{"id":"https://openalex.org/W4360585338","doi":"https://doi.org/10.1109/ic3i56241.2022.10072552","title":"A Comparative Study on Cyber security Technology in Big data Cloud Computing Environment","display_name":"A Comparative Study on Cyber security Technology in Big data Cloud Computing Environment","publication_year":2022,"publication_date":"2022-12-14","ids":{"openalex":"https://openalex.org/W4360585338","doi":"https://doi.org/10.1109/ic3i56241.2022.10072552"},"language":"en","primary_location":{"id":"doi:10.1109/ic3i56241.2022.10072552","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3i56241.2022.10072552","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070865626","display_name":"Amit Jain","orcid":"https://orcid.org/0000-0002-9255-6537"},"institutions":[{"id":"https://openalex.org/I110166357","display_name":"University of Delhi","ror":"https://ror.org/04gzb2213","country_code":"IN","type":"education","lineage":["https://openalex.org/I110166357"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Amit Kumar Jain","raw_affiliation_strings":["Delhi University,Department of Computer Science,Delhi","Department of Computer Science, Delhi University, Delhi"],"affiliations":[{"raw_affiliation_string":"Delhi University,Department of Computer Science,Delhi","institution_ids":["https://openalex.org/I110166357"]},{"raw_affiliation_string":"Department of Computer Science, Delhi University, Delhi","institution_ids":["https://openalex.org/I110166357"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014954717","display_name":"Tripti Misra","orcid":null},"institutions":[{"id":"https://openalex.org/I3130021832","display_name":"Shree Guru Gobind Singh Tricentenary University","ror":"https://ror.org/04kf25f32","country_code":"IN","type":"education","lineage":["https://openalex.org/I3130021832"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Tripti Misra","raw_affiliation_strings":["Deutche Telecom Digital Labs,Gurugram,Haryana,India","Deutche Telecom Digital Labs, Gurugram, Haryana, India"],"affiliations":[{"raw_affiliation_string":"Deutche Telecom Digital Labs,Gurugram,Haryana,India","institution_ids":["https://openalex.org/I3130021832"]},{"raw_affiliation_string":"Deutche Telecom Digital Labs, Gurugram, Haryana, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079823175","display_name":"Neha Tyagi","orcid":"https://orcid.org/0000-0001-8040-1661"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Neha Tyagi","raw_affiliation_strings":["G. L Bajaj Institute of Technology &#x0026; Management,Knowledge Park 3,Department of IT,Greater Noida,India"],"affiliations":[{"raw_affiliation_string":"G. L Bajaj Institute of Technology &#x0026; Management,Knowledge Park 3,Department of IT,Greater Noida,India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054339731","display_name":"Suresh Kumar M V","orcid":null},"institutions":[{"id":"https://openalex.org/I875944469","display_name":"Koneru Lakshmaiah Education Foundation","ror":"https://ror.org/02k949197","country_code":"IN","type":"education","lineage":["https://openalex.org/I875944469"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"M V Suresh Kumar","raw_affiliation_strings":["Koneru Lakshmaiah Education Foundation, Green Fields, Vaddeswaram,Department of Law,Guntur","Department of Law, Koneru Lakshmaiah Education Foundation, Green Fields, Vaddeswaram, Guntur"],"affiliations":[{"raw_affiliation_string":"Koneru Lakshmaiah Education Foundation, Green Fields, Vaddeswaram,Department of Law,Guntur","institution_ids":["https://openalex.org/I875944469"]},{"raw_affiliation_string":"Department of Law, Koneru Lakshmaiah Education Foundation, Green Fields, Vaddeswaram, Guntur","institution_ids":["https://openalex.org/I875944469"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005317548","display_name":"Bhasker Pant","orcid":"https://orcid.org/0000-0002-6070-5104"},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Bhasker Pant","raw_affiliation_strings":["Graphic Era Deemed to be University,Department of Computer Science &#x0026; Engineering,Dehradun,Uttarakhand,Guntur"],"affiliations":[{"raw_affiliation_string":"Graphic Era Deemed to be University,Department of Computer Science &#x0026; Engineering,Dehradun,Uttarakhand,Guntur","institution_ids":["https://openalex.org/I60054993"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5070865626"],"corresponding_institution_ids":["https://openalex.org/I110166357"],"apc_list":null,"apc_paid":null,"fwci":1.8189,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.88993755,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"235","last_page":"241"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13983","display_name":"Cybersecurity and Information Systems","score":0.9819999933242798,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13693","display_name":"Smart Systems and Machine Learning","score":0.9800999760627747,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8349486589431763},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7875665426254272},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7238357067108154},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.6961429119110107},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.5873013734817505},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5600362420082092},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.556100606918335},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.5197243690490723},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.47408831119537354},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.4182719588279724},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3074922263622284}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8349486589431763},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7875665426254272},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7238357067108154},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.6961429119110107},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.5873013734817505},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5600362420082092},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.556100606918335},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5197243690490723},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.47408831119537354},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.4182719588279724},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3074922263622284},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3i56241.2022.10072552","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3i56241.2022.10072552","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5899999737739563,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2058883231","https://openalex.org/W2412267538","https://openalex.org/W2765329640","https://openalex.org/W2771511736","https://openalex.org/W2963366538","https://openalex.org/W2965604686","https://openalex.org/W2982657588","https://openalex.org/W2992054303","https://openalex.org/W2996908335","https://openalex.org/W3113471021","https://openalex.org/W3153045320","https://openalex.org/W3180751607","https://openalex.org/W3191606084","https://openalex.org/W4229003780","https://openalex.org/W4244705237"],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W1982580243","https://openalex.org/W2183730421","https://openalex.org/W2551868243","https://openalex.org/W2348153269","https://openalex.org/W4205613068","https://openalex.org/W3112956360","https://openalex.org/W4286284259","https://openalex.org/W2945722434","https://openalex.org/W4252993459"],"abstract_inverted_index":{"Protection":[0],"of":[1,11,18,25,37,40,53,67,71,76,80,97,100,107,205,214,266],"networks,":[2],"programs":[3],"and":[4,35,56,95,111,120,132,154,164,216,233,254,261],"systems":[5],"from":[6,32],"cyberattacks":[7,15],"is":[8,82,270],"the":[9,33,43,54,60,65,74,98,118,181,189,220,225],"practice":[10],"cybersecurity":[12,197],"technology.":[13],"The":[14,88,208,243,263],"are":[16,28,48,90,199,258],"capable":[17],"gaining":[19,148],"access":[20,149],"for":[21,63,147,176,249],"deleting":[22],"or":[23],"altering":[24],"data":[26,81,86,236],"that":[27,52,58,102,122,238,246],"sensitive,":[29],"demanding":[30],"money":[31],"users":[34],"obstruction":[36],"regular":[38],"operations":[39],"corporates.":[41],"In":[42,69],"present":[44],"situation":[45],"many":[46],"devices":[47],"getting":[49],"smarter":[50],"than":[51],"hackers":[55],"humans":[57],"makes":[59],"tasks":[61],"difficult":[62],"implementing":[64],"measures":[66,198],"cybersecurity.":[68],"terms":[70],"cyber":[72,109,135],"security,":[73],"ability":[75],"collecting":[77],"huge":[78],"amount":[79],"known":[83],"as":[84,167],"big":[85],"analytics.":[87],"functions":[89],"performed":[91],"through":[92],"displaying,":[93],"interpretation":[94],"extraction":[96],"insights":[99],"future":[101],"can":[103,114,159,171],"enable":[104],"early":[105],"detection":[106,269],"catastrophic":[108],"threats":[110],"attacks.":[112],"Organizations":[113],"better":[115],"understand":[116],"all":[117],"activities":[119],"acts":[121],"could":[123],"potentially":[124],"result":[125],"in":[126,195],"cyber-attacks":[127],"by":[128],"having":[129],"a":[130,162,165,212],"stronger":[131],"more":[133,141,187],"effective":[134],"defensive":[136],"posture.":[137],"As":[138],"offices":[139],"became":[140,145],"remote,":[142],"cloud":[143,190,241,251],"computing":[144,155,252],"crucial":[146],"to":[150,184,201,218,240],"important":[151],"documents,":[152],"programs,":[153],"resources.":[156],"Although":[157],"connection":[158],"be":[160],"both":[161],"benefit":[163],"curse,":[166],"easily":[168],"accessible":[169],"files":[170],"become":[172],"an":[173],"easy":[174],"target":[175],"hostile":[177],"actors,":[178],"we":[179],"expect":[180],"global":[182],"economy":[183],"transfer":[185],"even":[186],"into":[188],"over":[191],"time.":[192],"Therefore,":[193],"efforts":[194],"strengthening":[196],"vital":[200],"safeguard":[202],"distant":[203],"vaults":[204],"sensitive":[206],"data.":[207],"management":[209],"depends":[210],"on":[211],"combination":[213],"technology":[215],"advice":[217],"secure":[219,234],"cloud.":[221],"It":[222],"involves":[223],"managing":[224],"framework,":[226],"information":[227],"applications,":[228],"safe-secure":[229],"guidelines,":[230],"consistency":[231],"leads,":[232],"infrastructure":[235],"applications":[237],"pertain":[239],"computing.":[242],"same":[244],"principles":[245],"underpin":[247],"security":[248],"modern":[250],"platforms":[253],"historic":[255],"knowledge":[256],"centers":[257],"secrecy,":[259],"integrity,":[260],"usability.":[262],"novel":[264],"method":[265],"DDoS":[267],"attack":[268],"proposed.":[271]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
