{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T18:36:27Z","timestamp":1761762987160,"version":"3.41.0"},"reference-count":11,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2014,4,17]],"date-time":"2014-04-17T00:00:00Z","timestamp":1397692800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGMETRICS Perform. Eval. Rev."],"published-print":{"date-parts":[[2014,4,17]]},"abstract":"<jats:p>The data source that produces data continuously in high volume and high velocity with large varieties of data types creates Big Data, and causes problems and challenges to Machine Learning (ML) techniques that help extract, analyze and visualize important information. To overcome these problems and challenges, we propose to make use of the hybrid networking model that consists of multiple components such as Hadoop distributed file system (HDFS), cloud storage system, security module and ML unit. Processing of Big Data in this networking environment with ML technique requires user interaction and additional storage hence some artificial delay between the arrivals of data domains through external storage can help HDFSto process the Big Data efficiently. To address this problem we suggest using public cloud for data storage which will induce meaningful time delay to the data while making use of its storage capability. However, the use of public cloud will lead to security vulnerability to the data transmission and storage. Therefore, we need some form of security algorithm that provides a flexible key-based encryption technique that can provide tradeoffs between time-delay, security strength and storage risks. In this paper we propose a model for using public cloud provider trust levels to select encryption types for data storage for use within a Big Data analytics network topology.<\/jats:p>","DOI":"10.1145\/2627534.2627560","type":"journal-article","created":{"date-parts":[[2014,5,27]],"date-time":"2014-05-27T12:56:59Z","timestamp":1401195419000},"page":"82-85","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Security problems and challenges in a machine learning-based hybrid big data processing network systems"],"prefix":"10.1145","volume":"41","author":[{"given":"Jeff","family":"Whitworth","sequence":"first","affiliation":[{"name":"University of North Carolina at Greensboro, Greensboro, NC"}]},{"given":"Shan","family":"Suthaharan","sequence":"additional","affiliation":[{"name":"University of North Carolina at Greensboro, Greensboro, NC"}]}],"member":"320","published-online":{"date-parts":[[2014,4,17]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Amazon web services llc. amazon s3 service level agreement. https:\/\/linproxy.fan.workers.dev:443\/http\/aws.amazon.com\/s3-sla\/ 2013.  Amazon web services llc. amazon s3 service level agreement. https:\/\/linproxy.fan.workers.dev:443\/http\/aws.amazon.com\/s3-sla\/ 2013."},{"key":"e_1_2_1_2_1","unstructured":"Amazon web services llc. amazon simple storage service (amazon s3). https:\/\/linproxy.fan.workers.dev:443\/http\/aws.amazon.com\/s3\/ 2013.  Amazon web services llc. amazon simple storage service (amazon s3). https:\/\/linproxy.fan.workers.dev:443\/http\/aws.amazon.com\/s3\/ 2013."},{"key":"e_1_2_1_3_1","unstructured":"U.s. general services administration. cloud first. https:\/\/linproxy.fan.workers.dev:443\/http\/www.gsa.gov\/portal\/content\/190333 2013.  U.s. general services administration. cloud first. https:\/\/linproxy.fan.workers.dev:443\/http\/www.gsa.gov\/portal\/content\/190333 2013."},{"key":"e_1_2_1_4_1","volume-title":"the proc. of the 2010 Asia Pacific Cloud Workshop, Colocated with APSEC2010","author":"Almorsy M.","year":"2010","unstructured":"M. Almorsy , J. Grundy , and I. M\u00fcller . An analysis of the cloud computing security problem . In the proc. of the 2010 Asia Pacific Cloud Workshop, Colocated with APSEC2010 , Australia , 2010 . M. Almorsy, J. Grundy, and I. M\u00fcller. An analysis of the cloud computing security problem. In the proc. of the 2010 Asia Pacific Cloud Workshop, Colocated with APSEC2010, Australia, 2010."},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the 2009 International Workshop on Information Security and Application (IWISA 2009)","author":"Dai Yuefa W. B.","year":"2009","unstructured":"W. B. Dai Yuefa , G. Yaqiang , Z. Quan , and T. Chaojing . Data security model for cloud computing . In Proceedings of the 2009 International Workshop on Information Security and Application (IWISA 2009) Qingdao, China , 2009 . W. B. Dai Yuefa, G. Yaqiang, Z. Quan, and T. Chaojing. Data security model for cloud computing. In Proceedings of the 2009 International Workshop on Information Security and Application (IWISA 2009) Qingdao, China, 2009."},{"issue":"11","key":"e_1_2_1_6_1","doi-asserted-by":"crossref","first-page":"1111","DOI":"10.14778\/3402707.3402746","article-title":"Profiling, what-if analysis, and cost-based optimization of mapreduce programs","volume":"4","author":"Herodotou H.","year":"2011","unstructured":"H. Herodotou and S. Babu . Profiling, what-if analysis, and cost-based optimization of mapreduce programs . Proc. of the VLDB Endowment , 4 ( 11 ): 1111 -- 1122 , 2011 . H. Herodotou and S. Babu. Profiling, what-if analysis, and cost-based optimization of mapreduce programs. Proc. of the VLDB Endowment, 4(11):1111--1122, 2011.","journal-title":"Proc. of the VLDB Endowment"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1830252.1830263"},{"key":"e_1_2_1_9_1","first-page":"2009","article-title":"The nist definition of cloud computing. national institute of standards and technology. Information Technology Laboratory","author":"Mell P.","year":"2009","unstructured":"P. Mell and T. Grance . The nist definition of cloud computing. national institute of standards and technology. Information Technology Laboratory , Version, 15(10.07) : 2009 , 2009 . P. Mell and T. Grance. The nist definition of cloud computing. national institute of standards and technology. Information Technology Laboratory, Version, 15(10.07):2009, 2009.","journal-title":"Version, 15(10.07)"},{"key":"e_1_2_1_10_1","volume-title":"Big Data Analytics workshop, in conjunction with ACM Sigmetrics","author":"Suthaharan S.","year":"2013","unstructured":"S. Suthaharan . Big data classification: Problems and challenges in network intrusion prediction with machine learning . In Big Data Analytics workshop, in conjunction with ACM Sigmetrics , 2013 . S. Suthaharan. Big data classification: Problems and challenges in network intrusion prediction with machine learning. In Big Data Analytics workshop, in conjunction with ACM Sigmetrics, 2013."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046767"}],"container-title":["ACM SIGMETRICS Performance Evaluation Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/2627534.2627560","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/pdf\/10.1145\/2627534.2627560","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:35Z","timestamp":1750230095000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/2627534.2627560"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,17]]},"references-count":11,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,4,17]]}},"alternative-id":["10.1145\/2627534.2627560"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/2627534.2627560","relation":{},"ISSN":["0163-5999"],"issn-type":[{"type":"print","value":"0163-5999"}],"subject":[],"published":{"date-parts":[[2014,4,17]]},"assertion":[{"value":"2014-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}