[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …
sources in the cloud during transit and processing. For instance, data provenance, which …
Big data challenge: a data management perspective
There is a trend that, virtually everyone, ranging from big Web companies to traditional
enterprisers to physical science researchers to social scientists, is either already …
enterprisers to physical science researchers to social scientists, is either already …
Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability
Cloud data provenance is metadata that records the history of the creation and operations
performed on a cloud data object. Secure data provenance is crucial for data accountability …
performed on a cloud data object. Secure data provenance is crucial for data accountability …
A survey on provenance: What for? What form? What from?
Provenance refers to any information describing the production process of an end product,
which can be anything from a piece of digital data to a physical object. While this survey …
which can be anything from a piece of digital data to a physical object. While this survey …
Information security in big data: privacy and data mining
The growing popularity and development of data mining technologies bring serious threat to
the security of individual,'s sensitive information. An emerging research topic in data mining …
the security of individual,'s sensitive information. An emerging research topic in data mining …
[PDF][PDF] Spark: Cluster computing with working sets
MapReduce and its variants have been highly successful in implementing large-scale data-
intensive applications on commodity clusters. However, most of these systems are built …
intensive applications on commodity clusters. However, most of these systems are built …
A methodology for adaptable and robust ecosystem services assessment
Ecosystem Services (ES) are an established conceptual framework for attributing value to
the benefits that nature provides to humans. As the promise of robust ES-driven …
the benefits that nature provides to humans. As the promise of robust ES-driven …
Cloud computing and grid computing 360-degree compared
Cloud computing has become another buzzword after Web 2.0. However, there are dozens
of different definitions for cloud computing and there seems to be no consensus on what a …
of different definitions for cloud computing and there seems to be no consensus on what a …
Provenance in databases: Why, how, and where
Different notions of provenance for database queries have been proposed and studied in
the past few years. In this article, we detail three main notions of database provenance …
the past few years. In this article, we detail three main notions of database provenance …
A survey on secure data analytics in edge computing
Internet of Things (IoT) is gaining increasing popularity. Overwhelming volumes of data are
generated by IoT devices. Those data after analytics provide significant information that …
generated by IoT devices. Those data after analytics provide significant information that …