Submit Search
Upload
Privacy Preserving Data Analytics using Cryptographic Technique for Large Data Sets
•
0 likes
•
27 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i10/IRJET-V4I10255.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
Review on Big Data Security in Hadoop
Review on Big Data Security in Hadoop
IRJET Journal
Improved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providers
IRJET Journal
A Review Paper on Big Data and Hadoop for Data Science
A Review Paper on Big Data and Hadoop for Data Science
ijtsrd
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environments
at MicroFocus Italy ❖✔
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
IJARCCE_49
IJARCCE_49
Mr.Sameer Kumar Das
Whitepaper: Big Data - Infrastructure Considerations - Happiest Minds
Whitepaper: Big Data - Infrastructure Considerations - Happiest Minds
Happiest Minds Technologies
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET Journal
Recommended
Review on Big Data Security in Hadoop
Review on Big Data Security in Hadoop
IRJET Journal
Improved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providers
IRJET Journal
A Review Paper on Big Data and Hadoop for Data Science
A Review Paper on Big Data and Hadoop for Data Science
ijtsrd
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environments
at MicroFocus Italy ❖✔
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
IJARCCE_49
IJARCCE_49
Mr.Sameer Kumar Das
Whitepaper: Big Data - Infrastructure Considerations - Happiest Minds
Whitepaper: Big Data - Infrastructure Considerations - Happiest Minds
Happiest Minds Technologies
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET Journal
20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druva
Druva
iaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storage
Iaetsd Iaetsd
Big Data (security Issue)
Big Data (security Issue)
Export Promotion Bureau
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
IRJET Journal
E018142329
E018142329
IOSR Journals
paper
paper
Gustavo El Khoury
BDaas- BigData as a service
BDaas- BigData as a service
Agile Testing Alliance
Postponed Optimized Report Recovery under Lt Based Cloud Memory
Postponed Optimized Report Recovery under Lt Based Cloud Memory
IJARIIT
Rob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoop
Ghassan Al-Yafie
IRJET- Cross User Bigdata Deduplication
IRJET- Cross User Bigdata Deduplication
IRJET Journal
Hadoop,Big Data Analytics and More
Hadoop,Big Data Analytics and More
Trendwise Analytics
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storage
IAEME Publication
Five steps to secure big data
Five steps to secure big data
Ulf Mattsson
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET Journal
Bigdata
Bigdata
NithiDazz
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET Journal
Big data introduction, Hadoop in details
Big data introduction, Hadoop in details
Mahmoud Yassin
Big Data: an introduction
Big Data: an introduction
Bart Vandewoestyne
Big Data Technology Stack : Nutshell
Big Data Technology Stack : Nutshell
Khalid Imran
Database Archiving - Managing Data for Long Retention Periods
Database Archiving - Managing Data for Long Retention Periods
Craig Mullins
IRJET- Secured Hadoop Environment
IRJET- Secured Hadoop Environment
IRJET Journal
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
ijp2p
More Related Content
What's hot
20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druva
Druva
iaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storage
Iaetsd Iaetsd
Big Data (security Issue)
Big Data (security Issue)
Export Promotion Bureau
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
IRJET Journal
E018142329
E018142329
IOSR Journals
paper
paper
Gustavo El Khoury
BDaas- BigData as a service
BDaas- BigData as a service
Agile Testing Alliance
Postponed Optimized Report Recovery under Lt Based Cloud Memory
Postponed Optimized Report Recovery under Lt Based Cloud Memory
IJARIIT
Rob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoop
Ghassan Al-Yafie
IRJET- Cross User Bigdata Deduplication
IRJET- Cross User Bigdata Deduplication
IRJET Journal
Hadoop,Big Data Analytics and More
Hadoop,Big Data Analytics and More
Trendwise Analytics
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storage
IAEME Publication
Five steps to secure big data
Five steps to secure big data
Ulf Mattsson
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET Journal
Bigdata
Bigdata
NithiDazz
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET Journal
Big data introduction, Hadoop in details
Big data introduction, Hadoop in details
Mahmoud Yassin
Big Data: an introduction
Big Data: an introduction
Bart Vandewoestyne
Big Data Technology Stack : Nutshell
Big Data Technology Stack : Nutshell
Khalid Imran
Database Archiving - Managing Data for Long Retention Periods
Database Archiving - Managing Data for Long Retention Periods
Craig Mullins
What's hot
(20)
20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druva
iaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storage
Big Data (security Issue)
Big Data (security Issue)
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
E018142329
E018142329
paper
paper
BDaas- BigData as a service
BDaas- BigData as a service
Postponed Optimized Report Recovery under Lt Based Cloud Memory
Postponed Optimized Report Recovery under Lt Based Cloud Memory
Rob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoop
IRJET- Cross User Bigdata Deduplication
IRJET- Cross User Bigdata Deduplication
Hadoop,Big Data Analytics and More
Hadoop,Big Data Analytics and More
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storage
Five steps to secure big data
Five steps to secure big data
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
Bigdata
Bigdata
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
Big data introduction, Hadoop in details
Big data introduction, Hadoop in details
Big Data: an introduction
Big Data: an introduction
Big Data Technology Stack : Nutshell
Big Data Technology Stack : Nutshell
Database Archiving - Managing Data for Long Retention Periods
Database Archiving - Managing Data for Long Retention Periods
Similar to Privacy Preserving Data Analytics using Cryptographic Technique for Large Data Sets
IRJET- Secured Hadoop Environment
IRJET- Secured Hadoop Environment
IRJET Journal
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
ijp2p
Big Data with Hadoop – For Data Management, Processing and Storing
Big Data with Hadoop – For Data Management, Processing and Storing
IRJET Journal
Performance Improvement of Heterogeneous Hadoop Cluster using Ranking Algorithm
Performance Improvement of Heterogeneous Hadoop Cluster using Ranking Algorithm
IRJET Journal
Big Data Processing with Hadoop : A Review
Big Data Processing with Hadoop : A Review
IRJET Journal
Voltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in Hadoop
HPE Security - Data Security
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environments
at MicroFocus Italy ❖✔
Big Data Testing Using Hadoop Platform
Big Data Testing Using Hadoop Platform
IRJET Journal
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Pushpa
DOCUMENT SELECTION USING MAPREDUCE
DOCUMENT SELECTION USING MAPREDUCE
ijsptm
The past, present, and future of big data security
The past, present, and future of big data security
Ulf Mattsson
IRJET- A Study of Comparatively Analysis for HDFS and Google File System ...
IRJET- A Study of Comparatively Analysis for HDFS and Google File System ...
IRJET Journal
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET Journal
Big Data-Survey
Big Data-Survey
ijeei-iaes
Big data Hadoop presentation
Big data Hadoop presentation
Shivanee garg
BIG DATA
BIG DATA
Shashank Shetty
Security issues associated with big data in cloud
Security issues associated with big data in cloud
sornalathaNatarajan
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
scoopnewsgroup
A Comprehensive Study on Big Data Applications and Challenges
A Comprehensive Study on Big Data Applications and Challenges
ijcisjournal
Big data security and privacy issues in the
Big data security and privacy issues in the
IJNSA Journal
Similar to Privacy Preserving Data Analytics using Cryptographic Technique for Large Data Sets
(20)
IRJET- Secured Hadoop Environment
IRJET- Secured Hadoop Environment
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
Big Data with Hadoop – For Data Management, Processing and Storing
Big Data with Hadoop – For Data Management, Processing and Storing
Performance Improvement of Heterogeneous Hadoop Cluster using Ranking Algorithm
Performance Improvement of Heterogeneous Hadoop Cluster using Ranking Algorithm
Big Data Processing with Hadoop : A Review
Big Data Processing with Hadoop : A Review
Voltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in Hadoop
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environments
Big Data Testing Using Hadoop Platform
Big Data Testing Using Hadoop Platform
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
DOCUMENT SELECTION USING MAPREDUCE
DOCUMENT SELECTION USING MAPREDUCE
The past, present, and future of big data security
The past, present, and future of big data security
IRJET- A Study of Comparatively Analysis for HDFS and Google File System ...
IRJET- A Study of Comparatively Analysis for HDFS and Google File System ...
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
Big Data-Survey
Big Data-Survey
Big data Hadoop presentation
Big data Hadoop presentation
BIG DATA
BIG DATA
Security issues associated with big data in cloud
Security issues associated with big data in cloud
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
A Comprehensive Study on Big Data Applications and Challenges
A Comprehensive Study on Big Data Applications and Challenges
Big data security and privacy issues in the
Big data security and privacy issues in the
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
microprocessor 8085 and its interfacing
microprocessor 8085 and its interfacing
jaychoudhary37
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
vipinkmenon1
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Recently uploaded
(20)
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
microprocessor 8085 and its interfacing
microprocessor 8085 and its interfacing
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Privacy Preserving Data Analytics using Cryptographic Technique for Large Data Sets
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1394 Privacy Preserving Data Analytics using Cryptographic Technique for Large Data Sets Yashi Gupta1, Dr. Vineet Richhariya2 1M.Tech. Scholar, Dept. of Computer Science & Engineering,Lakshmi Narain College Of Technology, Bhopal, India. 2Professor & Head,Dept.of Computer Science & Engineering,Lakshmi Narain College Of Technology, Bhopal, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Hadoop is a distributed computing framework which is widely used. It’s file system is HDFS (Hadoop Distributed File System). In this system datanodesbynatureis homogeneous. For the improvement of security in Hadoop system, some awareness and attention has to be placed. For data allocation a secure HDFS is required, which can be done by encrypting the data and then storing that data in HDFS. This will improve the storage security in Hadoop. Its usage is increasing day by day and its adoption is widespread. HDFS stores large data files, a single server in HDFS manages all the files stored in Hadoop distributed file system. As we know that everywhere security is the major concern so as to control loss of data at the time of storing in HDFS, some technique is required. And in our work we are workingonthattechniqueto securing the stored data in HDFS. In this paper, encryption techniques is used to encrypt data so that loss of data can be controlled. Data is encrypted before storing it in Hadoop distributed file system. Key Words : HDFS, Security, Encryption technique, Big Data, Data Analytics, Hadoop 1. INTRODUCTION Big data is a blanket term for the non-traditional strategies and technologies needed to gather, organize, process, and gather insights from large datasets. While the problem of working with data that exceeds the computing power or storage of a single computer is not new, the pervasiveness, scale, and value of this type of computing has greatly expanded in recent years. 1.1 Background Security is one of the major concerns in information technology industry. It becomes more crucial very it comes at end of data. Nowadays, data has become the centric point of all industry and all are moving around data only. Subsequently, trend of IT is also changed and they focused more on data value rather than services. Morally, large data volume is generated with different variety and highvelocity. Due to public and open behaviorssecurityhasbecomeoneof the major concerns in hadoop framework system. Hadoopis becoming so popular because of its big data storage.Hadoop system is designed without any security so security is the major concern in hadoop. Thus, in this paper we will be discussing about the core problem whichissecurityinHDFS. Hadoop ecosystem is capable of managing, handling and processing enormous amountofdata.Thisisthepopularand widely used technology. 1.2 Overview As it works as the storage of large data so security is becoming the major weakness in hadoop development. Hadoop has file system to store data, Hadoop Distributed File System(HDFS) and MapReduce are the file system of hadoop in which it stores large data. With the increase in popularity of hadoop, there is also a demand in trend for more and more security. Without any security model the sensitive data stored in hadoop is not secure. Also a new trend is rising for the encryption of stored data to prevent the confidentiality of data. Over the period of past few years an attempt have been made to achieve some level ofsecurity in Hadoop by using data encryption technique. In this paper all the attempts have been done to describe and prevent the data security in HDFS. 2. HADOOP Hadoop is continuously updating and its latest versions Hadoop 2 emerges with the improvement in scheduling and resource management with introducing YARN.YARN stands for Yet Another Resource Negotiator. It is responsible for Resource Manager and Node Manager, resource manager manages the resources and also utilize them, deploy them and node manager manages data node and also report the status of data node to resource manager. Apache Hadoop is also an open-source framework, used for processing large datasets and processing of distributed storage by using MapReduce programming. It consist of thousands of system and thousands of hardware, whicharehelpful inconditionof failure or inoperative system. It is designed by keeping in mind that hardware failure are common and this failure should be handled automatically by framework.Hadoopasa software framework, composed of different components including Hadoop Distributed File System ( HDFS), MapReduce Programming Model and Hadoop Kernel. Hadoop divides the files into blocks and distributes them among nodes, it works as storage. Whereas, MapReduce Programming process the application stored in HDFS.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1395 Figure 1. Hadoop Ecosystem 2.1 HADOOP DISTRIBUTED FILE SYSTEM Hadoop Distributed File System is a file system for Hadoop framework, it stores large files across cluster nodes. It replicates the data across multiple machinesfor thepurpose of security and availability and therefore does not depends on RAID (Redundant Array of IndependentDisk)storage but RAID configuration are used still to increase the performance of input output. Data is replicated and stored on three nodes with the default value of 3. HDFS is a portable and scalable file system it splits file into large blocks and distributes them to store on cluster node. Its replication factor replicates those file accordingly, this is the function of HDFS. But with all these features of HDFS, security is also essential. As HDFS manages complex application which is a challenging task, the huge data which is stored in HDFS are at risk because of missing of encryption at storage level. Figure 2. Working of HDFS 2.2 PROBLEM DOMAIN More and more use of internet and internet based applications and services, increases the demand of communication, and business field increases the demand of stock exchange. This emerging solution increases the user expectations and also the data. The issue arises in our work is the big data which is of large volume, variety and velocity. The data which is generated in a large amount is called Big data. Big data cannot be classified through measurement or quantity or cannot be observed for fixing. 2.3 SECURITY ISSUES IN HADOOP The task of securing the whole data center is very essential and also achieving features like scalability, flexibility, performance and security challenges. Following are the security issues specified below: 1. Data access: Authentication and authorization plays an important role in security and limiting user accesscontrol of sensitive data. 2. Protection of data at rest: encryption is the protection of data at rest, which protects the access of data from outside. Encryption limits the replication of data. 3. Client interaction: Direct communication of client with data nodes and resource managers. Through it client can create integrity of data by sending malicious links or data. Figure 3. Security issues in Hadoop
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1396 3. LITERATURE REVIEW Worked on Many technologies have been described and provided a better resultregardingthesecurityissue.Withthe enhancement in technology the security should also be increased. Seon Young Park et al. In[1] with the increase in Hadoop system, security of stored sensitive data is also essential. To protect such data Hadoop file system requires the method of secure Hadoop. Zerfos, Petros et al. In[2] described about some data protection techniques like Encryption. Throughout the life cycle of data its end-to-end security is required. HDFS security requirement and data protection can be achieved using some encryption techniques in Hadoop system. Cheng, Zhonghan et al. In[3] explained that HDFS replicates the file and store that replicated file across cluster in multiple machine for the availability and durability. It is popular because of its scalable and distributed framework which allows big data applications to run. Shehzad Danish et al. In [4] abstracted about the initial phase of HDFS. When designing HDFS its initial phase i.e. storage efficiency and reliability is considered and data security was not considered. Due to improper data security data loss can be possible. Figure 4. future of Hadoop security Transparent encryption in HDFS [5] author introduced about Transparent Encryption for Hadoop, which is an effort for data protection. Hadoop is an open source framework for cloud storage. It is a trending technology designed without security model fordata storage, as it is a tool for storinglarge amount of data to increase the security of sensitive data and confidential information. Figure 5. HDFS transparent encryption Cloudera.com[6]Clouderawhichisacommercialoffering. “Security for Hadoop” is as essential and a important step in the originality of Hadoop and effort for data protection. Owen O’Malley et al. In[7] introduces about the permission model implemented inHDFS,thismodelisforthe files and directories. Author finds that if Kerberos is implemented over SSL then HDFS security can be enhanced by authentication and access control. Figure 6 Security In Hadoop Using Kerberos
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1397 5. PROPOSED WORK Relevant Algorithm Used: The relevant algorithm used in our proposed work are : 1. Apriori Algorithm 2. RC6 Algorithm 5.1 Apriori Algorithm In 1994, Agrawal andSrikantproposedApriorialgorithm. Apriori algorithm is an algorithmusedfortheminingofitems that are used frequently and also for association rule learning. In a database every single item that appears frequently can extend as much larger till it appears in sets of items sufficiently. Association rule can be defined using Apriori algorithm because of frequency of appearingofitems in datasets. [10] Apriori Algorithm : It mainly operates for the frequently appearing items in a datasets and their collection. 1. Bottom-up approach is used in it. 2. It determines frequent sets of items. 3. Termination of algorithm can be done when no extension was found 4. Items can be said frequent if it appears at least 3 transactions in database. Working steps of Apriori Algorithm : 1. Counts the appearance of items, occurrence of each items separately called Support (Value should be at least 3). 2. Generation of pairsofitemsappearingfrequentlyinlist form. Minimum support should be 3 of frequent item. [11] 5.2 RC6 Encryption The RC6 stands for Rivest Cipher 6 which is a symmetric key block cipher. RC6 supports the key size up to 2040 bits and block size of 128 bits. It supports wide range of word length. RC6 is similar to RC5 and designed for the variety of word length. No key separation is required, it is flexible to all key size. It is derived from RC5.RC6 performs many operations like addition, subtraction, exclusive-or, multiplication, rotation to left-right. RC6 performs encryption and decryption both. Figure 7. RC6 Block Diagram RC6 provides with the advantage of security and high performance, fast and flexible and supports wide variety of word length. Through the encryption flow diagram in RC6 algorithm we will be discussing about the technique of RC6 cryptography. Figure 8. Flow chart for encryption in RC6
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1398 6. RESULT ANALYSIS The experimental result describes the implementation of algorithm used, using file size and buffer size, and is measured in speed (Mb/s). the files and buffer are of different sizes, represented in below table. Rows represents file size. Columns represents buffer size. Speed is calculated in Mb/s. Table 1. Showing encryption of several file sizes Below shows the graph representation of above table. There are 6 files and buffer size. Figure 9. Graph representing speed in Mb/s of various files and buffer size 7. CONCLUSIONS The complete observation concluded that the created environment for storing data can be secured using encryption technique. Security is the major concern, and to achieve security encryption is done using RC6. In the complete work we have discussed about security which can be implemented using encryptiontechniquewhereplain text is encrypted so that the stored data is in the form of encrypted data. In the proposed system, RC6 encryption algorithm and Apriori algorithm are used. Apriori algorithm is used for the mining of items that are used frequently and also for association rule learning. RC6 algorithm is used for encrypting plain text so that its confidentiality cannot be stolen and misused. Apriori algorithm calculates confidence of support. REFERENCES [1] Seonyoung Park and Youngseok Lee, “Secure Hadoop with Encrypted HDFS”,Springer-Verlag Berlin Heidelberg in 2013. [2] Zerfos, Petros, Hangu Yeo, Brent D. Paulovicks, and Vadim Sheinin. "SDFS: Secure distributed filesystemfor data-at-rest security for Hadoop-as-a-service." In Big Data (Big Data), 2015 IEEE International Conferenceon, pp. 1262-1271. IEEE, 2015. [3] Cheng, Zhonghan, Diming Zhang, Hao Huang, and Zhenjiang Qian. "Design and Implementation of Data Encryptionin Cloud based on HDFS." International Workshop on Cloud Computing and Information Security (CCIS 2013), pp. 274-277. 2013. [4] Shehzad, Danish, Zakir Khan, Hasan Dag, and Zeki Bozkus. "A Novel Hybrid Encryption Scheme to Ensure Hadoop Based Cloud Data Security." International Journal of Computer Science and Information Security VOL 14, 2016 PP 480. [5] Apache Hadoop "Transparent Encryption in HDFS." 2.7.2–.Accessed July 26, 2016. https://hadoop.apache.org/docs/r2.7.2/hadoop- project-dist/hadoop hdfs/TransparentEncryption.html. [6] "HDFS Data At Rest Encryption". 2016. Cloudera.Com. Accessed July 26, 2016. https://www.cloudera.com/documentation/enterprise/ 5-4 x/topics/cdh_sg_hdfs_encryption.html. [7] Owen O’Malley, KanZhang,SanjayRadia,RamMarti,and Christopher Harrell “Hadoop SecurityDesign”,Technical Report, 2009.10 1 KB 100K B 500K B 1MB 64MB 128MB 825 KB 39 Mb/s 91 Mb/s 117 Mb/s 91 Mb/s 117 Mb/s 137 Mb/s 4.3 MB 87 Mb/s 159 Mb/s 148 Mb/s 130 Mb/s 89 Mb/s 153 Mb/s 60.5 MB 105 Mb/s 155 Mb/s 153 Mb/s 150 Mb/s 157 Mb/s 155 Mb/s 381 MB 125 Mb/s 157 Mb/s 133 Mb/s 159 Mb/s 152 Mb/s 155 Mb/s 1.00G B 128 Mb/s 159 Mb/s 157 Mb/s 110 Mb/s 90 Mb/s 91 Mb/s 2.5 GB 120 Mb/s 141 Mb/s 137 Mb/s 142 Mb/s 143 Mb/s 128 Mb/s
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1399 [8] S. Ghemawat, H. Gobioff, and S.-T.Leung,``TheGoogle_le system,'' in Proc. 19th ACM Symp. Oper. Syst. Principles (SOSP), 2003, pp. 29_43. [9] S. Ghemawat and J. Dean, ``MapReduce: Simpli_ed data processing on large clusters,'' ACM Commun. Mag., vol. 51, no. 1, pp. 107_113,Jan. 2008. [10] D. Borthakur, ``The Hadoop distributed _le system: Architecture and design,'' Hadoop Project Website, vol. 11, p. 21, Aug. 2007 [11] T. White, Hadoop: The De_nitive Guide. Farnham, U.K.:O'Reilly, 2012.
Download now