SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 12 127 – 130
_______________________________________________________________________________________________
127
IJRITCC | December 2017, Available @ http://www.ijritcc.org
_________________________________________________________________________________________
Secure Data Sharing with Data Partitioning in Big Data
Mr. Shriniwas Patilbuwa Rasal1
1
M.E. Computer Engineering Department, (Jaywantrao sawant
collage of engineering, pune).
shriniwasrasal@gmail.com
Prof. Hingoliwala Hyder Ali2
2
M.E. Computer Engineering Department, (Jaywantrao sawant
collage of engineering, pune).
Abstract : Hadoop is a framework for the transformation analysis of very huge data. This paper presents an distributed approach for data storage
with the help of Hadoop distributed file system (HDFS). This scheme overcomes the drawbacks of other data storage scheme, as it stores the data in
distributed format. So, there is no chance of any loss of data. HDFS stores the data in the form of replica’s, it is advantageous in case of failure of
any node; user is able to easily recover from data loss unlike other storage system, if you loss then you cannot. We have implemented ID-Based
Ring Signature Scheme to provide secure data sharing among the network, so that only authorized person have access to the data. System is became
more attack prone with the help of Advanced Encryption Standard (AES). Even if attacker is successful in getting source data but it’s unable to
decode it.
Keywords: HDFS, Data Sharing, ID based ring Signature.
__________________________________________________*****_________________________________________________
1. INTRODUCTION
Sharing data among groups of organizations is necessary in web-
based society and at the very core of business transactions. Data
sharing is becoming important for many users and sometimes a
crucial requirement, specially for businesses and organisations
aiming to gain more profit. However, data sharing poses several
problems including data misuse or abuse, privacy and
uncontrolled propagation of data. Often organizations use legal
documents (contracts) to regulate the terms and conditions under
which they agree to share data among themselves. However, the
constraints explained in such contracts remain inaccessible from
the software infrastructure supporting the data sharing.
Traditional legal contracts are written using natural language,
from a computational point of view, it is complex, difficult to
parse, and ambiguity prone. It is therefore more difficult to:
• Verify inconsistencies within a contract itself or between a
contract
• Relate violations of the policies to the terms and conditions
expressed in a contract.
Therefore, there is a gap between a traditional legal contract
regulating the data sharing and the software infrastructure
supporting it.
Figure 1.1: Data Sharing
Bigdata Scenario
A distributed system is a pool of autonomous compute nodes
connected by swift networks that appear as a single workstation.
In reality, solving complex problems involves division of
problem into sub tasks and each of which is solved by one or
more compute nodes which communicate with each other by
message passing. The current inclination towards Big Data
analytics has lead to such compute intensive tasks. Big Data, is
used for a collection of data sets which are huge and complex
and difficult to process using traditional data processing tools.
The need for Big Data is to ensure high levels of data
accessibility for business intelligence and big data analytics.
This condition needs applications capable of distributed
processing involving terabytes of information saved in a variety
of file formats. Hadoop is an open source framework based on
Java which supports the processing and storage of large amount
of data sets in a distributed computing environment. Hadoop is a
part of Apache project, which is sponsored by Apache Software
Foundation. It makes it handle thousands of terabytes of data,
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 12 127 – 130
_______________________________________________________________________________________________
128
IJRITCC | December 2017, Available @ http://www.ijritcc.org
_________________________________________________________________________________________
and to run applications on systems with thousands of commodity
hardware nodes. Hadoop has a distributed file system i. e. HDFS
which allows faster data transfer amongst nodes. It also allows
systems to continue even if a node stops working. Hadoop is a
well-known and a successful open source implementation of the
MapReduce programming model in the distributed processing.
The Hadoop runtime system with HDFS provides parallelism
and concurrency to achieve system reliability. The major
categories of machine roles in a Hadoop are Client machines,
Master nodes and Slave nodes. The Master nodes supervise
storing of data and running parallel computations on all that data
using Map Reduce. The NameNode coordinates the data storage
function in HDFS, while the JobTracker supervises and
coordinates the parallel processing of data using Map Reduce.
Slave Nodes are the vast majority of machines and do all the
cloudy work of storing the data and running the computations.
Each slave runs a DataNode and a TaskTracker daemon that
communicates with and receives instructions from their master
nodes. The TaskTracker daemon is a slave to the JobTracker
likewise the DataNode daemon to the NameNode. HDFS file
system is designed for storing large files with streaming data
access patterns, running on clusters of commodity hardware. An
HDFS cluster has two type of node operating in a master-slave
pattern: A NameNode (Master) managing the file system
namespace, file System tree and the metadata for all the files and
directories in the tree and some number of DataNode (Workers)
managing the data blocks of files. The HDFS is so large that
replicas of files are constantly created to meet performance and
availability requirements.
Figure 1.2: Hadoop Scenario
2. LITERATURE SURVEY
Keke Gai et al.[3] proposes a novel approach that can
efficiently split the file and separately store the data in the
distributed cloud servers, in which the data cannot be directly
arrived by cloud service operators. The proposed approach is
entitled as Security-Aware Efficient Distributed Storage
(SAEDS) model, which is supported by the proposed
algorithms, Secure Efficient Data Distributions (SED2)
Algorithm and Efficient Data Conflation (EDCon) Algorithm.
Our experimental analysis have assessed both security an
efficiency performances.
Xinyi Huang et al.[4] shows Ring signature is a promising
candidate to construct an anonymous and authentic data sharing
system. It allows a data owner to authenticate his data which
can be put into the cloud for storage or analysis purpose. Yet
the certificate verification in the public key infrastructure (PKI)
setting becomes a bottleneck for this solution to be scalable.
Identity-based ring signature (ID-based), it removes the process
of certificate verification, can be used instead. In this paper,
further enhance the security of ID-based ring signature by
providing forward security. This paper provide a concrete and
efficient instantiation of our approach, prove its security and
provide an implementation to show its practicality.
3. IMPLEMENTATION
a. Problem Statement
Data sharing with a large number of participants must take into
account several issues, including efficiency, data storage, data
integrity and privacy of data owner. The number of users in a
data sharing system could be huge and a practical system must
reduce the computation and communication cost as much as
possible. Otherwise it would lead to a waste of energy and
shortage of storage space.
b. Mathematical Implementation
Setup: On an unary string input 1k
where k is a security
parameter, it produces the master secret key s and the common
public parameters params, which include a description of a finite
signature space and a description of a finite message space.
KeyGen: On an input of the signer's identity ID 𝜖 {0,1}*
and the
master secret key s, it outputs the signer's secret signing key SID.
(The corresponding public verification key QID can be computed
easily by everyone.)
1. Sign: On input of a message m, a group of n users' identities
Ū{Di}, where
1 ≤ i ≤ n, and the secret keys of one members SIDs , where 1 ≤ s ≤
n; it outputs an ID-based ring signature σ on the message m.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 12 127 – 130
_______________________________________________________________________________________________
129
IJRITCC | December 2017, Available @ http://www.ijritcc.org
_________________________________________________________________________________________
2. Verify: On a ring signature σ, a message m and the group of
signers' identities Ū{Di}, as the input, it outputs T for true or F
for false. depending on whether σ is a valid signature signed by a
certain member in the group Ū{Di} on a message m. It must
satisfy the standard consistency constraint of IDbased ring
signature scheme, i.e. σ = Sign(m ,Ū{Di}, SIDs ), and IDs 𝜖
Ū{Di}, we must have
Verify(σ ,m ,Ū{Di}) = T. A secure ID-based ring signature
scheme should be unforgeability and signer-ambiguous.
c. System Architecture
Figure 3.1: System Architecture
d. Algorithmic Implementation
1. ID-Based Ring Signature Algorithm:
• Setup: On input an unary string 1λ
where λ is a security
parameter, the algorithm outputs a master secret key msk
for the third party PKG (Private Key Generator) and a
list of system parameters param that includes λ and the
descriptions of a user secret key space D, a message
space M as well as a signature space ψ .
• Extract: On input a list param of system parameters, an
identity IDi ϵ {0,1}*
for a user and the master secret key
msk, the algorithm outputs the user’s secret key ski ϵ D
such that the secret key is valid for time t = 0. In this
paper, we denote time as non-negative integers. When
we say identity IDi corresponds to user secret key ski;0
or vice versa, we mean the pair (IDi,ski;0) is an input-
output pair of Extract with respect to param and msk.
Update. On input a user secret key ski;t for a time period
t, the algorithm outputs a new user secret key ski;t+1 for
the time period t + 1.
• Sign: On input a list param of system parameters, a time
period t, a group size n of length polynomial in λ , a set
Ɫ = {IDi ϵ {0.1}* l i ϵ [1,n] } of n user identities, a
message m ϵ M, and a secret key skπ,t ϵ D , π ϵ [1, n] for
time period t, the algorithm outputs a signature ρϵψ.
• Verify. On input a list param of system parameters, a
time period t,a group size n of length polynomial in λ,a
set Ɫ = {IDi ϵ {0.1}* l i ϵ [1,n] }of n user identities, a
message m ϵ M, a signature ρϵψ, it outputs either valid
or invalid.
2. Security-Aware Efficient Distributed Storage (SA-EDS):
Secure Efficient Data Distributions (SED2) Algorithm :
The inputs of this algorithm include the Data (D), a random split
binary parameter C. The length of C is shorter than D. The
outputs include two separate encrypted data α and β.
1) Input data packet D and C. Data C needs to be a nonempty set
that is shorter than D. C should not be as same as D.
2) Create and initialize a few dataset, R, α, and β; assign 0 value
to each of them.
3) Randomly generate a key K that is stored at the user’s special
register for the purpose of encryption and decryption. We
calculate the value of R by (D-C), then execute two XOR
operations to obtain the data value stored in the HDFS. The data
in the remote storage are denoted to α and β. We use the
following formulas to gain α and β: α = C⊕K; β = R⊕K.
4) Output α and β and separately store them in the different
datanode.
Efficient Data Conflation (EDCon) Algorithm:
EDCon algorithm is designed to enable users to gain the
information by converging two data components from different
datanodes. Inputs of this algorithm include two data components
from datanode α, β, and K. Output is user’s original data D.
1) Input the data, α and β, that are acquired from different cloud
servers. The user gains the key K from the special register.
Initialize a few dataset γ, γ’, and D.
2) Do the XOR operation to both α and β by using K. Assign the
value to γ and γ’, respectively. γ ← α⊕K, γ’ ← α⊕K
3) Sum up γ and γ’ and assign the summation to D, as
D = γ + γ’.
4) Output D.
4. RESULT ANALYSIS
The system will became more secure due to SA-EDS algorithm.
While uploading file to the HDFS system, the implemented
system will split the data according to nodes in such a way that
even Hadoop administrator is unable to plaintext the split
content so it proves more data security. Only authorized person
will access the file data, so it will increase the data security.
Ultimately, it increases data integrity.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 12 127 – 130
_______________________________________________________________________________________________
130
IJRITCC | December 2017, Available @ http://www.ijritcc.org
_________________________________________________________________________________________
As shown in below graph, the system is checked with various
file size and in comparison it will take less time. Similarly,
System implementation also provides durability for file
downloading.
Figure 4.1: Time Required for File Uploading
Figure 4.2: Time Required for File Downloading
CONCLUSION
In this architecture we implemented authentic data sharing and
secure distributed big data storage architecture for protecting Big
Data. Map Reduce framework has used to find the number of
users who used to log into the data center. This framework
protects the mapping of various data elements to each provider
using implemented architecture. Though this approach requires
high implementation effort, it provides valuable information that
can have high impact on the next generation systems. Our future
work is to extend the secure distributed big data storage for real
time processing of streaming data.
REFERENCES
[1] Chang, F., Dean, J., Ghemawat, S., Hsieh, W. C., Wallach, D.
A., Burrows, M., & Gruber, R. E. (2008). Bigtable: A
distributed storage system for structured data. ACM
Transactions on Computer Systems (TOCS), 26(2), 4.
[2] Agrawal, Divyakant, Sudipto Das, and Amr El Abbadi. "Big
data and cloud computing: current state and future
opportunities." In Proceedings of the 14th International
Conference on Extending Database Technology, pp. 530-533.
ACM, 2011.
[3] Keke Gai, Meikang Qiu, Hui Zhao,” Security-Aware Efficient
Mass Distributed Storage Approach for Cloud Systems in Big
Data” IEEE 2nd International Conference on Big Data
Security on Cloud, IEEE International Conference on High
Performance and Smart Computing, IEEE International
Conference on Intelligent Data and Security, 2016.
[4] Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang,
Kaitai Liang, Li Xu, Jianying Zhou ,”Cost-Effective
Authentic and Anonymous Data Sharing with Forward
Security”, IEEE TRANSACTIONS ON COMPUTERS VOL:
64 NO: 6 YEAR 2015
[5] K. Gai and S. Li. Towards cloud computing: a literature
review on cloud computing and its development trends. In
2012 Fourth Int’l Conf. on Multimedia Information
Networking and Security, pages 142–146, Nanjing, China,
2012.
[6] M. Qiu, H. Li, and E. Sha. Heterogeneous real-time
embedded software optimization considering hardware
platform. In Proceedings of the 2009 ACM symposium on
Applied Computing, pages 1637– 1641. ACM, 2009.
[7] M. Qiu, E. Sha, M. Liu, M. Lin, S. Hua, and L. Yang. Energy
minimization with loop fusion and multi-functional-unit
scheduling for multidimensional DSP. J. of Parallel and
Distributed Computing, 68(4):443–455, 2008.
[8] K. Gai and A. Steenkamp. A feasibility study of Platform-as-
a- Service using cloud computing for a global service
organization. Journal of Information System Applied
Research, 7:28–42, 2014.
[9] C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou. Toward
secure and dependable storage services in cloud computing.
IEEE Trans. On Services Computing, 5(2):220–232, 2012.
[10] Y. Li, W. Dai, Z. Ming, and M. Qiu. Privacy protection for
preventing data over-collection in smart city. IEEE
Transactions on Computers,PP:1, 2015.

More Related Content

What's hot

Partner Keynote: How Logical Data Fabric Knits Together Data Visualization wi...
Partner Keynote: How Logical Data Fabric Knits Together Data Visualization wi...Partner Keynote: How Logical Data Fabric Knits Together Data Visualization wi...
Partner Keynote: How Logical Data Fabric Knits Together Data Visualization wi...Denodo
 
Information economics and big data
Information economics and big dataInformation economics and big data
Information economics and big dataMark Albala
 
Toward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureredpel dot com
 
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...YogeshIJTSRD
 
IT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsIT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsBrooke Bordelon
 
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITY
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITYBLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITY
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITYijccsa
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesTom Kirby
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsYogeshIJTSRD
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesIOSR Journals
 
Advanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationAdvanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationDenodo
 
An Comprehensive Study of Big Data Environment and its Challenges.
An Comprehensive Study of Big Data Environment and its Challenges.An Comprehensive Study of Big Data Environment and its Challenges.
An Comprehensive Study of Big Data Environment and its Challenges.ijceronline
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudIOSR Journals
 
Maximizing Data Lake ROI with Data Virtualization: A Technical Demonstration
Maximizing Data Lake ROI with Data Virtualization: A Technical DemonstrationMaximizing Data Lake ROI with Data Virtualization: A Technical Demonstration
Maximizing Data Lake ROI with Data Virtualization: A Technical DemonstrationDenodo
 
IRJET- Cross User Bigdata Deduplication
IRJET-  	  Cross User Bigdata DeduplicationIRJET-  	  Cross User Bigdata Deduplication
IRJET- Cross User Bigdata DeduplicationIRJET Journal
 
No sql databases new millennium database for big data, big users, cloud compu...
No sql databases new millennium database for big data, big users, cloud compu...No sql databases new millennium database for big data, big users, cloud compu...
No sql databases new millennium database for big data, big users, cloud compu...eSAT Publishing House
 
DOCUMENT SELECTION USING MAPREDUCE
DOCUMENT SELECTION USING MAPREDUCEDOCUMENT SELECTION USING MAPREDUCE
DOCUMENT SELECTION USING MAPREDUCEijsptm
 

What's hot (20)

Partner Keynote: How Logical Data Fabric Knits Together Data Visualization wi...
Partner Keynote: How Logical Data Fabric Knits Together Data Visualization wi...Partner Keynote: How Logical Data Fabric Knits Together Data Visualization wi...
Partner Keynote: How Logical Data Fabric Knits Together Data Visualization wi...
 
Information economics and big data
Information economics and big dataInformation economics and big data
Information economics and big data
 
Big Data (security Issue)
Big Data (security Issue)Big Data (security Issue)
Big Data (security Issue)
 
Toward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architecture
 
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
 
IT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsIT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business Problems
 
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITY
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITYBLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITY
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITY
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challenges
 
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and ApplicationsSurvey on Digital Video Watermarking Techniques, Attacks and Applications
Survey on Digital Video Watermarking Techniques, Attacks and Applications
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
 
Advanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationAdvanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data Virtualization
 
An Comprehensive Study of Big Data Environment and its Challenges.
An Comprehensive Study of Big Data Environment and its Challenges.An Comprehensive Study of Big Data Environment and its Challenges.
An Comprehensive Study of Big Data Environment and its Challenges.
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
 
Ijcatr04051015
Ijcatr04051015Ijcatr04051015
Ijcatr04051015
 
Business intelligent
Business intelligentBusiness intelligent
Business intelligent
 
Maximizing Data Lake ROI with Data Virtualization: A Technical Demonstration
Maximizing Data Lake ROI with Data Virtualization: A Technical DemonstrationMaximizing Data Lake ROI with Data Virtualization: A Technical Demonstration
Maximizing Data Lake ROI with Data Virtualization: A Technical Demonstration
 
IRJET- Cross User Bigdata Deduplication
IRJET-  	  Cross User Bigdata DeduplicationIRJET-  	  Cross User Bigdata Deduplication
IRJET- Cross User Bigdata Deduplication
 
No sql databases new millennium database for big data, big users, cloud compu...
No sql databases new millennium database for big data, big users, cloud compu...No sql databases new millennium database for big data, big users, cloud compu...
No sql databases new millennium database for big data, big users, cloud compu...
 
DOCUMENT SELECTION USING MAPREDUCE
DOCUMENT SELECTION USING MAPREDUCEDOCUMENT SELECTION USING MAPREDUCE
DOCUMENT SELECTION USING MAPREDUCE
 
Microsoft big data_solution_brief
Microsoft big data_solution_briefMicrosoft big data_solution_brief
Microsoft big data_solution_brief
 

Similar to 28 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-2017

A Survey on Big Data, Hadoop and it’s Ecosystem
A Survey on Big Data, Hadoop and it’s EcosystemA Survey on Big Data, Hadoop and it’s Ecosystem
A Survey on Big Data, Hadoop and it’s Ecosystemrahulmonikasharma
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...rahulmonikasharma
 
Secure Fog Computing System using Emoticon Technique
Secure Fog Computing System using Emoticon TechniqueSecure Fog Computing System using Emoticon Technique
Secure Fog Computing System using Emoticon Techniquerahulmonikasharma
 
Elementary Concepts of Big Data and Hadoop
Elementary Concepts of Big Data and HadoopElementary Concepts of Big Data and Hadoop
Elementary Concepts of Big Data and Hadooprahulmonikasharma
 
To Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the CloudTo Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the Cloudrahulmonikasharma
 
Big Data Processing with Hadoop : A Review
Big Data Processing with Hadoop : A ReviewBig Data Processing with Hadoop : A Review
Big Data Processing with Hadoop : A ReviewIRJET Journal
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudIRJET Journal
 
Security issues associated with big data in cloud
Security issues associated  with big data in cloudSecurity issues associated  with big data in cloud
Security issues associated with big data in cloudsornalathaNatarajan
 
IRJET- Secured Hadoop Environment
IRJET- Secured Hadoop EnvironmentIRJET- Secured Hadoop Environment
IRJET- Secured Hadoop EnvironmentIRJET Journal
 
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...rahulmonikasharma
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING
SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTINGSECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING
SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTINGIJNSA Journal
 
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESBIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESijcsit
 
Big Data in Cloud Computing Review and Opportunities
Big Data in Cloud Computing Review and OpportunitiesBig Data in Cloud Computing Review and Opportunities
Big Data in Cloud Computing Review and OpportunitiesAIRCC Publishing Corporation
 
Secure Transaction Model for NoSQL Database Systems: Review
Secure Transaction Model for NoSQL Database Systems: ReviewSecure Transaction Model for NoSQL Database Systems: Review
Secure Transaction Model for NoSQL Database Systems: Reviewrahulmonikasharma
 
High level view of cloud security
High level view of cloud securityHigh level view of cloud security
High level view of cloud securitycsandit
 
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONS
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONSHIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONS
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONScscpconf
 
BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD
BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD
BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD IJNSA Journal
 

Similar to 28 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-2017 (20)

A Survey on Big Data, Hadoop and it’s Ecosystem
A Survey on Big Data, Hadoop and it’s EcosystemA Survey on Big Data, Hadoop and it’s Ecosystem
A Survey on Big Data, Hadoop and it’s Ecosystem
 
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Base...
 
Secure Fog Computing System using Emoticon Technique
Secure Fog Computing System using Emoticon TechniqueSecure Fog Computing System using Emoticon Technique
Secure Fog Computing System using Emoticon Technique
 
Elementary Concepts of Big Data and Hadoop
Elementary Concepts of Big Data and HadoopElementary Concepts of Big Data and Hadoop
Elementary Concepts of Big Data and Hadoop
 
To Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the CloudTo Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the Cloud
 
Big Data Processing with Hadoop : A Review
Big Data Processing with Hadoop : A ReviewBig Data Processing with Hadoop : A Review
Big Data Processing with Hadoop : A Review
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
 
Security issues associated with big data in cloud
Security issues associated  with big data in cloudSecurity issues associated  with big data in cloud
Security issues associated with big data in cloud
 
IRJET- Secured Hadoop Environment
IRJET- Secured Hadoop EnvironmentIRJET- Secured Hadoop Environment
IRJET- Secured Hadoop Environment
 
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...
Methods of Data Access in Cloud Computing and It’s Challenges in Network Secu...
 
E018142329
E018142329E018142329
E018142329
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
Ck34520526
Ck34520526Ck34520526
Ck34520526
 
SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING
SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTINGSECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING
SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING
 
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESBIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
 
Big Data in Cloud Computing Review and Opportunities
Big Data in Cloud Computing Review and OpportunitiesBig Data in Cloud Computing Review and Opportunities
Big Data in Cloud Computing Review and Opportunities
 
Secure Transaction Model for NoSQL Database Systems: Review
Secure Transaction Model for NoSQL Database Systems: ReviewSecure Transaction Model for NoSQL Database Systems: Review
Secure Transaction Model for NoSQL Database Systems: Review
 
High level view of cloud security
High level view of cloud securityHigh level view of cloud security
High level view of cloud security
 
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONS
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONSHIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONS
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONS
 
BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD
BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD
BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD
 

More from rahulmonikasharma

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paperrahulmonikasharma
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...rahulmonikasharma
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Frameworkrahulmonikasharma
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systemsrahulmonikasharma
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Surveyrahulmonikasharma
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETrahulmonikasharma
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formularahulmonikasharma
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...rahulmonikasharma
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pirahulmonikasharma
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...rahulmonikasharma
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticlesrahulmonikasharma
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMrahulmonikasharma
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoringrahulmonikasharma
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...rahulmonikasharma
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...rahulmonikasharma
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM Systemrahulmonikasharma
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosisrahulmonikasharma
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Techniquerahulmonikasharma
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Couplerrahulmonikasharma
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motorrahulmonikasharma
 

More from rahulmonikasharma (20)

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
 

Recently uploaded

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 

Recently uploaded (20)

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 

28 15141Secure Data Sharing with Data Partitioning in Big Data33289 24 12-2017

  • 1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 12 127 – 130 _______________________________________________________________________________________________ 127 IJRITCC | December 2017, Available @ http://www.ijritcc.org _________________________________________________________________________________________ Secure Data Sharing with Data Partitioning in Big Data Mr. Shriniwas Patilbuwa Rasal1 1 M.E. Computer Engineering Department, (Jaywantrao sawant collage of engineering, pune). shriniwasrasal@gmail.com Prof. Hingoliwala Hyder Ali2 2 M.E. Computer Engineering Department, (Jaywantrao sawant collage of engineering, pune). Abstract : Hadoop is a framework for the transformation analysis of very huge data. This paper presents an distributed approach for data storage with the help of Hadoop distributed file system (HDFS). This scheme overcomes the drawbacks of other data storage scheme, as it stores the data in distributed format. So, there is no chance of any loss of data. HDFS stores the data in the form of replica’s, it is advantageous in case of failure of any node; user is able to easily recover from data loss unlike other storage system, if you loss then you cannot. We have implemented ID-Based Ring Signature Scheme to provide secure data sharing among the network, so that only authorized person have access to the data. System is became more attack prone with the help of Advanced Encryption Standard (AES). Even if attacker is successful in getting source data but it’s unable to decode it. Keywords: HDFS, Data Sharing, ID based ring Signature. __________________________________________________*****_________________________________________________ 1. INTRODUCTION Sharing data among groups of organizations is necessary in web- based society and at the very core of business transactions. Data sharing is becoming important for many users and sometimes a crucial requirement, specially for businesses and organisations aiming to gain more profit. However, data sharing poses several problems including data misuse or abuse, privacy and uncontrolled propagation of data. Often organizations use legal documents (contracts) to regulate the terms and conditions under which they agree to share data among themselves. However, the constraints explained in such contracts remain inaccessible from the software infrastructure supporting the data sharing. Traditional legal contracts are written using natural language, from a computational point of view, it is complex, difficult to parse, and ambiguity prone. It is therefore more difficult to: • Verify inconsistencies within a contract itself or between a contract • Relate violations of the policies to the terms and conditions expressed in a contract. Therefore, there is a gap between a traditional legal contract regulating the data sharing and the software infrastructure supporting it. Figure 1.1: Data Sharing Bigdata Scenario A distributed system is a pool of autonomous compute nodes connected by swift networks that appear as a single workstation. In reality, solving complex problems involves division of problem into sub tasks and each of which is solved by one or more compute nodes which communicate with each other by message passing. The current inclination towards Big Data analytics has lead to such compute intensive tasks. Big Data, is used for a collection of data sets which are huge and complex and difficult to process using traditional data processing tools. The need for Big Data is to ensure high levels of data accessibility for business intelligence and big data analytics. This condition needs applications capable of distributed processing involving terabytes of information saved in a variety of file formats. Hadoop is an open source framework based on Java which supports the processing and storage of large amount of data sets in a distributed computing environment. Hadoop is a part of Apache project, which is sponsored by Apache Software Foundation. It makes it handle thousands of terabytes of data,
  • 2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 12 127 – 130 _______________________________________________________________________________________________ 128 IJRITCC | December 2017, Available @ http://www.ijritcc.org _________________________________________________________________________________________ and to run applications on systems with thousands of commodity hardware nodes. Hadoop has a distributed file system i. e. HDFS which allows faster data transfer amongst nodes. It also allows systems to continue even if a node stops working. Hadoop is a well-known and a successful open source implementation of the MapReduce programming model in the distributed processing. The Hadoop runtime system with HDFS provides parallelism and concurrency to achieve system reliability. The major categories of machine roles in a Hadoop are Client machines, Master nodes and Slave nodes. The Master nodes supervise storing of data and running parallel computations on all that data using Map Reduce. The NameNode coordinates the data storage function in HDFS, while the JobTracker supervises and coordinates the parallel processing of data using Map Reduce. Slave Nodes are the vast majority of machines and do all the cloudy work of storing the data and running the computations. Each slave runs a DataNode and a TaskTracker daemon that communicates with and receives instructions from their master nodes. The TaskTracker daemon is a slave to the JobTracker likewise the DataNode daemon to the NameNode. HDFS file system is designed for storing large files with streaming data access patterns, running on clusters of commodity hardware. An HDFS cluster has two type of node operating in a master-slave pattern: A NameNode (Master) managing the file system namespace, file System tree and the metadata for all the files and directories in the tree and some number of DataNode (Workers) managing the data blocks of files. The HDFS is so large that replicas of files are constantly created to meet performance and availability requirements. Figure 1.2: Hadoop Scenario 2. LITERATURE SURVEY Keke Gai et al.[3] proposes a novel approach that can efficiently split the file and separately store the data in the distributed cloud servers, in which the data cannot be directly arrived by cloud service operators. The proposed approach is entitled as Security-Aware Efficient Distributed Storage (SAEDS) model, which is supported by the proposed algorithms, Secure Efficient Data Distributions (SED2) Algorithm and Efficient Data Conflation (EDCon) Algorithm. Our experimental analysis have assessed both security an efficiency performances. Xinyi Huang et al.[4] shows Ring signature is a promising candidate to construct an anonymous and authentic data sharing system. It allows a data owner to authenticate his data which can be put into the cloud for storage or analysis purpose. Yet the certificate verification in the public key infrastructure (PKI) setting becomes a bottleneck for this solution to be scalable. Identity-based ring signature (ID-based), it removes the process of certificate verification, can be used instead. In this paper, further enhance the security of ID-based ring signature by providing forward security. This paper provide a concrete and efficient instantiation of our approach, prove its security and provide an implementation to show its practicality. 3. IMPLEMENTATION a. Problem Statement Data sharing with a large number of participants must take into account several issues, including efficiency, data storage, data integrity and privacy of data owner. The number of users in a data sharing system could be huge and a practical system must reduce the computation and communication cost as much as possible. Otherwise it would lead to a waste of energy and shortage of storage space. b. Mathematical Implementation Setup: On an unary string input 1k where k is a security parameter, it produces the master secret key s and the common public parameters params, which include a description of a finite signature space and a description of a finite message space. KeyGen: On an input of the signer's identity ID 𝜖 {0,1}* and the master secret key s, it outputs the signer's secret signing key SID. (The corresponding public verification key QID can be computed easily by everyone.) 1. Sign: On input of a message m, a group of n users' identities Ū{Di}, where 1 ≤ i ≤ n, and the secret keys of one members SIDs , where 1 ≤ s ≤ n; it outputs an ID-based ring signature σ on the message m.
  • 3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 12 127 – 130 _______________________________________________________________________________________________ 129 IJRITCC | December 2017, Available @ http://www.ijritcc.org _________________________________________________________________________________________ 2. Verify: On a ring signature σ, a message m and the group of signers' identities Ū{Di}, as the input, it outputs T for true or F for false. depending on whether σ is a valid signature signed by a certain member in the group Ū{Di} on a message m. It must satisfy the standard consistency constraint of IDbased ring signature scheme, i.e. σ = Sign(m ,Ū{Di}, SIDs ), and IDs 𝜖 Ū{Di}, we must have Verify(σ ,m ,Ū{Di}) = T. A secure ID-based ring signature scheme should be unforgeability and signer-ambiguous. c. System Architecture Figure 3.1: System Architecture d. Algorithmic Implementation 1. ID-Based Ring Signature Algorithm: • Setup: On input an unary string 1λ where λ is a security parameter, the algorithm outputs a master secret key msk for the third party PKG (Private Key Generator) and a list of system parameters param that includes λ and the descriptions of a user secret key space D, a message space M as well as a signature space ψ . • Extract: On input a list param of system parameters, an identity IDi ϵ {0,1}* for a user and the master secret key msk, the algorithm outputs the user’s secret key ski ϵ D such that the secret key is valid for time t = 0. In this paper, we denote time as non-negative integers. When we say identity IDi corresponds to user secret key ski;0 or vice versa, we mean the pair (IDi,ski;0) is an input- output pair of Extract with respect to param and msk. Update. On input a user secret key ski;t for a time period t, the algorithm outputs a new user secret key ski;t+1 for the time period t + 1. • Sign: On input a list param of system parameters, a time period t, a group size n of length polynomial in λ , a set Ɫ = {IDi ϵ {0.1}* l i ϵ [1,n] } of n user identities, a message m ϵ M, and a secret key skπ,t ϵ D , π ϵ [1, n] for time period t, the algorithm outputs a signature ρϵψ. • Verify. On input a list param of system parameters, a time period t,a group size n of length polynomial in λ,a set Ɫ = {IDi ϵ {0.1}* l i ϵ [1,n] }of n user identities, a message m ϵ M, a signature ρϵψ, it outputs either valid or invalid. 2. Security-Aware Efficient Distributed Storage (SA-EDS): Secure Efficient Data Distributions (SED2) Algorithm : The inputs of this algorithm include the Data (D), a random split binary parameter C. The length of C is shorter than D. The outputs include two separate encrypted data α and β. 1) Input data packet D and C. Data C needs to be a nonempty set that is shorter than D. C should not be as same as D. 2) Create and initialize a few dataset, R, α, and β; assign 0 value to each of them. 3) Randomly generate a key K that is stored at the user’s special register for the purpose of encryption and decryption. We calculate the value of R by (D-C), then execute two XOR operations to obtain the data value stored in the HDFS. The data in the remote storage are denoted to α and β. We use the following formulas to gain α and β: α = C⊕K; β = R⊕K. 4) Output α and β and separately store them in the different datanode. Efficient Data Conflation (EDCon) Algorithm: EDCon algorithm is designed to enable users to gain the information by converging two data components from different datanodes. Inputs of this algorithm include two data components from datanode α, β, and K. Output is user’s original data D. 1) Input the data, α and β, that are acquired from different cloud servers. The user gains the key K from the special register. Initialize a few dataset γ, γ’, and D. 2) Do the XOR operation to both α and β by using K. Assign the value to γ and γ’, respectively. γ ← α⊕K, γ’ ← α⊕K 3) Sum up γ and γ’ and assign the summation to D, as D = γ + γ’. 4) Output D. 4. RESULT ANALYSIS The system will became more secure due to SA-EDS algorithm. While uploading file to the HDFS system, the implemented system will split the data according to nodes in such a way that even Hadoop administrator is unable to plaintext the split content so it proves more data security. Only authorized person will access the file data, so it will increase the data security. Ultimately, it increases data integrity.
  • 4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 12 127 – 130 _______________________________________________________________________________________________ 130 IJRITCC | December 2017, Available @ http://www.ijritcc.org _________________________________________________________________________________________ As shown in below graph, the system is checked with various file size and in comparison it will take less time. Similarly, System implementation also provides durability for file downloading. Figure 4.1: Time Required for File Uploading Figure 4.2: Time Required for File Downloading CONCLUSION In this architecture we implemented authentic data sharing and secure distributed big data storage architecture for protecting Big Data. Map Reduce framework has used to find the number of users who used to log into the data center. This framework protects the mapping of various data elements to each provider using implemented architecture. Though this approach requires high implementation effort, it provides valuable information that can have high impact on the next generation systems. Our future work is to extend the secure distributed big data storage for real time processing of streaming data. REFERENCES [1] Chang, F., Dean, J., Ghemawat, S., Hsieh, W. C., Wallach, D. A., Burrows, M., & Gruber, R. E. (2008). Bigtable: A distributed storage system for structured data. ACM Transactions on Computer Systems (TOCS), 26(2), 4. [2] Agrawal, Divyakant, Sudipto Das, and Amr El Abbadi. "Big data and cloud computing: current state and future opportunities." In Proceedings of the 14th International Conference on Extending Database Technology, pp. 530-533. ACM, 2011. [3] Keke Gai, Meikang Qiu, Hui Zhao,” Security-Aware Efficient Mass Distributed Storage Approach for Cloud Systems in Big Data” IEEE 2nd International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance and Smart Computing, IEEE International Conference on Intelligent Data and Security, 2016. [4] Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou ,”Cost-Effective Authentic and Anonymous Data Sharing with Forward Security”, IEEE TRANSACTIONS ON COMPUTERS VOL: 64 NO: 6 YEAR 2015 [5] K. Gai and S. Li. Towards cloud computing: a literature review on cloud computing and its development trends. In 2012 Fourth Int’l Conf. on Multimedia Information Networking and Security, pages 142–146, Nanjing, China, 2012. [6] M. Qiu, H. Li, and E. Sha. Heterogeneous real-time embedded software optimization considering hardware platform. In Proceedings of the 2009 ACM symposium on Applied Computing, pages 1637– 1641. ACM, 2009. [7] M. Qiu, E. Sha, M. Liu, M. Lin, S. Hua, and L. Yang. Energy minimization with loop fusion and multi-functional-unit scheduling for multidimensional DSP. J. of Parallel and Distributed Computing, 68(4):443–455, 2008. [8] K. Gai and A. Steenkamp. A feasibility study of Platform-as- a- Service using cloud computing for a global service organization. Journal of Information System Applied Research, 7:28–42, 2014. [9] C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou. Toward secure and dependable storage services in cloud computing. IEEE Trans. On Services Computing, 5(2):220–232, 2012. [10] Y. Li, W. Dai, Z. Ming, and M. Qiu. Privacy protection for preventing data over-collection in smart city. IEEE Transactions on Computers,PP:1, 2015.