
216
Big Data: Storage, Sharing, and Security
8.3.4 B-DC security challenges
For the past two years, users have been creating and manipulating more than 2.5 quintillion
bytes of data on a daily basis. Use of large-scale B-DC infrastructures with diverse software
platforms increases the attack surface of the entire system. Moreover, B-DC manipulation
requires ultrafast send and response times from security and privacy solutions. This section
highlights the most important B-DC security and privacy challenges that were discussed in [27],
which are listed as follows:
1. Secure data storage: Data and logs are saved in multilayered storage media. The IT