Loading...
Please wait, while we are loading the content...
Similar Documents
Enhancing and Scalability in Big Data and Cloud Computing: Future Opportunities and Security
| Content Provider | Semantic Scholar |
|---|---|
| Author | Kumar, N. Y. Phani Reddy, B. Ramakantha Ramesh, Pillem |
| Copyright Year | 2013 |
| Abstract | Scalable database management systems (DBMS)—both for update intensive application workloads as well as decision support systems for descriptive and deep analytics—are a critical part of the cloud infrastructure and play an important role in ensuring the smooth transition of applications from the traditional enterprise infrastructures to next generation cloud infrastructures. Though scalable data management has been a vision for more than three decades and much research has focussed on large scale data management in tra- ditional enterprise setting, cloud computing brings its own set of novel challenges that must be addressed to ensure the success of data management solutions in the cloud environment. This tutorial presents an organized picture of the challenges faced by application developers and DBMS designers in developing and deploying in- ternet scale applications. Our background study encompasses both classes of systems: (i) for supporting update heavy applications, and (ii) for ad-hoc analytics and decision support. We then focus on providing an in-depth analysis of systems for supporting update intensive web-applications and provide a survey of the state-of-the- art in this domain. We crystallize the design choices made by some successful systems large scale database management systems, analyze the application demands and access patterns, and enumerate the desiderata for a cloud-bound DBMS. Security and privacy issues are magnified by velocity, and variety of big data, such as large-scale cloud infrastructures, diversity of data sources and formats, streaming nature of data acquisition, and high volume inter-cloud migration. Therefore, traditional security mechanisms, which are tailored to securing small-scale static (as opposed to streaming) data, are inadequate |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://ijesr.in/wp-content/uploads/2013/12/ACICE-028.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |