SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1394
Privacy Preserving Data Analytics using Cryptographic Technique for
Large Data Sets
Yashi Gupta1, Dr. Vineet Richhariya2
1M.Tech. Scholar, Dept. of Computer Science & Engineering,Lakshmi Narain College Of Technology, Bhopal, India.
2Professor & Head,Dept.of Computer Science & Engineering,Lakshmi Narain College Of Technology, Bhopal, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Hadoop is a distributed computing framework
which is widely used. It’s file system is HDFS (Hadoop
Distributed File System). In this system datanodesbynatureis
homogeneous. For the improvement of security in Hadoop
system, some awareness and attention has to be placed. For
data allocation a secure HDFS is required, which can be done
by encrypting the data and then storing that data in HDFS.
This will improve the storage security in Hadoop. Its usage is
increasing day by day and its adoption is widespread. HDFS
stores large data files, a single server in HDFS manages all the
files stored in Hadoop distributed file system. As we know that
everywhere security is the major concern so as to control loss
of data at the time of storing in HDFS, some technique is
required. And in our work we are workingonthattechniqueto
securing the stored data in HDFS.
In this paper, encryption techniques is used to encrypt data so
that loss of data can be controlled. Data is encrypted before
storing it in Hadoop distributed file system.
Key Words : HDFS, Security, Encryption technique, Big
Data, Data Analytics, Hadoop
1. INTRODUCTION
Big data is a blanket term for the non-traditional strategies
and technologies needed to gather, organize, process, and
gather insights from large datasets. While the problem of
working with data that exceeds the computing power or
storage of a single computer is not new, the pervasiveness,
scale, and value of this type of computing has greatly
expanded in recent years.
1.1 Background
Security is one of the major concerns in information
technology industry. It becomes more crucial very it comes
at end of data. Nowadays, data has become the centric point
of all industry and all are moving around data only.
Subsequently, trend of IT is also changed and they focused
more on data value rather than services. Morally, large data
volume is generated with different variety and highvelocity.
Due to public and open behaviorssecurityhasbecomeoneof
the major concerns in hadoop framework system. Hadoopis
becoming so popular because of its big data storage.Hadoop
system is designed without any security so security is the
major concern in hadoop. Thus, in this paper we will be
discussing about the core problem whichissecurityinHDFS.
Hadoop ecosystem is capable of managing, handling and
processing enormous amountofdata.Thisisthepopularand
widely used technology.
1.2 Overview
As it works as the storage of large data so security is
becoming the major weakness in hadoop development.
Hadoop has file system to store data, Hadoop Distributed
File System(HDFS) and MapReduce are the file system of
hadoop in which it stores large data. With the increase in
popularity of hadoop, there is also a demand in trend for
more and more security. Without any security model the
sensitive data stored in hadoop is not secure. Also a new
trend is rising for the encryption of stored data to prevent
the confidentiality of data. Over the period of past few years
an attempt have been made to achieve some level ofsecurity
in Hadoop by using data encryption technique. In this paper
all the attempts have been done to describe and prevent the
data security in HDFS.
2. HADOOP
Hadoop is continuously updating and its latest versions
Hadoop 2 emerges with the improvement in scheduling and
resource management with introducing YARN.YARN stands
for Yet Another Resource Negotiator. It is responsible for
Resource Manager and Node Manager, resource manager
manages the resources and also utilize them, deploy them
and node manager manages data node and also report the
status of data node to resource manager. Apache Hadoop is
also an open-source framework, used for processing large
datasets and processing of distributed storage by using
MapReduce programming. It consist of thousands of system
and thousands of hardware, whicharehelpful inconditionof
failure or inoperative system. It is designed by keeping in
mind that hardware failure are common and this failure
should be handled automatically by framework.Hadoopasa
software framework, composed of different components
including Hadoop Distributed File System ( HDFS),
MapReduce Programming Model and Hadoop Kernel.
Hadoop divides the files into blocks and distributes them
among nodes, it works as storage. Whereas, MapReduce
Programming process the application stored in HDFS.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1395
Figure 1. Hadoop Ecosystem
2.1 HADOOP DISTRIBUTED FILE SYSTEM
Hadoop Distributed File System is a file system for Hadoop
framework, it stores large files across cluster nodes. It
replicates the data across multiple machinesfor thepurpose
of security and availability and therefore does not depends
on RAID (Redundant Array of IndependentDisk)storage but
RAID configuration are used still to increase the
performance of input output. Data is replicated and stored
on three nodes with the default value of 3.
HDFS is a portable and scalable file system it splits file into
large blocks and distributes them to store on cluster node.
Its replication factor replicates those file accordingly, this is
the function of HDFS. But with all these features of HDFS,
security is also essential.
As HDFS manages complex application which is a
challenging task, the huge data which is stored in HDFS are
at risk because of missing of encryption at storage level.
Figure 2. Working of HDFS
2.2 PROBLEM DOMAIN
More and more use of internet and internet based
applications and services, increases the demand of
communication, and business field increases the demand of
stock exchange. This emerging solution increases the user
expectations and also the data. The issue arises in our work
is the big data which is of large volume, variety and velocity.
The data which is generated in a large amount is called Big
data. Big data cannot be classified through measurement or
quantity or cannot be observed for fixing.
2.3 SECURITY ISSUES IN HADOOP
The task of securing the whole data center is very essential
and also achieving features like scalability, flexibility,
performance and security challenges. Following are the
security issues specified below:
1. Data access: Authentication and authorization plays an
important role in security and limiting user accesscontrol of
sensitive data.
2. Protection of data at rest: encryption is the protection of
data at rest, which protects the access of data from outside.
Encryption limits the replication of data.
3. Client interaction: Direct communication of client with
data nodes and resource managers. Through it client can
create integrity of data by sending malicious links or data.
Figure 3. Security issues in Hadoop
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1396
3. LITERATURE REVIEW
Worked on Many technologies have been described and
provided a better resultregardingthesecurityissue.Withthe
enhancement in technology the security should also be
increased.
Seon Young Park et al. In[1] with the increase in Hadoop
system, security of stored sensitive data is also essential. To
protect such data Hadoop file system requires the method of
secure Hadoop.
Zerfos, Petros et al. In[2] described about some data
protection techniques like Encryption. Throughout the life
cycle of data its end-to-end security is required. HDFS
security requirement and data protection can be achieved
using some encryption techniques in Hadoop system.
Cheng, Zhonghan et al. In[3] explained that HDFS
replicates the file and store that replicated file across cluster
in multiple machine for the availability and durability. It is
popular because of its scalable and distributed framework
which allows big data applications to run.
Shehzad Danish et al. In [4] abstracted about the initial
phase of HDFS. When designing HDFS its initial phase i.e.
storage efficiency and reliability is considered and data
security was not considered. Due to improper data security
data loss can be possible.
Figure 4. future of Hadoop security
Transparent encryption in HDFS [5] author introduced
about Transparent Encryption for Hadoop, which is an effort
for data protection. Hadoop is an open source framework for
cloud storage. It is a trending technology designed without
security model fordata storage, as it is a tool for storinglarge
amount of data to increase the security of sensitive data and
confidential information.
Figure 5. HDFS transparent encryption
Cloudera.com[6]Clouderawhichisacommercialoffering.
“Security for Hadoop” is as essential and a important step in
the originality of Hadoop and effort for data protection.
Owen O’Malley et al. In[7] introduces about the
permission model implemented inHDFS,thismodelisforthe
files and directories. Author finds that if Kerberos is
implemented over SSL then HDFS security can be enhanced
by authentication and access control.
Figure 6 Security In Hadoop Using Kerberos
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1397
5. PROPOSED WORK
Relevant Algorithm Used:
The relevant algorithm used in our proposed work are :
1. Apriori Algorithm
2. RC6 Algorithm
5.1 Apriori Algorithm
In 1994, Agrawal andSrikantproposedApriorialgorithm.
Apriori algorithm is an algorithmusedfortheminingofitems
that are used frequently and also for association rule
learning. In a database every single item that appears
frequently can extend as much larger till it appears in sets of
items sufficiently. Association rule can be defined using
Apriori algorithm because of frequency of appearingofitems
in datasets. [10]
Apriori Algorithm :
It mainly operates for the frequently appearing items in a
datasets and their collection.
1. Bottom-up approach is used in it.
2. It determines frequent sets of items.
3. Termination of algorithm can be done when no
extension was found
4. Items can be said frequent if it appears at least 3
transactions in database.
Working steps of Apriori Algorithm :
1. Counts the appearance of items, occurrence of each
items separately called Support (Value should be at least 3).
2. Generation of pairsofitemsappearingfrequentlyinlist
form. Minimum support should be 3 of frequent item. [11]
5.2 RC6 Encryption
The RC6 stands for Rivest Cipher 6 which is a symmetric
key block cipher. RC6 supports the key size up to 2040 bits
and block size of 128 bits. It supports wide range of word
length. RC6 is similar to RC5 and designed for the variety of
word length. No key separation is required, it is flexible to all
key size. It is derived from RC5.RC6 performs many
operations like addition, subtraction, exclusive-or,
multiplication, rotation to left-right.
RC6 performs encryption and decryption both.
Figure 7. RC6 Block Diagram
RC6 provides with the advantage of security and high
performance, fast and flexible and supports wide variety of
word length.
Through the encryption flow diagram in RC6 algorithm
we will be discussing about the technique of RC6
cryptography.
Figure 8. Flow chart for encryption in RC6
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1398
6. RESULT ANALYSIS
The experimental result describes the implementation of
algorithm used, using file size and buffer size, and is
measured in speed (Mb/s). the files and buffer are of
different sizes, represented in below table.
Rows represents file size.
Columns represents buffer size.
Speed is calculated in Mb/s.
Table 1. Showing encryption of several file sizes
Below shows the graph representation of above table.
There are 6 files and buffer size.
Figure 9. Graph representing speed in Mb/s of various
files and buffer size
7. CONCLUSIONS
The complete observation concluded that the created
environment for storing data can be secured using
encryption technique. Security is the major concern, and to
achieve security encryption is done using RC6. In the
complete work we have discussed about security which can
be implemented using encryptiontechniquewhereplain text
is encrypted so that the stored data is in the form of
encrypted data.
In the proposed system, RC6 encryption
algorithm and Apriori algorithm are used. Apriori algorithm
is used for the mining of items that are used frequently and
also for association rule learning. RC6 algorithm is used for
encrypting plain text so that its confidentiality cannot be
stolen and misused. Apriori algorithm calculates confidence
of support.
REFERENCES
[1] Seonyoung Park and Youngseok Lee, “Secure Hadoop
with Encrypted HDFS”,Springer-Verlag Berlin
Heidelberg in 2013.
[2] Zerfos, Petros, Hangu Yeo, Brent D. Paulovicks, and
Vadim Sheinin. "SDFS: Secure distributed filesystemfor
data-at-rest security for Hadoop-as-a-service." In Big
Data (Big Data), 2015 IEEE International Conferenceon,
pp. 1262-1271. IEEE, 2015.
[3] Cheng, Zhonghan, Diming Zhang, Hao Huang, and
Zhenjiang Qian. "Design and Implementation of Data
Encryptionin Cloud based on HDFS." International
Workshop on Cloud Computing and Information
Security (CCIS 2013), pp. 274-277. 2013.
[4] Shehzad, Danish, Zakir Khan, Hasan Dag, and Zeki
Bozkus. "A Novel Hybrid Encryption Scheme to Ensure
Hadoop Based Cloud Data Security." International
Journal of Computer Science and Information Security
VOL 14, 2016 PP 480.
[5] Apache Hadoop "Transparent Encryption in HDFS."
2.7.2–.Accessed July 26, 2016.
https://hadoop.apache.org/docs/r2.7.2/hadoop-
project-dist/hadoop hdfs/TransparentEncryption.html.
[6] "HDFS Data At Rest Encryption". 2016. Cloudera.Com.
Accessed July 26, 2016.
https://www.cloudera.com/documentation/enterprise/
5-4 x/topics/cdh_sg_hdfs_encryption.html.
[7] Owen O’Malley, KanZhang,SanjayRadia,RamMarti,and
Christopher Harrell “Hadoop SecurityDesign”,Technical
Report, 2009.10
1 KB 100K
B
500K
B
1MB 64MB 128MB
825
KB
39
Mb/s
91
Mb/s
117
Mb/s
91
Mb/s
117
Mb/s
137
Mb/s
4.3
MB
87
Mb/s
159
Mb/s
148
Mb/s
130
Mb/s
89
Mb/s
153
Mb/s
60.5
MB
105
Mb/s
155
Mb/s
153
Mb/s
150
Mb/s
157
Mb/s
155
Mb/s
381
MB
125
Mb/s
157
Mb/s
133
Mb/s
159
Mb/s
152
Mb/s
155
Mb/s
1.00G
B
128
Mb/s
159
Mb/s
157
Mb/s
110
Mb/s
90
Mb/s
91
Mb/s
2.5
GB
120
Mb/s
141
Mb/s
137
Mb/s
142
Mb/s
143
Mb/s
128
Mb/s
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1399
[8] S. Ghemawat, H. Gobioff, and S.-T.Leung,``TheGoogle_le
system,'' in Proc. 19th ACM Symp. Oper. Syst. Principles
(SOSP), 2003, pp. 29_43.
[9] S. Ghemawat and J. Dean, ``MapReduce: Simpli_ed data
processing on large clusters,'' ACM Commun. Mag., vol.
51, no. 1, pp. 107_113,Jan. 2008.
[10] D. Borthakur, ``The Hadoop distributed _le system:
Architecture and design,'' Hadoop Project Website,
vol. 11, p. 21, Aug. 2007
[11] T. White, Hadoop: The De_nitive Guide. Farnham,
U.K.:O'Reilly, 2012.

More Related Content

What's hot

20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druva20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druvaDruva
 
iaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storageiaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storageIaetsd Iaetsd
 
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
A Survey:  Enhanced Block Level Message Locked Encryption for data DeduplicationA Survey:  Enhanced Block Level Message Locked Encryption for data Deduplication
A Survey: Enhanced Block Level Message Locked Encryption for data DeduplicationIRJET Journal
 
Postponed Optimized Report Recovery under Lt Based Cloud Memory
Postponed Optimized Report Recovery under Lt Based Cloud MemoryPostponed Optimized Report Recovery under Lt Based Cloud Memory
Postponed Optimized Report Recovery under Lt Based Cloud MemoryIJARIIT
 
Rob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoopRob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoopGhassan Al-Yafie
 
IRJET- Cross User Bigdata Deduplication
IRJET-  	  Cross User Bigdata DeduplicationIRJET-  	  Cross User Bigdata Deduplication
IRJET- Cross User Bigdata DeduplicationIRJET Journal
 
Hadoop,Big Data Analytics and More
Hadoop,Big Data Analytics and MoreHadoop,Big Data Analytics and More
Hadoop,Big Data Analytics and MoreTrendwise Analytics
 
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageData integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageIAEME Publication
 
Five steps to secure big data
Five steps to secure big dataFive steps to secure big data
Five steps to secure big dataUlf Mattsson
 
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for DetectingIRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for DetectingIRJET Journal
 
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET-  	  A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...IRJET-  	  A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...IRJET Journal
 
Big data introduction, Hadoop in details
Big data introduction, Hadoop in detailsBig data introduction, Hadoop in details
Big data introduction, Hadoop in detailsMahmoud Yassin
 
Big Data Technology Stack : Nutshell
Big Data Technology Stack : NutshellBig Data Technology Stack : Nutshell
Big Data Technology Stack : NutshellKhalid Imran
 
Database Archiving - Managing Data for Long Retention Periods
Database Archiving - Managing Data for Long Retention PeriodsDatabase Archiving - Managing Data for Long Retention Periods
Database Archiving - Managing Data for Long Retention PeriodsCraig Mullins
 

What's hot (20)

20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druva20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druva
 
iaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storageiaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storage
 
Big Data (security Issue)
Big Data (security Issue)Big Data (security Issue)
Big Data (security Issue)
 
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
A Survey:  Enhanced Block Level Message Locked Encryption for data DeduplicationA Survey:  Enhanced Block Level Message Locked Encryption for data Deduplication
A Survey: Enhanced Block Level Message Locked Encryption for data Deduplication
 
E018142329
E018142329E018142329
E018142329
 
paper
paperpaper
paper
 
BDaas- BigData as a service
BDaas- BigData as a service  BDaas- BigData as a service
BDaas- BigData as a service
 
Postponed Optimized Report Recovery under Lt Based Cloud Memory
Postponed Optimized Report Recovery under Lt Based Cloud MemoryPostponed Optimized Report Recovery under Lt Based Cloud Memory
Postponed Optimized Report Recovery under Lt Based Cloud Memory
 
Rob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoopRob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoop
 
IRJET- Cross User Bigdata Deduplication
IRJET-  	  Cross User Bigdata DeduplicationIRJET-  	  Cross User Bigdata Deduplication
IRJET- Cross User Bigdata Deduplication
 
Hadoop,Big Data Analytics and More
Hadoop,Big Data Analytics and MoreHadoop,Big Data Analytics and More
Hadoop,Big Data Analytics and More
 
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storageData integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storage
 
Five steps to secure big data
Five steps to secure big dataFive steps to secure big data
Five steps to secure big data
 
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for DetectingIRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
 
Bigdata
Bigdata Bigdata
Bigdata
 
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET-  	  A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...IRJET-  	  A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...
 
Big data introduction, Hadoop in details
Big data introduction, Hadoop in detailsBig data introduction, Hadoop in details
Big data introduction, Hadoop in details
 
Big Data: an introduction
Big Data: an introductionBig Data: an introduction
Big Data: an introduction
 
Big Data Technology Stack : Nutshell
Big Data Technology Stack : NutshellBig Data Technology Stack : Nutshell
Big Data Technology Stack : Nutshell
 
Database Archiving - Managing Data for Long Retention Periods
Database Archiving - Managing Data for Long Retention PeriodsDatabase Archiving - Managing Data for Long Retention Periods
Database Archiving - Managing Data for Long Retention Periods
 

Similar to Privacy Preserving Data Analytics using Cryptographic Technique for Large Data Sets

IRJET- Secured Hadoop Environment
IRJET- Secured Hadoop EnvironmentIRJET- Secured Hadoop Environment
IRJET- Secured Hadoop EnvironmentIRJET Journal
 
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAREAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAijp2p
 
Big Data with Hadoop – For Data Management, Processing and Storing
Big Data with Hadoop – For Data Management, Processing and StoringBig Data with Hadoop – For Data Management, Processing and Storing
Big Data with Hadoop – For Data Management, Processing and StoringIRJET Journal
 
Performance Improvement of Heterogeneous Hadoop Cluster using Ranking Algorithm
Performance Improvement of Heterogeneous Hadoop Cluster using Ranking AlgorithmPerformance Improvement of Heterogeneous Hadoop Cluster using Ranking Algorithm
Performance Improvement of Heterogeneous Hadoop Cluster using Ranking AlgorithmIRJET Journal
 
Big Data Processing with Hadoop : A Review
Big Data Processing with Hadoop : A ReviewBig Data Processing with Hadoop : A Review
Big Data Processing with Hadoop : A ReviewIRJET Journal
 
Voltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in HadoopVoltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in HadoopHPE Security - Data Security
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsat MicroFocus Italy ❖✔
 
Big Data Testing Using Hadoop Platform
Big Data Testing Using Hadoop PlatformBig Data Testing Using Hadoop Platform
Big Data Testing Using Hadoop PlatformIRJET Journal
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Pushpa
 
DOCUMENT SELECTION USING MAPREDUCE
DOCUMENT SELECTION USING MAPREDUCEDOCUMENT SELECTION USING MAPREDUCE
DOCUMENT SELECTION USING MAPREDUCEijsptm
 
The past, present, and future of big data security
The past, present, and future of big data securityThe past, present, and future of big data security
The past, present, and future of big data securityUlf Mattsson
 
IRJET- A Study of Comparatively Analysis for HDFS and Google File System ...
IRJET-  	  A Study of Comparatively Analysis for HDFS and Google File System ...IRJET-  	  A Study of Comparatively Analysis for HDFS and Google File System ...
IRJET- A Study of Comparatively Analysis for HDFS and Google File System ...IRJET Journal
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET Journal
 
Big Data-Survey
Big Data-SurveyBig Data-Survey
Big Data-Surveyijeei-iaes
 
Big data Hadoop presentation
Big data  Hadoop  presentation Big data  Hadoop  presentation
Big data Hadoop presentation Shivanee garg
 
Security issues associated with big data in cloud
Security issues associated  with big data in cloudSecurity issues associated  with big data in cloud
Security issues associated with big data in cloudsornalathaNatarajan
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. Dscoopnewsgroup
 
A Comprehensive Study on Big Data Applications and Challenges
A Comprehensive Study on Big Data Applications and ChallengesA Comprehensive Study on Big Data Applications and Challenges
A Comprehensive Study on Big Data Applications and Challengesijcisjournal
 
Big data security and privacy issues in the
Big data security and privacy issues in theBig data security and privacy issues in the
Big data security and privacy issues in theIJNSA Journal
 

Similar to Privacy Preserving Data Analytics using Cryptographic Technique for Large Data Sets (20)

IRJET- Secured Hadoop Environment
IRJET- Secured Hadoop EnvironmentIRJET- Secured Hadoop Environment
IRJET- Secured Hadoop Environment
 
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAREAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATA
 
Big Data with Hadoop – For Data Management, Processing and Storing
Big Data with Hadoop – For Data Management, Processing and StoringBig Data with Hadoop – For Data Management, Processing and Storing
Big Data with Hadoop – For Data Management, Processing and Storing
 
Performance Improvement of Heterogeneous Hadoop Cluster using Ranking Algorithm
Performance Improvement of Heterogeneous Hadoop Cluster using Ranking AlgorithmPerformance Improvement of Heterogeneous Hadoop Cluster using Ranking Algorithm
Performance Improvement of Heterogeneous Hadoop Cluster using Ranking Algorithm
 
Big Data Processing with Hadoop : A Review
Big Data Processing with Hadoop : A ReviewBig Data Processing with Hadoop : A Review
Big Data Processing with Hadoop : A Review
 
Voltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in HadoopVoltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in Hadoop
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environments
 
Big Data Testing Using Hadoop Platform
Big Data Testing Using Hadoop PlatformBig Data Testing Using Hadoop Platform
Big Data Testing Using Hadoop Platform
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
 
DOCUMENT SELECTION USING MAPREDUCE
DOCUMENT SELECTION USING MAPREDUCEDOCUMENT SELECTION USING MAPREDUCE
DOCUMENT SELECTION USING MAPREDUCE
 
The past, present, and future of big data security
The past, present, and future of big data securityThe past, present, and future of big data security
The past, present, and future of big data security
 
IRJET- A Study of Comparatively Analysis for HDFS and Google File System ...
IRJET-  	  A Study of Comparatively Analysis for HDFS and Google File System ...IRJET-  	  A Study of Comparatively Analysis for HDFS and Google File System ...
IRJET- A Study of Comparatively Analysis for HDFS and Google File System ...
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
 
Big Data-Survey
Big Data-SurveyBig Data-Survey
Big Data-Survey
 
Big data Hadoop presentation
Big data  Hadoop  presentation Big data  Hadoop  presentation
Big data Hadoop presentation
 
BIG DATA
BIG DATABIG DATA
BIG DATA
 
Security issues associated with big data in cloud
Security issues associated  with big data in cloudSecurity issues associated  with big data in cloud
Security issues associated with big data in cloud
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
 
A Comprehensive Study on Big Data Applications and Challenges
A Comprehensive Study on Big Data Applications and ChallengesA Comprehensive Study on Big Data Applications and Challenges
A Comprehensive Study on Big Data Applications and Challenges
 
Big data security and privacy issues in the
Big data security and privacy issues in theBig data security and privacy issues in the
Big data security and privacy issues in the
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 

Privacy Preserving Data Analytics using Cryptographic Technique for Large Data Sets

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1394 Privacy Preserving Data Analytics using Cryptographic Technique for Large Data Sets Yashi Gupta1, Dr. Vineet Richhariya2 1M.Tech. Scholar, Dept. of Computer Science & Engineering,Lakshmi Narain College Of Technology, Bhopal, India. 2Professor & Head,Dept.of Computer Science & Engineering,Lakshmi Narain College Of Technology, Bhopal, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Hadoop is a distributed computing framework which is widely used. It’s file system is HDFS (Hadoop Distributed File System). In this system datanodesbynatureis homogeneous. For the improvement of security in Hadoop system, some awareness and attention has to be placed. For data allocation a secure HDFS is required, which can be done by encrypting the data and then storing that data in HDFS. This will improve the storage security in Hadoop. Its usage is increasing day by day and its adoption is widespread. HDFS stores large data files, a single server in HDFS manages all the files stored in Hadoop distributed file system. As we know that everywhere security is the major concern so as to control loss of data at the time of storing in HDFS, some technique is required. And in our work we are workingonthattechniqueto securing the stored data in HDFS. In this paper, encryption techniques is used to encrypt data so that loss of data can be controlled. Data is encrypted before storing it in Hadoop distributed file system. Key Words : HDFS, Security, Encryption technique, Big Data, Data Analytics, Hadoop 1. INTRODUCTION Big data is a blanket term for the non-traditional strategies and technologies needed to gather, organize, process, and gather insights from large datasets. While the problem of working with data that exceeds the computing power or storage of a single computer is not new, the pervasiveness, scale, and value of this type of computing has greatly expanded in recent years. 1.1 Background Security is one of the major concerns in information technology industry. It becomes more crucial very it comes at end of data. Nowadays, data has become the centric point of all industry and all are moving around data only. Subsequently, trend of IT is also changed and they focused more on data value rather than services. Morally, large data volume is generated with different variety and highvelocity. Due to public and open behaviorssecurityhasbecomeoneof the major concerns in hadoop framework system. Hadoopis becoming so popular because of its big data storage.Hadoop system is designed without any security so security is the major concern in hadoop. Thus, in this paper we will be discussing about the core problem whichissecurityinHDFS. Hadoop ecosystem is capable of managing, handling and processing enormous amountofdata.Thisisthepopularand widely used technology. 1.2 Overview As it works as the storage of large data so security is becoming the major weakness in hadoop development. Hadoop has file system to store data, Hadoop Distributed File System(HDFS) and MapReduce are the file system of hadoop in which it stores large data. With the increase in popularity of hadoop, there is also a demand in trend for more and more security. Without any security model the sensitive data stored in hadoop is not secure. Also a new trend is rising for the encryption of stored data to prevent the confidentiality of data. Over the period of past few years an attempt have been made to achieve some level ofsecurity in Hadoop by using data encryption technique. In this paper all the attempts have been done to describe and prevent the data security in HDFS. 2. HADOOP Hadoop is continuously updating and its latest versions Hadoop 2 emerges with the improvement in scheduling and resource management with introducing YARN.YARN stands for Yet Another Resource Negotiator. It is responsible for Resource Manager and Node Manager, resource manager manages the resources and also utilize them, deploy them and node manager manages data node and also report the status of data node to resource manager. Apache Hadoop is also an open-source framework, used for processing large datasets and processing of distributed storage by using MapReduce programming. It consist of thousands of system and thousands of hardware, whicharehelpful inconditionof failure or inoperative system. It is designed by keeping in mind that hardware failure are common and this failure should be handled automatically by framework.Hadoopasa software framework, composed of different components including Hadoop Distributed File System ( HDFS), MapReduce Programming Model and Hadoop Kernel. Hadoop divides the files into blocks and distributes them among nodes, it works as storage. Whereas, MapReduce Programming process the application stored in HDFS.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1395 Figure 1. Hadoop Ecosystem 2.1 HADOOP DISTRIBUTED FILE SYSTEM Hadoop Distributed File System is a file system for Hadoop framework, it stores large files across cluster nodes. It replicates the data across multiple machinesfor thepurpose of security and availability and therefore does not depends on RAID (Redundant Array of IndependentDisk)storage but RAID configuration are used still to increase the performance of input output. Data is replicated and stored on three nodes with the default value of 3. HDFS is a portable and scalable file system it splits file into large blocks and distributes them to store on cluster node. Its replication factor replicates those file accordingly, this is the function of HDFS. But with all these features of HDFS, security is also essential. As HDFS manages complex application which is a challenging task, the huge data which is stored in HDFS are at risk because of missing of encryption at storage level. Figure 2. Working of HDFS 2.2 PROBLEM DOMAIN More and more use of internet and internet based applications and services, increases the demand of communication, and business field increases the demand of stock exchange. This emerging solution increases the user expectations and also the data. The issue arises in our work is the big data which is of large volume, variety and velocity. The data which is generated in a large amount is called Big data. Big data cannot be classified through measurement or quantity or cannot be observed for fixing. 2.3 SECURITY ISSUES IN HADOOP The task of securing the whole data center is very essential and also achieving features like scalability, flexibility, performance and security challenges. Following are the security issues specified below: 1. Data access: Authentication and authorization plays an important role in security and limiting user accesscontrol of sensitive data. 2. Protection of data at rest: encryption is the protection of data at rest, which protects the access of data from outside. Encryption limits the replication of data. 3. Client interaction: Direct communication of client with data nodes and resource managers. Through it client can create integrity of data by sending malicious links or data. Figure 3. Security issues in Hadoop
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1396 3. LITERATURE REVIEW Worked on Many technologies have been described and provided a better resultregardingthesecurityissue.Withthe enhancement in technology the security should also be increased. Seon Young Park et al. In[1] with the increase in Hadoop system, security of stored sensitive data is also essential. To protect such data Hadoop file system requires the method of secure Hadoop. Zerfos, Petros et al. In[2] described about some data protection techniques like Encryption. Throughout the life cycle of data its end-to-end security is required. HDFS security requirement and data protection can be achieved using some encryption techniques in Hadoop system. Cheng, Zhonghan et al. In[3] explained that HDFS replicates the file and store that replicated file across cluster in multiple machine for the availability and durability. It is popular because of its scalable and distributed framework which allows big data applications to run. Shehzad Danish et al. In [4] abstracted about the initial phase of HDFS. When designing HDFS its initial phase i.e. storage efficiency and reliability is considered and data security was not considered. Due to improper data security data loss can be possible. Figure 4. future of Hadoop security Transparent encryption in HDFS [5] author introduced about Transparent Encryption for Hadoop, which is an effort for data protection. Hadoop is an open source framework for cloud storage. It is a trending technology designed without security model fordata storage, as it is a tool for storinglarge amount of data to increase the security of sensitive data and confidential information. Figure 5. HDFS transparent encryption Cloudera.com[6]Clouderawhichisacommercialoffering. “Security for Hadoop” is as essential and a important step in the originality of Hadoop and effort for data protection. Owen O’Malley et al. In[7] introduces about the permission model implemented inHDFS,thismodelisforthe files and directories. Author finds that if Kerberos is implemented over SSL then HDFS security can be enhanced by authentication and access control. Figure 6 Security In Hadoop Using Kerberos
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1397 5. PROPOSED WORK Relevant Algorithm Used: The relevant algorithm used in our proposed work are : 1. Apriori Algorithm 2. RC6 Algorithm 5.1 Apriori Algorithm In 1994, Agrawal andSrikantproposedApriorialgorithm. Apriori algorithm is an algorithmusedfortheminingofitems that are used frequently and also for association rule learning. In a database every single item that appears frequently can extend as much larger till it appears in sets of items sufficiently. Association rule can be defined using Apriori algorithm because of frequency of appearingofitems in datasets. [10] Apriori Algorithm : It mainly operates for the frequently appearing items in a datasets and their collection. 1. Bottom-up approach is used in it. 2. It determines frequent sets of items. 3. Termination of algorithm can be done when no extension was found 4. Items can be said frequent if it appears at least 3 transactions in database. Working steps of Apriori Algorithm : 1. Counts the appearance of items, occurrence of each items separately called Support (Value should be at least 3). 2. Generation of pairsofitemsappearingfrequentlyinlist form. Minimum support should be 3 of frequent item. [11] 5.2 RC6 Encryption The RC6 stands for Rivest Cipher 6 which is a symmetric key block cipher. RC6 supports the key size up to 2040 bits and block size of 128 bits. It supports wide range of word length. RC6 is similar to RC5 and designed for the variety of word length. No key separation is required, it is flexible to all key size. It is derived from RC5.RC6 performs many operations like addition, subtraction, exclusive-or, multiplication, rotation to left-right. RC6 performs encryption and decryption both. Figure 7. RC6 Block Diagram RC6 provides with the advantage of security and high performance, fast and flexible and supports wide variety of word length. Through the encryption flow diagram in RC6 algorithm we will be discussing about the technique of RC6 cryptography. Figure 8. Flow chart for encryption in RC6
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1398 6. RESULT ANALYSIS The experimental result describes the implementation of algorithm used, using file size and buffer size, and is measured in speed (Mb/s). the files and buffer are of different sizes, represented in below table. Rows represents file size. Columns represents buffer size. Speed is calculated in Mb/s. Table 1. Showing encryption of several file sizes Below shows the graph representation of above table. There are 6 files and buffer size. Figure 9. Graph representing speed in Mb/s of various files and buffer size 7. CONCLUSIONS The complete observation concluded that the created environment for storing data can be secured using encryption technique. Security is the major concern, and to achieve security encryption is done using RC6. In the complete work we have discussed about security which can be implemented using encryptiontechniquewhereplain text is encrypted so that the stored data is in the form of encrypted data. In the proposed system, RC6 encryption algorithm and Apriori algorithm are used. Apriori algorithm is used for the mining of items that are used frequently and also for association rule learning. RC6 algorithm is used for encrypting plain text so that its confidentiality cannot be stolen and misused. Apriori algorithm calculates confidence of support. REFERENCES [1] Seonyoung Park and Youngseok Lee, “Secure Hadoop with Encrypted HDFS”,Springer-Verlag Berlin Heidelberg in 2013. [2] Zerfos, Petros, Hangu Yeo, Brent D. Paulovicks, and Vadim Sheinin. "SDFS: Secure distributed filesystemfor data-at-rest security for Hadoop-as-a-service." In Big Data (Big Data), 2015 IEEE International Conferenceon, pp. 1262-1271. IEEE, 2015. [3] Cheng, Zhonghan, Diming Zhang, Hao Huang, and Zhenjiang Qian. "Design and Implementation of Data Encryptionin Cloud based on HDFS." International Workshop on Cloud Computing and Information Security (CCIS 2013), pp. 274-277. 2013. [4] Shehzad, Danish, Zakir Khan, Hasan Dag, and Zeki Bozkus. "A Novel Hybrid Encryption Scheme to Ensure Hadoop Based Cloud Data Security." International Journal of Computer Science and Information Security VOL 14, 2016 PP 480. [5] Apache Hadoop "Transparent Encryption in HDFS." 2.7.2–.Accessed July 26, 2016. https://hadoop.apache.org/docs/r2.7.2/hadoop- project-dist/hadoop hdfs/TransparentEncryption.html. [6] "HDFS Data At Rest Encryption". 2016. Cloudera.Com. Accessed July 26, 2016. https://www.cloudera.com/documentation/enterprise/ 5-4 x/topics/cdh_sg_hdfs_encryption.html. [7] Owen O’Malley, KanZhang,SanjayRadia,RamMarti,and Christopher Harrell “Hadoop SecurityDesign”,Technical Report, 2009.10 1 KB 100K B 500K B 1MB 64MB 128MB 825 KB 39 Mb/s 91 Mb/s 117 Mb/s 91 Mb/s 117 Mb/s 137 Mb/s 4.3 MB 87 Mb/s 159 Mb/s 148 Mb/s 130 Mb/s 89 Mb/s 153 Mb/s 60.5 MB 105 Mb/s 155 Mb/s 153 Mb/s 150 Mb/s 157 Mb/s 155 Mb/s 381 MB 125 Mb/s 157 Mb/s 133 Mb/s 159 Mb/s 152 Mb/s 155 Mb/s 1.00G B 128 Mb/s 159 Mb/s 157 Mb/s 110 Mb/s 90 Mb/s 91 Mb/s 2.5 GB 120 Mb/s 141 Mb/s 137 Mb/s 142 Mb/s 143 Mb/s 128 Mb/s
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1399 [8] S. Ghemawat, H. Gobioff, and S.-T.Leung,``TheGoogle_le system,'' in Proc. 19th ACM Symp. Oper. Syst. Principles (SOSP), 2003, pp. 29_43. [9] S. Ghemawat and J. Dean, ``MapReduce: Simpli_ed data processing on large clusters,'' ACM Commun. Mag., vol. 51, no. 1, pp. 107_113,Jan. 2008. [10] D. Borthakur, ``The Hadoop distributed _le system: Architecture and design,'' Hadoop Project Website, vol. 11, p. 21, Aug. 2007 [11] T. White, Hadoop: The De_nitive Guide. Farnham, U.K.:O'Reilly, 2012.