{"id":"https://openalex.org/W2519014116","doi":"https://doi.org/10.1109/hpcsim.2016.7568374","title":"Impact of information security measures on the velocity of big data infrastructures","display_name":"Impact of information security measures on the velocity of big data infrastructures","publication_year":2016,"publication_date":"2016-07-01","ids":{"openalex":"https://openalex.org/W2519014116","doi":"https://doi.org/10.1109/hpcsim.2016.7568374","mag":"2519014116"},"language":"en","primary_location":{"id":"doi:10.1109/hpcsim.2016.7568374","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpcsim.2016.7568374","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 International Conference on High Performance Computing &amp; Simulation (HPCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000538990","display_name":"Lionel Dupre","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Lionel Dupre","raw_affiliation_strings":["EBRC (European Business Reliance Centre), Luxembourg"],"affiliations":[{"raw_affiliation_string":"EBRC (European Business Reliance Centre), Luxembourg","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017479397","display_name":"Yuri Demchenko","orcid":"https://orcid.org/0000-0001-7474-9506"},"institutions":[{"id":"https://openalex.org/I887064364","display_name":"University of Amsterdam","ror":"https://ror.org/04dkp9463","country_code":"NL","type":"education","lineage":["https://openalex.org/I887064364"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Yuri Demchenko","raw_affiliation_strings":["University of Amsterdam"],"affiliations":[{"raw_affiliation_string":"University of Amsterdam","institution_ids":["https://openalex.org/I887064364"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5000538990"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.1581,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.81476797,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"4","issue":null,"first_page":"492","last_page":"500"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5713611841201782},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.5304244160652161},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5282220840454102},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5186564326286316},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.41557013988494873},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.32143378257751465},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.20290660858154297},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.13562333583831787}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5713611841201782},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.5304244160652161},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5282220840454102},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5186564326286316},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.41557013988494873},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.32143378257751465},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.20290660858154297},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.13562333583831787}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hpcsim.2016.7568374","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpcsim.2016.7568374","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 International Conference on High Performance Computing &amp; Simulation (HPCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W112964067","https://openalex.org/W1582697802","https://openalex.org/W1992315898","https://openalex.org/W2003598375","https://openalex.org/W2036538717","https://openalex.org/W2045125148","https://openalex.org/W2072956666","https://openalex.org/W2095416015","https://openalex.org/W2100999807","https://openalex.org/W2131164945","https://openalex.org/W2177748927","https://openalex.org/W2216876218","https://openalex.org/W6668447743"],"related_works":["https://openalex.org/W4322629366","https://openalex.org/W2808989540","https://openalex.org/W2397053934","https://openalex.org/W1039292361","https://openalex.org/W2551093110","https://openalex.org/W2148016376","https://openalex.org/W4237919137","https://openalex.org/W3184179822","https://openalex.org/W3095362084","https://openalex.org/W3003361536"],"abstract_inverted_index":{"Encryption":[0],"is":[1,17,40,111],"often":[2],"viewed":[3],"as":[4,212],"a":[5],"major":[6],"drawback":[7],"which":[8,31,137,177],"hinders":[9],"the":[10,35,44,79,83,92,131,145,152,182],"performance":[11,95,209],"of":[12,147,156,164,201,225],"processing":[13,126],"systems.":[14],"This":[15,106],"perception":[16],"not":[18,62],"wrong;":[19],"encrypted":[20],"storage,":[21,149],"memory":[22],"and":[23,51,56,69,118,150,208],"communications":[24],"usually":[25],"perform":[26,142],"much":[27,143],"slower":[28],"than":[29],"systems":[30,72],"process":[32],"data":[33,169,214,228],"in":[34,54,82,158,167,171,217],"clear.":[36],"Big":[37,70,120,174],"Data":[38,71,121,175],"applications":[39],"no":[41,112],"exception":[42],"to":[43,75,98,102,116,124,141,233],"rule:":[45],"it":[46],"was":[47,60,66,210],"designed":[48],"with":[49],"Volume":[50],"Velocity":[52],"requirements":[53],"mind,":[55],"security":[57,65],"(i.e.":[58],"encryption)":[59],"initially":[61],"considered;":[63],"perimeter":[64],"deemed":[67],"sufficient,":[68],"were":[73,197],"confined":[74],"back-end":[76],"operations.":[77],"Considering":[78],"recent":[80],"developments":[81],"field":[84],"(AES-NI":[85],"processors,":[86],"Key":[87],"Management":[88],"Servers,":[89],"homomorphic":[90],"encryption),":[91],"encryption":[93,110,132,139,157,170],"vs":[94],"paradigm":[96],"needs":[97],"be":[99,231],"actually":[100],"measured":[101,211],"re-evaluate":[103],"preconceived":[104],"reservation.":[105],"research":[107],"found":[108],"that":[109],"longer":[113],"an":[114],"obstacle":[115],"efficient":[117],"fast":[119],"processing,":[122],"thanks":[123],"massive":[125],"parallelisation":[127],"(which":[128],"distributes":[129],"also":[130],"payload),":[133],"new":[134],"CPU":[135],"technologies":[136],"allow":[138],"instructions":[140],"faster,":[144],"use":[146,155],"SSD":[148],"finally":[151],"clever":[153],"data-centric":[154],"HDFS.":[159],"The":[160],"paper":[161],"provides":[162],"analysis":[163],"four":[165],"strategies":[166],"using":[168,191],"Hadoop":[172],"based":[173],"applications,":[176],"have":[178],"been":[179],"tested":[180],"on":[181,185,199],"testbed":[183],"built":[184],"Amazon":[186],"Web":[187],"Services":[188],"(AWS)":[189],"platform":[190],"advanced":[192],"AWS":[193],"monitoring":[194],"data.":[195],"Tests":[196],"performed":[198],"datasets":[200,223],"relatively":[202],"modest":[203],"size":[204],"(about":[205],"5-20":[206],"Gigabytes),":[207],"all":[213],"could":[215],"fit":[216],"each":[218],"node's":[219],"RAM.":[220],"On":[221],"larger":[222],"(e.g.":[224],"Terabytes":[226],"scale),":[227],"partitioning":[229],"may":[230],"required":[232],"obtain":[234],"similar":[235],"results.":[236]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
