
title = { Convergence of Internet of things, Cloud Computing, Big Data and Security },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2018 },
volume = { 181 },
number = { 4 },
month = { Jul },
year = { 2018 },
issn = { 0975-8887 },
pages = { 43-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number4/29708-2018917532/ },
doi = { 10.5120/ijca2018917532 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:05:03.012478+05:30
%A Hitisha Damani
%A Rajavi Mehta
%A Neha Katre
%T Convergence of Internet of things, Cloud Computing, Big Data and Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 4
%P 43-47
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

There are many technologies that are developed and used independently and they are efficient in their performance too. But if these technologies are merged, then it may increase the overall efficiency of the merged technologies and provide benefit to mankind. This paper describes three such technologies which are: Internet of Things, Big Data and Cloud Computing and later attempts to hypothetically combine them as one and try to cover loopholes by stating ways and methods for secured movement and storage of data from one phase to another.

References
  1. En.wikipedia.org. (2018). Cloud computing. Available: https://en.wikipedia.org/wiki/Cloud_computing
  2. targroup.uwaterloo.ca. (2018). Available: http://www.stargroup.uwaterloo.ca/~mhamdaqa/publications/Cloud_Computing_Uncovered.pdf
  3. Journal of Electrical and Computer Engineering Volume 2017, Article ID 9324035, 25 pages Available: https://www.hindawi.com/journals/jece/2017/932403/
  4. SearchBusinessAnalytics. (2018). What is big data analytics? - Definition from WhatIs.com. Available: http://searchbusinessanalytics.techtarget.com/definition/big-data-analytics.
  5. Blog.sqlauthority.com. (2018). Available: https://blog.sqlauthority.com/2013/10/02/big-data-what-is-big-data-3-vs-of-big-data-volume-velocity-and-variety-day-2-of-21/
  6. SearchSecurity. (2018). What is cybersecurity? - Definition from WhatIs.com. Available: http://whatis.techtarget.com/definition/cybersecurity
  7. www.tutorialspoint.com. (2018). Cloud Computing Architecture.Available: https://www.tutorialspoint.com/cloud_computing/cloud_computing_architecture.htm
  8. En.wikipedia.org. (2018). Cloud computing architecture. Available: https://en.wikipedia.org/wiki/Cloud_computing_architecture
  9. Krutz, R. and Vines, R. (2010). Cloud security. Indianapolis, Ind.: Wiley Pub. Chapter 3
  10. Bush, B. (2018). The Architecture of the Internet of Things. By.dialexa.com. Available: https://by.dialexa.com/the-architecture-of-the-internet-of-things
  11. Forbes.com.(2018).Available: https://www.forbes.com/sites/jacobmorgan/2014/05/13/simple-explanation-internet-things-that-anyone-can-understand/#1485c7571d09
  12. Pal, S. (2018). How to Design a Big Data Architecture in 6 Easy Steps - Saama. Available: https://www.saama.com/blog/design-big-data-architecture-6-easy-steps/
  13. Datamation.com. (2018). What is Big Data Architecture? - Datamation.Available:https://www.datamation.com/big-data/big-data-architecture.html.
  14. Burn-Murdoch, J. (2018). Study: less than 1% of the world's data is analysed, over 80% is unprotected. the Guardian.Available: https://www.theguardian.com/news/datablog/2012/dec/19/big-data-study-digital-universe-global-volume
  15. Internet Of Things Wiki. (2018). IoT Security-Issues, Challenges and Solutions - Internet Of Things Wiki. Available: https://internetofthingswiki.com/iot-security-issues-challenges-and-solutions/937/
  16. Buttler, P., McNulty, E., Davis, M., McDonald, M., McNulty, E., Davis, M., McDonald, M., McNulty, E., Davis, M. and McDonald, M. (2018). 10 Challenges to Big Data Security and Privacy - Dataconomy. Dataconomy. Available: http://dataconomy.com/2017/07/10-challenges-big-data-security-privacy/
  17. InformationWeek. (2018). 9 Worst Cloud Security Threats - InformationWeek. Available: https://www.informationweek.com/cloud/infrastructure-as-a-service/9-worst-cloud-security-threats/d/d-id/1114085
  18. 9 Worst Cloud Security Threats - InformationWeek", InformationWeek, 2018. Available: https://www.informationweek.com/cloud/infrastructure-as-a-service/9-worst-cloud-security-threats/d/d-id/1114085.
Index Terms

Computer Science
Information Sciences

Keywords

Internet of things Cloud Computing Big Data and Cyber Security