Call for Paper - November 2020 Edition
IJCA solicits original research papers for the November 2020 Edition. Last date of manuscript submission is October 20, 2020. Read More

A View on Data Security System for Cloud on Hadoop Framework

Print
PDF
IJCA Proceedings on National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015)
© 2015 by IJCA Journal
NCKITE 2015 - Number 3
Year of Publication: 2015
Authors:
Karthik D
Manjunath T N
Srinivas K

Karthik D, Manjunath T N and Srinivas K. Article: A View on Data Security System for Cloud on Hadoop Framework. IJCA Proceedings on National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015) NCKITE 2015(3):1-4, July 2015. Full text available. BibTeX

@article{key:article,
	author = {Karthik D and Manjunath T N and Srinivas K},
	title = {Article: A View on Data Security System for Cloud on Hadoop Framework},
	journal = {IJCA Proceedings on National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015)},
	year = {2015},
	volume = {NCKITE 2015},
	number = {3},
	pages = {1-4},
	month = {July},
	note = {Full text available}
}

Abstract

To solve the current data Security problem for cloud disk in distributed network, for example transmission, storage security problems, access control and data verification, a network cloud disk security storage system based on Hadoop is proposed. Based on the different secret level of client data, it provides selective encryption method which provides full deliberation to the subsequent security issues, such as the security of the client data broadcast in the network, client data no verification , the client data privacy might be leaked. Mutual with symmetric encryption algorithm and uniqueness of client data authentication of RSA, the performance of Hadoop, the distributed network cloud data security storage disk can supply protected, efficient, constant effect.

References

  • XU Guang-hui. Deploying and researching Hadoop in virtual machines[C]//Automation and Logistics (ICAL), 2012 IEEE International Conference on Zhengzhou, 2012: 395-399.
  • LIUK. The Security Analysis on Otway-Rees Protocol Based on BAN Logic[C]. Computational and Information Sciences (ICCIS), 20 Chongqing, 2012: 341-344
  • MUNIER M. Self-Protecting Documents for Cloud Storage Security[C]. Trust, Security and Privacy in Computing and Community, Liverpool, 2012: 1231-1238
  • SHAIKH FB. Security threats in cloud computing[C]. Internet Technology and Secured Transactions (ICIT, Abu Dhabi,2011: 214-219.
  • V. Winkler, "Securing the Cloud Computer: Security Techniques and Tactics," Elsevier Inc. , ISBN: 978-1-59749-592-9, 2011.
  • Jianfeng Zhao "Research on Framework for Urban Railway Massive Data Based on Cloud Computing Platform", 2014 IEEE.
  • Sourya Joyee De and Asim K. Pal "A Policy-based Security Framework for Storage and Computation on Enterprise Data in the Cloud" 2014, 47th Hawaii International Conference on System Science.
  • Chao-Chun Chen, Nguyen Huu Tinh Giang, Tzu-Chao sLin "MC Framework: High-performance Distributed Framework for Standalone Data Analysis Packages over Hadoop-based Cloud" 2013 IEEE International Conference on Granular Computing(GrC).
  • A. Huang Jing, B. LI Renfa, C. Tang Zhuo "The Research of the data security for cloud disk based on the Hadoop Framework" 2013 Fourth International conference on Intelligent control and information processing(ICICIP),Beijing, China.