Date of Publication :9th February 2017
Abstract: Because of the advanced propensities inside the teaching of science and innovation brought about the trends of the viable data switch, the capacity of dealing with colossal data and the recovery of information effectively. On account that the data that is spared is expanding voluminously, strategies to retrieve relative comprehension and assurance associated concerns are to be tended to viable to quiet this bulk information. Moreover, with rising benchmarks of mammoth information, these security issues are a testing undertaking. This paper addresses the constraint of agreeable information switch utilizing the principles of learning mining in cloud condition making use of Hadoop MapReduce. In light of the experimentation, achievedoutcome are examined and spoken to with perceiving to time and space unpredictability when thought about Hadoop with non Hadoop approach
Reference :
-
- KejaingYe et all, vHadoop: A Scalable hadoop virtual cluster platform for Map Reduce- Based Parallel Machine learning with Performance Consideration, 2012 IEEE International Conference on Cluster ComputingWorkships,PP:152-160, 2012
- J. Dean and S. Ghemawat, “Map Reduce:Simplified Data processing on large clusters”,communications of the ACM.Vol.51, no.1,,pp107-113, 2008.
- T. White, Hadoop: The Definitive guide. yahoopress ,2010
- Mohamed H. Almeer et al “cloud hadoopmapreduce for remote sensing image analysis”Journal of Emerging Trends in Computing andInformation Sciences, VOL. 3, NO. 4, April 2012.
- Abhipal Singh et al “File Transfer Using SecureSockets in Linux Environment”, Proceedings ofthe 4th National Conference; INDIACom-2010.
- Matthieu Bloch et al “Network Security for ClientServer Architecture Using Wiretap Codes”, IEEETRANSACTIONS ON INFORMATIONFORENSICS AND SECURITY, VOL. 3, NO. 3,SEPTEMBER 2008
- Xinyi Huang et al “Further Observations onSmartCard-Based Password-Authenticated KeyAgreement in Distributed Systems”, IEEETRANSACTIONS ON PARALLEL ANDDISTRIBUTED SYSTEMS, 2013.
- Bhaskar Prasad Rimal et al “A Taxonomy andsurvey of cloud computing system”, Fifthinternational joint Conference on INC,I MS, IDC,2009.
- Poulami Dutta1 et al “Data Hiding in Audio Signal:A Review” International Journal of DatabaseTheory and Application Vol. 2, No. 2, June 2009
- Elisa Bertino et al, “privacy-preserving digitalidentity management for cloud computing” IEEEcomputer society technical committee on dataEngineering, 2009.
- S.Fischer-Hubner and H. Hebdon, “PRIMEprivacy and identity management for Europe”August 2010.
- kitu File whilte et al “symmetric vs Asymmetricencryption” 2010.
- Kumar Gunjan et al,international journal ofEngineering Research and Technology(IJERT),ISSN 2278-0181 vol1 issue4 june 2012.
- Make D.Ryan et al “Cloud computingSecurity:The Scientific journal of systems andSoftware challenge, and a survey ofsolutions”,Elsevier,2013.
- Jittin et al . ”An analysis on privacy preserving incloud computing”, International journal ofcomputer trends and Technology(IJCTT),volume4 ,issue 6 june 2013.
- Man Qi* et al, “Social Networking searching andprivacy issues” information security technicalreport,Elsevier 2011