Biomedical Engineering Reference
In-Depth Information
1.2 Organization of the Paper
This paper addresses integrity and authentication that must be provided to the data
that are communicated between Hadoop machines, which is distributed infra-
structure. And the remaining paper is arranged as follows: The related work is
discussed in Sect. 2 , the proposed model and its architecture is given in Sect. 3 , the
Methodology used is given in Sect. 4 , the results of experiment are given in Sect. 5 ,
and at last, in Sect. 6 , Conclusions and Future work is given.
2 Related Work
Karthik Kambatla et al. [ 1 ] introduced a Hadoop that uses the cloud to access with a
model called pay-as-you-use. Zhao et al. [ 9 ] and Wang et al. [ 10 ] introduced a
method called G-Hadoop mechanism, and Rupesh and Chitre [ 6 ] presented a report
on Data Leakage and Detection of Guilty Agent. Caballer et al. [ 11 ] have presented
code cloud architecture and a dependent platform that supports to execute set of
scienti
c applications which is dealt with different programming models on cloud
environment. AL-Saiyd and Sail [ 12 ] designed a cloud computing security devel-
opment life cycle model. Dillibabu et al. [ 13 ], proposed model for sending the data
by splitting it using Merkle Hash Tree Algorithm and uses veri
cation process.
Glenn and Phong developed the hashing algorithm called FNV and Landon Curt
Noll, improved the algorithm [ 7 , 8 ]. Mounika et al. [ 14 ] proposed a model called a
fully distributed load rebalancing algorithm, which is used to overcome load
imbalance problem. To provide security, this paper proposes a new methodology
where it will be done in two-stage Hadoop, which includes data integrity also.
3 Methodology
A simple Hadoop cluster framework is used to develop ef
cient cloud monitoring
framework (ECMF). It is implemented with an ef
cient data integrity technique
FNV to provide authorization and integrity of the data that have been published by
the user in cloud environment. Following Fig. 1 shows the model architecture of the
system used in this paper.
In the above
gure, at any data node, user may transfer data to any data node
present in cloud. In the above
gure, the idea of transferring data securely from any
node to any node was displayed. The process of generating message digest for the
data that has been stored in cloud will be discussed in Sect. 3.2 .
Search WWH ::




Custom Search