Biomedical Engineering Reference
In-Depth Information
method for attribute-based encryption. We introduced two techniques: encryption
of log
le and message digest that can only be read by those who have credentials.
We also represented the results of processing time for different algorithms with
varying collisions. Finally, this paper gave a model to evaluate cluster. The model
evaluates the cloud system in terms of resource consumption and accuracy of the
result.
We want to develop the evaluation model in future with the extension of secure
ranked keyword search technique to identify the data of user interest in cloud
environment.
References
1. http://www.edureka.in/blog/what-is-big-data-and-why-learn-hadoop/
2. http://tools.ietf.org/html/draft-eastlake-fnv-07
3. Svantesson D, Clarke R (2010) Privacy and consumer risks in cloud computing. Comput Law
Secur Review 26(4):391
397
4. King NJ, Raja VT (2012) Protecting the privacy and security of sensitive customer data in the
cloud. Comput Law Secur Rev 28(3):308
-
319
5. Breitinger F, Stivaktakis G, Baier H (2013) A framework to test algorithms of similarity
hashing. Digit Invest 10:S50
-
S58
6. Rupesh M, Chitre DK (2012) Data leakage and detection of guilty agent. Int J Sci Eng Res 3
(6)
7. Hadoop, http://hadoop.apache.org
8. http://www.isthe.com/chongo/tech/comp/fnv/index.html#history
9. Zhao J, Wang L, Tao J, Chen J, Sun W, Ranjan R, Ko
-
odziej J, Streit A, Georgakopoulos D
(2014) A security framework in GHadoop for bigdata computing across distributed Cloud data
centers. Comput Syst Sci 80:994 - 1007
10. Wang L, Tao J, Ranjan R, Marten H, Streit A, Chen D, Chen J (2013) G-Hadoop: mapreduce
across distributed data centers from data-intensive computing. Future Gener Comput Syst 29
(3):739
11. Caballer M, de Alfonso C, Molto G, Romero E, Blanquer I, Garcia A (2014) Code cloud: A
platform to enable execution of programming models on the Clouds. J Syst Softw 93:187 - 198
12. AL-Saiyd NA, Sail N (2013) Data integrity in cloud computing security. Theor Appl Inform
Technol 58
13. Dillibabu M, Kumari S, Saranya T, Preethi R (2013) Assured protection and veracity for cloud
data using Merkle hash tree algorithm. Indian J Appl Res 3:1
ł
3
14. Mounika CH, RamaDevi L, Nikhila P (2013) Sample load rebalancing for distributed hash
table in cloud. ISRO J Comput Eng 13:60
-
65
-
Search WWH ::




Custom Search