This document discusses error detection in big data on the cloud. It proposes a method to detect files with errors or tampering in data stored on the cloud. If errors are found, the method aims to repair the file to its original state and restore it. The method uses CRC algorithms, Hamming codes, and secure hash algorithms like SHA-1 to detect errors and ensure data integrity when transmitting files to cloud storage. It implements the approach on Hadoop using MapReduce to improve scalability for large datasets. The goal is to detect errors efficiently and allow error-free transmission of data on the cloud.
Documenting Software Architectural Component and Connector with UML 2editor1knowledgecuddle
One of the major challenges facing consultants today is maintaining a level of knowledge of leading and emerging technologies, beyond the superficial or buzzword level. We need to develop a level of understanding that allows us to communicate effectively with both suppliers and customers.Digital signature scheme is a fundamental cryptographic tool which allows one to sign an electronic message and later the produced signature can be verified by the owner of the message. This paper presents a digital signature scheme and discusses the security aspects of proposed digital signature scheme. This paper provides a literature review and analysis of the security systems and the emphasis is on digital signature, hashed message algorithm. Keywords:Digital signature, Hashed message algorithm, MD5 Algorithm, Public key encryption, SHA2 Algorithm.
Documenting Software Architectural Component and Connector with UML 2editor1knowledgecuddle
One of the major challenges facing consultants today is maintaining a level of knowledge of leading and emerging technologies, beyond the superficial or buzzword level. We need to develop a level of understanding that allows us to communicate effectively with both suppliers and customers.Digital signature scheme is a fundamental cryptographic tool which allows one to sign an electronic message and later the produced signature can be verified by the owner of the message. This paper presents a digital signature scheme and discusses the security aspects of proposed digital signature scheme. This paper provides a literature review and analysis of the security systems and the emphasis is on digital signature, hashed message algorithm. Keywords:Digital signature, Hashed message algorithm, MD5 Algorithm, Public key encryption, SHA2 Algorithm.
International Journal of Computational Engineering Research(IJCER) ijceronline
nternational Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
PVS-Studio, a solution for developers of modern resource-intensive applicationsPVS-Studio
The PVS-Studio tool
the Viva64 rule set for 64-bit software analysis;
the VivaMP rule set for parallel software analysis;
the general-purpose analysis rule set.
Licensing and pricing policy forPVS-Studio
About the OOO “Program Verification Systems” company
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptxDeepikaShivam
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many techniques for provide security in cloud computing. Cloud computing performs large-scale and Complex computing. Cloud computing provide flexible solution for using users data everywhere. Here in this paper we discuss about the types of securities and related security issues in cloud environment and also her we discuss about the security techniques to provide better solutions for enhancing security in cloud computing.
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many techniques for provide security in cloud computing. Cloud computing performs large-scale and Complex computing. Cloud computing provide flexible solution for using users data everywhere. Here in this paper we discuss about the types of securities and related security issues in cloud environment and also her we discuss about the security techniques to provide better solutions for enhancing security in cloud computing.
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many techniques for provide security in cloud computing. Cloud computing performs large-scale and Complex computing. Cloud computing provide flexible solution for using users data everywhere. Here in this paper we discuss about the types of securities and related security issues in cloud environment and also her we discuss about the security techniques to provide better solutions for enhancing security in cloud computing.
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many techniques for provide security in cloud computing. Cloud computing performs large-scale and Complex computing. Cloud computing provide flexible solution for using users data everywhere. Here in this paper we discuss about the types of securities and related security issues in cloud environment and also her we discuss about the security techniques to provide better solutions for enhancing security in cloud computing.
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many technique
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
International Journal of Computational Engineering Research(IJCER) ijceronline
nternational Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
PVS-Studio, a solution for developers of modern resource-intensive applicationsPVS-Studio
The PVS-Studio tool
the Viva64 rule set for 64-bit software analysis;
the VivaMP rule set for parallel software analysis;
the general-purpose analysis rule set.
Licensing and pricing policy forPVS-Studio
About the OOO “Program Verification Systems” company
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptxDeepikaShivam
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many techniques for provide security in cloud computing. Cloud computing performs large-scale and Complex computing. Cloud computing provide flexible solution for using users data everywhere. Here in this paper we discuss about the types of securities and related security issues in cloud environment and also her we discuss about the security techniques to provide better solutions for enhancing security in cloud computing.
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many techniques for provide security in cloud computing. Cloud computing performs large-scale and Complex computing. Cloud computing provide flexible solution for using users data everywhere. Here in this paper we discuss about the types of securities and related security issues in cloud environment and also her we discuss about the security techniques to provide better solutions for enhancing security in cloud computing.
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many techniques for provide security in cloud computing. Cloud computing performs large-scale and Complex computing. Cloud computing provide flexible solution for using users data everywhere. Here in this paper we discuss about the types of securities and related security issues in cloud environment and also her we discuss about the security techniques to provide better solutions for enhancing security in cloud computing.
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many techniques for provide security in cloud computing. Cloud computing performs large-scale and Complex computing. Cloud computing provide flexible solution for using users data everywhere. Here in this paper we discuss about the types of securities and related security issues in cloud environment and also her we discuss about the security techniques to provide better solutions for enhancing security in cloud computing.
Cloud computing is everywhere. Pick up any magazine or visit almost any IT website or blog and you will be sure talk about cloud computing. There are many security issues in cloud computing like Confidentiality, Integrity and Availability (CIA). There are many technique
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
This presentation has information about what do you mean by an algorithm, what is hashing and various hashing algorithms and their applications. Approximate counting Algorithm and their applications, Counting Distinct Elements Algorithm and their applications and Frequency estimation algorithm and their applications . Also, the research papers we referenced.
Design of a lightweight set of data pipelines to scrub PII information.
Scrubbing PII information from data brings ease of sharing data.
It also helps organisations to confidently push data outside organisation for large scale analytics on the cloud.
Chapter 2Hardware2.1 The System Unit2.2 Data and PEstelaJeffery653
Chapter 2
Hardware
2.1 The System Unit
2.2 Data and Program Representa-
tion
2.2.1 Digital data and numerical data
Most computers are digital computers which use a spe-
cific language to communicate within itself in order to
process information. If there are programs running in
the background or a person is typing up a word docu-
ment for example, the computer needs to be able to in-
terpret the data that is being put into it by the human as
well as communicate to working components within it-
self. This language that digital computers use is called
binary code and is a very basic form of language com-
posed of only two figures; 1 and 0. Whereas the English
language is composed of 26 figures which we commonly
call the alphabet, computers use a language composed of
only two figures, hence its name Binary Code. Binary lit-
erally means two and refers to anything that consists of,
involves, or indicates two. The language known as Binary
Code operates on a system of 1’s and 0’s strung together.
Each 1 or 0 is referred to as a “bit.” “Bits” are the smallest
unit of data that a binary computer can recognize and ev-
ery action, memory, storage, or computation that is done
through a computer is composed of them. From playing
music through your speakers to cropping a photograph, to
typing up a document and preparing an important presen-
tation all the way down the line to browsing the internet
or picking up on a wifi signal in your area, everything
uses “bits” to complete the task needed. “Bits” string
into larger lines of information the way letters string into
words and then sentences. When eight “bits” are com-
pounded in this way they are then referred to as a “byte”.
“Bytes”, which are made up of “bits”, are commonly used
when referring to the size of the information being pro-
vided. For example, a song that is downloaded may con-
tain several kilobytes or perhaps even a few megabytes if
it is a whole c.d. and not just a single track. Likewise, pic-
tures and all other documents in general are stored on the
computer based on their size or amount of bytes they con-
tain. The amount of information that can be stored onto
a computer is also shown or displayed in bytes as is the
amount left on a computer after certain programs or doc-
uments have been stored. Since bytes can be extremely
long, we have come up with prefixes that signify how large
they are. These prefixes increase by three units of ten
so that a Kilobyte represents 1,000 bytes, a Megabyte
represents 1,000,000 bytes or one million bytes, a Giga-
byte represents 1,0000,000,000 or one billion bytes, etc.
Computers components have become so small that we can
now store larger and larger amounts of data bytes in the
same size computers resulting in the use of other larger
prefixes such as Tera, Peta, Exa, Zetta, and Yotta. Be-
low is a chart outlining the name of the prefix used and
powers of ten they symbolize.
0 1 1 0 1 0 0 0
1 1 0 1 0 0 0 0 0
1 0 0 1 1 1 0 1
0 1 0 0 1 1 1 00
1 ...
Implementation of New Modified MD5-512 bit Algorithm for CryptographyAM Publications
In the past few years, there have been significant research advances in the analysis of hash functions and it
was shown that none of the hash algorithm is secure enough for critical purposes whether it is MD5 or SHA-
1.Nowadays scientists have found weaknesses in a number of hash functions, including MD5, SHA and RIPEMD so
the purpose of this paper is combination of some function to reinforce these functions and also increasing hash code
length up to 512 that makes stronger algorithm against collision attests.
Spark Based Distributed Deep Learning Framework For Big Data Applications Humoyun Ahmedov
Deep Learning architectures, such as deep neural networks, are currently the hottest emerging areas of data science, especially in Big Data. Deep Learning could be effectively exploited to address some major issues of Big Data, such as fast information retrieval, data classification, semantic indexing and so on. In this work, we designed and implemented a framework to train deep neural networks using Spark, fast and general data flow engine for large scale data processing, which can utilize cluster computing to train large scale deep networks. Training Deep Learning models requires extensive data and computation. Our proposed framework can accelerate the training time by distributing the model replicas, via stochastic gradient descent, among cluster nodes for data resided on HDFS.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Using Transcendental Number to Encrypt BlackBerry VideoJun Steed Huang
The basic concept of motion image based wireless monitoring and control system, the main requirements from the M2M communities and related encryption method of the wireless system are described. There are four different ways to explain what is M2M video streaming solutions: Machine2Man (for security applications), Man2Man (for commercial fast delivery services), Man2Machine (for mining and oil industries) and Machine2Machine (for environmental protections). The scrambling of motion image based video signals is done by using transcendental number that is iterated over Fibonacci prime number sequence, with video time stamp and user pass phrase, the simulation and experiment are reported. The major challenge in this area is providing low computation algorithm that runs easily on embedded Java application, without compromising a hack-proof security feature.
The Machine Learning behind the Autonomous Database ILOUG Feb 2020 Sandesh Rao
Autonomous Database is one of the hottest Oracle products where we have attempted to use Machine Learning for several aspects of the service. We take a view on our current state of ML in the Autonomous Database Cloud and how do we process this data in ADW/ATP with zeppelin notebooks to find anomalies in them to troubleshoot them at a scale of several petabytes a year and conduct AIOps. We will cover some sample notebooks to some use cases we will cover are a Log Anomaly timeline which we reduce significant amounts of logs using semi-supervised machine learning techniques to reduce logs and match them in near real time. Some of the other use cases is to use convolution filters...
The Machine Learning behind the Autonomous Database ILOUG Feb 2020
ieee paper
1. International Education and Research Journal
Web Site:www.ierj.in, Email Id:submission.ierj@gmail.com
Error Detection in Big Data on Cloud
Shweta Dolhare, Snehal Gaikwad, Poonam Ghorpade.
1Shweta Dolhare, ComputerEngineering , BVCOEW, PUNE, INDIA- 411043.
2Snehal Gaikwad, ComputerEngineering , BVCOEW, PUNE, INDIA- 411043.
3 Poonam Ghorpade , ComputerEngineering , BVCOEW, PUNE, INDIA- 411043.
1shwetadolhare@gmail.com: Shweta Dolhare
2snehalgaikwad9527@gmail.com: Snehal Gaikwad
3poonamghorpade24@gmail.com: Poonam Ghorpade
Abstract: Big sensor data is prevalent in both industry and scientific research applications where
the data is generated with high volume and velocity it is difficult to process using on-hand database
management tools or traditional data processing applications. Cloud computing provides a promising platform
to support the addressing of this challenge as it provides a flexible stack of massive computing, storage, and
software services in a scalable manner at low cost. But uploading the data in cloud can with high volume and
velocity can cause damage to that file. So detecting such files from the data base is important. So in this project
we are detecting the files with data tamper or error. We also propose to repair the tampered file to its original
state and restore it again. Hence the Data in the cloud will remain unharmed.
Keywords: Cloud Computing, Service Composition, Online Web services, Hadoop, MySQL, and MapReduce.
2. International Education and Research Journal
Web Site:www.ierj.in, Email Id:submission.ierj@gmail.com
Subject: Error Detection and Correction.
Introduction:
We need to develop such a approach that will efficiently reduce time for detecting errors in big sensor data
on cloud. If any error is found then it also involves error recovery & storing the data in original format.
According to the error type and features from scale-free network we have proposed a time-efficient strategy
for detecting and locating errors in big data sets on cloud . The main aim is to reduce the time required to
detect the errors and to provide a error free transmission of data .
Materials and Methods:
Hardware Requirement:
1. 500GB HD
2. 8GB RAM
Software Requirement:
1. JAVA
2. MySQL
3. Hadoop
METHODS :
1. The Basic Idea Behind CRC Algorithms:
Where might we go in our search for a more complex function than summing? All sorts of schemes spring to
mind. We could construct tables using the digits of pi, or hash each incoming byte with all the bytes in the
register. We could even keep a large telephone book
on-line, and use each incoming byte combined with the register bytes to index a new phone number which
would be the next register value. The possibilities are limitless. However, we do not need to go so far; the next
3. International Education and Research Journal
Web Site:www.ierj.in, Email Id:submission.ierj@gmail.com
arithmetic step suffices. While addition is clearly not strong enough to form an effective checksum, it turns out
that division is, so long as the
divisor is about as wide as the checksum register. The basic idea of CRC algorithms is simply to treat the
message as an enormous binary number, to divide it by another fixed binary number, and to make the remainder
from this division the checksum. Upon receipt of the message, the receiver can perform the same division and
compare the remainder with the "checksum" (transmitted remainder).
Example: Suppose the the message consisted of the two bytes (6,23) as in the previous example. These can be
considered to be the hexadecimal number 0617 which can be considered to be the binary number 0000-0110-
0001-0111. Suppose that we use a checksum register one-byte wide and use a constant divisor of 1001, then the
checksum is the
Remainder after 0000-0110-0001-0111 is divided by 1001. While in this case, this calculation could obviously
be performed using common garden variety 32-bit registers, in the general case this is messy. So instead, we'll
do the division using good-'ol long division which you
Learnt in school (remember?). Except this time, it's in binary:
...0000010101101 = 00AD = 173 = QUOTIENT
____-___-___-___-
9= 1001 ) 0000011000010111 = 0617 = 1559 = DIVIDEND
DIVISOR 0000.,,....,.,,,
----.,,....,.,,,
0000,,....,.,,,
0000,,....,.,,,
----,,....,.,,,
0001,....,.,,,
0000,....,.,,,
----,....,.,,,
0011....,.,,,
0000....,.,,,
----....,.,,,
0110...,.,,,
0000...,.,,,
----...,.,,,
1100..,.,,,
1001..,.,,,
====..,.,,,
0110.,.,,,
0000.,.,,,
----.,.,,,
1100,.,,,
1001,.,,,
====,.,,,
0111.,,,
0000.,,,
----.,,,
1110,,,
1001,,,
====,,,
1011,,
1001,,
4. International Education and Research Journal
Web Site:www.ierj.in, Email Id:submission.ierj@gmail.com
====,,
0101,
0000,
----
1011
1001
====
0010 = 02 = 2 = REMAINDER
In decimal this is "1559 divided by 9 is 173 with a remainder of 2". Although the effect of each bit of the input
message on the quotient is not all that significant, the 4-bit remainder gets kicked about quite a lot during the
calculation, and if more bytes were added to
the message (dividend) it's value could change radically again very quickly. This is why division works where
addition doesn't. In case you're wondering, using this 4-bit checksum the transmitted message would look like
this (in hexadecimal): 06172 (where the 0617
is the message and the 2 is the checksum). The receiver would divide 0617 by 9 and see whether the remainder
was 2.
2. HUMMING CODE :
The key to the Hamming Code is the use of extra parity bits to allow the identification of a single error. Create
the code word as follows:
1. Mark all bit positions that are powers of two as parity bits. (positions 1, 2, 4, 8, 16, 32, 64, etc.)
2. All other bit positions are for the data to be encoded. (positions 3, 5, 6, 7, 9, 10, 11, 12, 13, 14, 15, 17,
etc.)
3. Each parity bit calculates the parity for some of the bits in the code word. The position of the parity bit
determines the sequence of bits that it alternately checks and skips.
Position 1: check 1 bit, skip 1 bit, check 1 bit, skip 1 bit, etc. (1,3,5,7,9,11,13,15,...)
Position 2: check 2 bits, skip 2 bits, check 2 bits, skip 2 bits, etc. (2,3,6,7,10,11,14,15,...)
Position 4: check 4 bits, skip 4 bits, check 4 bits, skip 4 bits, etc. (4,5,6,7,12,13,14,15,20,21,22,23,...)
Position 8: check 8 bits, skip 8 bits, check 8 bits, skip 8 bits, etc. (8-15,24-31,40-47,...)
Position 16: check 16 bits, skip 16 bits, check 16 bits, skip 16 bits, etc. (16-31,48-63,80-95,...)
Position 32: check 32 bits, skip 32 bits, check 32 bits, skip 32 bits, etc. (32-63,96-127,160-191,...)
etc.
4. Set a parity bit to 1 if the total number of ones in the positions it checks is odd. Set a parity bit to 0 if the
total number of ones in the positions it checks is even.
Here is an example:
A byte of data: 10011010
Create the data word, leaving spaces for the parity bits: _ _ 1 _ 0 0 1 _ 1 0 1 0
Calculate the parity for each parity bit (a ? represents the bit position being set):
Position 1 checks bits 1, 3, 5, 7, 9, 11.
? _ 1 _ 0 0 1 _ 1 0 1 0. Even parity so set position 1 to a 0: 0 _ 1 _ 0 0 1 _ 1 0 1 0
5. International Education and Research Journal
Web Site:www.ierj.in, Email Id:submission.ierj@gmail.com
Position 2 checks bits 2,3,6,7,10,11:
0 ? 1 _ 0 0 1 _ 1 0 1 0. Odd parity so set position 2 to a 1: 0 1 1 _ 0 0 1 _ 1 0 1 0
Position 4 checks bits 4,5,6,7,12:
0 1 1 ? 0 0 1 _ 1 0 1 0. Odd parity so set position 4 to a 1: 0 1 1 1 0 0 1 _ 1 0 1 0
Position 8 checks bits 8,9,10,11,12:
0 1 1 1 0 0 1 ? 1 0 1 0. Even parity so set position 8 to a 0: 0 1 1 1 0 0 1 0 1 0 1 0
Code word: 011100101010.
3. SECURE HASH ALGORITHM:
The Secure Hash Algorithm is a family of cryptographic hash functions published by the National Institute
of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS), including:
SHA-0: A retronym applied to the original version of the 160-bit hash function published in 1993 under the
name "SHA". It was withdrawn shortly after publication due to an undisclosed "significant flaw" and
replaced by the slightly revised version SHA-1.
SHA-1: A 160-bit (20 byte)hash function which resembles the earlier MD5 algorithm. This was designed by
the National Security Agency (NSA) to be part of the Digital Signature Algorithm.
SHA-2: A family of two similar hash functions, with different block sizes, known as SHA-256 and SHA-
512. They differ in the word size; SHA-256 uses 32-bit words where SHA-512 uses 64-bit words. There
are also truncated versions of each standard, known as SHA-224, SHA-384, SHA-512/224 and SHA-
512/256. These were also designed by the NSA.
SHA-3: A hash function formerly called Keccak, chosen in 2012 after a public competition among non-
NSA designers. It supports the same hash lengths as SHA-2, and its internal structure differs
significantly from the rest of the SHA family.
Results and Discussion:
In this paper, our work described how errors can detected and corrected and data retransmit to the storage
criteria cloud. First, it aims at transmission of data in encrypted format with the help of SHA-1 algorithm from
sender to receiver. Second, to improve the scalability and efficiency in “Big Data” environment, we have
implemented it on a Map Reduce framework in Hadoop platform. Finally, the data appears at receiver side get
decrypted by the same algorithm. Then it will check for the errors, if any error found then it will retransmit that
respective data. It will only detect specific types of errors.
Acknowledgments:
First and foremost we would like to express our gratitude to Prof. S. B. Jadhav, Our internal guide, for her
guidance and support throughout the project. Without her cooperation, it would have been extremely difficult
for us to complete the project part of this semester.
6. International Education and Research Journal
Web Site:www.ierj.in, Email Id:submission.ierj@gmail.com
We would also like to thank the HOD of the computer department, Prof. D. D. Pukale, as well as the entire
teaching and non-teaching staff of the Computer Department for giving us an opportunity to work on such an
exciting project.
Last but not the least; we are extremely grateful to our family, friends and colleagues who have supported us
right from the inception of the project. Thanks for all your encouragement and support.
References and footnotes:
1. A Time Efficient Approach for Detecting Errorsn in Big Sensor Data on Cloud
Chi Yang, Chang Liu, Xuyun Zhang, Surya Nepal, and Jinjun Chen, Senior Member, IEEE
2. Sakr, A. Liu, D. Batista, and M. Alomari, “A Survey of Large Scale Data Management
Approaches in Cloud Environments,” IEEE Comm. Surveys & Tutorials, vol. 13, no. 3, pp.
311-336, Third Quarter 2011.
3. M.C. Vuranand and I.F. Akyildiz, “Error Control in Wireless Sensor Networks: A Cross Layer
Analysis,” IEEE Trans. Networking, vol. 17, no. 4, pp. 1186-1199, Aug. 2009.
4. C. Liu, J. Chen, T. Yang, X. Zhang, C. Yang, R. Ranjan, and K. Kotagiri, “Authorized public
auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates,”
IEEE Trans. Parallel and Distributed Systems, vol. 25, no. 9, pp. 2234–2244, Sept. 2014
5. “Sensor Cloud,” http://www.sensorcloud.com/, accessed on 30, Aug. 2013.
6. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, A. Konwinski,
G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A
View of Cloud Computing,” Comm. the ACM, vol. 53, no. 4,
P p. 50-58, 2010.
7. “Big Data: Science in the Petabyte Era: Community Cleverness
Required,” Nature, vol. 455, no. 7209, p. 1, 2008.
7. International Education and Research Journal
Web Site:www.ierj.in, Email Id:submission.ierj@gmail.com
Figures:
System Architecture :
Block Diagram :