IJTEEE

Open Access Journal of Scientific, Technology & Engineering Research


International Journal of Technology Enhancements and Emerging Engineering Research (ISSN 2347-4289)
QUICK LINKS
CURRENT PUBLICATIONS



IJTEEE >> Volume 3 - Issue 5, May 2015 Edition



International Journal of Technology Enhancements and Emerging Engineering Research  
International Journal of Technology Enhancements and Emerging Engineering Research

Website: http://www.ijteee.org

ISSN 2347-4289



A Framework Of Privacy Scribed Thesis On Cloud Environment And Hadoop Based Big Data

[Full Text]

 

AUTHOR(S)

Arun Kumar, .S, Nikitha. P, Sundarajan. S

 

KEYWORDS

KEYWORDS: Cloud Computing, Privacy, Big Data, Hadoop, Map Reduce,HDFS.

 

ABSTRACT

ABSTRACT: Big data which is an derivational application of Hadoop distributed file system plays a crucial role in cloud computing environment. The major factor considered here is the privacy related issues in cloud computing that are associated with hadoop big data. Organizations, enterprises, companies, marketing agencies and many large and small scale sector industries rely upon big data applications. Globalization of computing assets may be the biggest contribution the cloud has made to date. For this reason, the cloud is the subject of many complex geopolitical issues. The outsourcing feature of cloud computing is widely dependent upon some of the basic security requirements like storage privacy, data confidentiality, anonymity, auditability and search pattern privacy.Hence, cloud environment offers all these facilities available to its users with a built-in infrastructure that incorporates technologies, policies, controls and big data tools to protect the data. Moreover, cloud computing and big data is about to promote many innovative frontiers in science.

 

REFERENCES

[1] VenkataNarasimhaInukollu,SailajaArsi and Srinivasa Rao Ravuri"SECURITY ISSUES ASSOCIATED WITH BIG DATA INCLOUD COMPUTING" proceddings of International urnal of Network Security & Its Applications (IJNSA), Vol.6, No.3, May 2014

[2] Ren, Yulong, and Wen Tang. "ASERVICEINTEGRITYASSURANCEFRAMEWORKFORCLOUD COMPUTINGBASEDONMAPREDUCE."ProceedingsofIEEECCIS2012.Hangzhou:2012,pp240 244,Oct.302012-Nov.12012

[3] N,Gonzalez, MiersC, RedigoloF, CarvalhoT, SimplicioM, deSousaG. T, and Pourzandi M."A Quantitative Analysis ofCurrent SecurityConcerns andSolutions for Cloud Computing.". Athens:2011.,pp231238,Nov.292011-Dec.12011

[4] Hao, Chen, and Ying Qiao. "Research ofCloud Computing based on the Hadoopplatform.". Chengdu,China:2011,pp.181184,21-23Oct2011.

[5] Y, Amanatullah, IpungH.P., JuliandriA, and Lim C. "Toward cloud computing reference architecture:Cloudservicemanagementperspective.".Jakarta:2013,pp.1-4,13-14Jun.2013

[6] A,Katal,WazidM,andGoudarR.H."Bigdata:Issues,challenges,toolsandGoodpractices.".Noida: 2013,pp.404409,8-10Aug.2013

[7] Lu, Huang, Ting-tin Hu, and Hai-shan Chen. "Researchon Hadoop Cloud Computing Modelandits Applications." .Hangzhou, China: 2012, pp.5963,21-24Oct.2012.

[8] Wie, Jiang, Ravi V. T, and Agrawal G."A Map-Reduce Systemwithan Alternate A PIfor Multi-core Environments." Melbourne,VIC:2010,pp.84-93,17-20May.2010