1. Agrawal D, Bernstein P, Bertino E, Davidson S, Dayal U, Franklin M, Gehrke J, Haas L, Halevy A, Han J, Jagadish HV, Labrinidis A, Madden S, Papakonstantinou Y, Patel JM, Ramakrishnan R, Ross K, Shahabi C, Suciu D, Vaithyanathan S, Widom J (2012) Challenges and opportunities with big data: a white paper prepared for the computing community consortium committee of the Computing Research Association. Technical report. https://cra.org/ccc/wp-content/uploads/sites/2/2015/05/bigdatawhitepaper.pdf
2. Fu X, Gao Y, Luo B, Du X, Guizani M (2017) Security threats to hadoop: data leakage attacks and investigation. IEEE Netw 31(2):67–71
3. Ko RKL (2014) Data accountability in cloud systems. In: Nepal S, Pathan M (eds) Security, privacy and trust in cloud systems. Springer, Berlin, pp 211–238
4. Ko RKL, Phua TW (2017) The full provenance stack: five layers for complete and meaningful provenance. In: Proceedings of the security, privacy and anonymity in computation, communication and storage: SpaCCS 2017 international workshops, UbiSafe, ISSR, TrustData, TSP, SPIoT, NOPE, DependSys, SCS, WCSSC, MSCF and SPBD, 12–15 Dec 2017. Springer, Guangzhou
5. Ko RKL, Will MA (2014) Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking. In: Proceedings of the IEEE international conference on cloud computing, CLOUD’14. IEEE Computer Society, Washington, DC, pp 881–889. https://doi.org/10.1109/CLOUD.2014.121