SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 35 
SECURE DATA STORAGE AND RETRIEVAL IN THE CLOUD Shashi Kant Gupta1, Faisal Siddiqui2 1Student (CS), Azad Institute of Engineering & Technology, Lucknow, 2Assistant Professor in CSE Dept. MCSCET, Lucknow Abstract With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the world generate a large amount of data daily. This data would be more useful to cooperating organizations if they were able to share their data. Two major obstacles to this process of data sharing are providing a common storage space and secure access to the shared data. In this paper we address these issues by combining cloud computing technologies such as Hive and Hadoop with XACML policy based security mechanisms that provide fine-grained access to resources. HIVE supports queries expressed in SQL-like language called HiveQL which are compiled into MR jobs that are executed on Hadoop. We further present a web-based application that uses this combination and allows collaborating organizations to securely store and retrieve large amounts of data. Keywords—Cloud Computing, Hadoop, Hive, Web applications 
--------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION The World Wide Web (WWW) is envisioned as a system of interlinked hypertext documents that are accessed using the Internet [1]. With the emergence of organizations that provide e-commerce such as Amazon.com1 and social network applications such as Facebook2 and Twitter3 on the World Wide Web, the volume of data generated by them daily is massive [2]. It was estimated that the amount of data that would be generated by individuals in the year 2009 would be more than that generated in the entire history of mankind through 2008 [3]. The large amount of data generated by one organization could be valuable to other organizations or researchers if it can be correlated with the data that they have [4]. This is especially true for various governmental intelligence organizations. This has led to another trend of forming partnerships between business organizations and universities for research collaborations [5] and between business organizations for data sharing to create better applications [6]. 
The two main obstacles to this process of collaboration among organizations are arranging a large, common data storage area and providing secure access to the shared data. Organizations across the world invest a great deal of resources on minimizing storage costs and with the introduction of cloud-based services it is estimated that this cost would be reduced further [7]. Additionally, organizations spend a large amount of their yearly budget on security but this is still not sufficient to prevent security breaches [8], [9]. In this paper we present a web-based system (Hive Access Control4) that aims to achieve the previously stated goals by combining cloud computing technologies with policy-based security mechanisms. This idea comes in part from the recommendations of the Cloud Security Alliance for Identity and Access Management [10] and our previous work using XACML policies [11]. We have combined the Hadoop Distributed File System [12] with Hive [13] to provide a common storage area for participating organizations. Further, we have used a XACML [14] policy- based security mechanism to provide fine-grained access controls over the shared data. Users of our system are divided into groups based on the kinds of queries that they can run such as SELECT and INSERT. Our system provides a secure login feature to users based on a salted hash technique. When a user logs into our sytem, based on the group that the user belongs to he/she is provided with different options. We allow collaborating organizations to load data to the shared storage space in the form of relational tables and views. Users can also define fine-grained XACML access control policies on tables/views for groups of users. Users can then query the entire database based on the credentials that they have. We have provided some basic query rewriting rules in our system that abstract users from the query language of Hive (HiveQL). This allows them to enter regular SQL queries in the web application which are translated into HiveQL using the basic rewriting rules. Our system also allows new users to register but only a designated special user “admin” can assign these users to the appropriate groups. The contributions of this paper include: 
 Mechanism to load and query shared data securely that is stored in HDFS using Hive. 
 Additional layer of security above HDFS and Hive using a XACML policy-based mechanism. 
 Basic query rewriting rules that abstract a user from HiveQL and allow him/her to enter SQL queries. 
 Incorporation of the above mechanisms into a web- based system. 
This paper is structured as follows: Section II presents the related work in the area of secure storage and retrieval of information in the cloud. In section III we present our architecture for solving the problem of secure large scale data sharing based on combining cloud computing technologies with XACML policy based security mechanisms. Further in section IV we present the details of our implementation by giving performance graphs and some sample screenshots. Finally section V presents our conclusions and future work.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 36 
2. RELATED WORK The aim of our paper is to combine cloud computing technologies with security mechanisms so that cooperating organizations can share vast amounts of data securely. Since the birth of cloud computing technologies there has been much interest generated among researchers, business organizations and media outlets about security issues with these technologies [15], [16]. This interest has resulted in large-scale research and development efforts from business organizations [17], [18], [19]. A part of the work related to security in the cloud has been focused on implementing security at the infrastructure level. Reference [19] presents the vision for security design in Hadoop. This document presents a few security risks with Hadoop and outlines solutions to them. These solutions have been implemented in beta versions of Hadoop v0.20. This development effort is an important step towards securing cloud infrastructures but is only in its inception stage. The goal of our system is to add another layer of security above the security offered by Hadoop. Once the security offered by Hadoop becomes robust it will only strengthen the effectiveness of our system. Amazon Web Services (AWS) is a web services infras- tructure platform in the cloud [20]. Reference [18] offers an overview of security aspects that are relevant to AWS such as physical security, network security and AWS security. Our system is different from AWS in the sense that our cloud in- frastructure is completely private versus AWS’s infrastructure that is in the public domain. This distinguishing factor makes our infrastructure “trusted” over the AWS infrastructure where data must be stored in an encrypted format since AWS is in the public domain. In the future we plan to extend our work to include both, public and private clouds. The Windows Azure platform is an Internet-scale cloud computing services platform hosted in Microsoft data centers [17]. Reference [21] provides an overview of the security chal-lenges and recommended approaches to design and develop more secure applications for the Windows Azure platform. However according to reference [22], the Windows Azure platform is suitable for building new applications, but it is not optimal to migrate existing applications. The main reason that we did not use the Windows Azure platform is that we wanted to port our existing application to an open source system instead of writing our code from scratch as would be needed with Windows Azure. We also did not want to be tied to the Windows framework but rather allow our work to be used on any kind of system. We will be able to test our system on the Windows Azure platform once the platform supports the use of virtual machines (VM’s) to run existing applications [22]. 
As we see from the discussions above, the research efforts identified in our study of related work have either just started or fit a completely different domain. We believe, to the best of our knowledge that our system is the first of its kind to introduce a layer of security that is independent of the security provided by current cloud infrastructures. 
3. SYSTEM ARCHITECTURE In this section we present our architecture that securely provides access to a large common storage space (the “Cloud”) thus allowing cooperating organizations to share data reliably. We begin by giving an overview of the architecture followed by a discussion of each of its component layers. Figure 1 shows the architecture of our system. Each rectangle in the figure represents a different component of our frame- work. The various line styles for arrows indicate the flow of control for a specific task that can be accomplished with this system. Next we present each of the component layers in the architecture. 3.1 The Web Application Layer The Web Application layer is the only interface provided by our system to the user to access the cloud infrastructure. We provide different functions based on the permissions assigned to a user. The web application provides a login page that can be used by any user to log into the system. We use the Java simplified encryption (JASYPT) library’s [23] salted hash technique to store usernames and passwords in a file. Further, that file is stored in a secure location that is not accessible to any user. The system currently supports three types of users, 
 users who can only query the existing tables/views, 
 users who can create tables/views and define XACML policies on them in addition to querying all tables/views, and finally, 
 a special “admin” user who in addition to the previous functions can also assign new users to either of the above categories. 
3.2 The ZQL Parser Layer The ZQL Parser [24] layer takes as input any query submitted by a user and either proceeds to the XACML policy evaluator if the query is successfully parsed or returns an error message to the user. The ZQL Parser is a SQL parser written in Java that takes a SQL query as input and fills different Java Vectors with different parts of the query [24]. For example, given the query, SELECT a.id, a.name FROM a WHERE a.id > 5;, 
the ZQL Parser parses the query and constructs different Java Vectors for every part of the query (SELECT, FROM and WHERE). In our system, the Vector of attribute names in the SELECT clause for the query above is returned to the web application layer to be used in displaying the results returned by the query. The Vector of table/view names in the FROM clause is passed to the XACML Policy Evaluator to ensure that the current user has permissions to access all tables/views specified in the query. If the evaluator determines that the current user has the required permissions,
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 37 
the query is processed further, else an error message is returned to the web application layer. The ZQL Parser currently supports the SQL DELETE, INSERT, SELECT and UPDATE statement. 
Fig. 1 System Architecture 
Our future work involves adding support for other keywords such as CREATE, DROP etc. 3.3 The XACML Policy Layer 
The eXtensible Access Control Markup Language (XACML) is a XML-based language that is used to define access control policies on resources. The same language is also used to determine whether access is allowed for a particular resource based on the policy defined for that resource [14]. The following subsections explain how we have defined and used XACML policies in our framework. 
In our system, for every table/view that a user wants to create they are given the option of uploading their own pre-defined XACML policy or having the framework build a policy for them. If a user selects the latter option they must also specify the kinds of queries (e.g. INSERT, SELECT etc.) that will be allowed on the table/view. We then use Sun’s XACML implementation [27] to build a policy for that table/view with
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 38 
the groups specified by that particular user. 1) XACML Policy Builder: In our framework the tables and views defined by users are treated as resources for building XACML policies. Further, we have defined role based access control [25], [26] policies on these resources based on the kinds of queries that are provided by our system. For every type of query supported by our framework we define a mapping between this type and all users that are allowed to run that kind of query. A sample listing of such a mapping is given below, INSERT admin user1 user2 SELECT admin user1 user3 2) XACML Policy Evaluator: Our system uses Sun’s XACML implementation [27] to evaluate if the current user has access to all tables/views that are defined in any user query. If permission is granted for all tables/views then the query is processed further, else an error message is returned to the user. The policy evaluator is used both, during regular user query execution as well as during view creation since the only way to create a view in Hive is by specifying a SELECT query on the existing tables/views. The current user must have access to all tables/views specified in this SELECT query before the view can be created. 3.4 The Basic Query Rewriting Layer This layer enables us to add another layer of abstraction between the user and HiveQL by allowing users to enter SQL queries that are rewritten according to HiveQL’s syntax. In our current system we provide two basic rewriting rules for user-specified SQL queries, 
 HiveQL does not allow multiple tables in the FROM clause of a query, but rather expects this kind of query to be given as a sequence of JOIN statements. The user is abstracted from this fact by allowing him/her to enter a regular SQL query with multiple tables in the FROM clause that we transform to a sequence of JOIN statements in conformance with HiveQL’s syntax. As an example, 
SELECT a.id, b.age FROM a, b; ⇒ SELECT a.id, b.age FROM a JOIN b; 
 HiveQL uses a modified version of SQL’s INSERT- SELECT statement, INSERT OVERWRITE TABLE <tablename> SELECT rather than INSERT INTO <tablename> SELECT. Again we abstract this from the user by allowing him/her to enter the traditional INSERT INTO <tablename> SELECT which we then rewrite into HiveQL’s INSERT OVERWRITE TABLE <tablename> SELECT. As an example, 
INSERT INTO a SELECT * FROM b; 
⇒ INSERT OVERWRITE TABLE a SELECT * FROM b; 
As part of our future work we plan to extend these basic rewriting rules with more complicated rules in a complete query rewriting engine. 
3.5 The Hive Layer Hive is a data warehouse infrastructure built on top of Hadoop [13]. Hive provides the ability to structure the data in the underlying HDFS as well as to query this data. The arrows in Figure 1 between the tables in this layer and the files in the HDFS layer indicate that each table in Hive is stored as a file in the HDFS. These files contain the data that this table represents. There are no arrows between the views in this layer and the files in the HDFS layer since a view is only a logical concept in Hive that is created with a SELECT query. In our framework, Hive is used to structure the data that will be shared by collaborating organizations. Further we use Hive’s SQL-like query language, HiveQL, to enable access to this data. The advantage of using Hive in our system is that users can query the data using a familiar SQL- like syntax. 3.6 The Hadoop Distributed File System (HDFS) Layer The Hadoop Distributed File System (HDFS) is a distributed file system that is designed to run on basic hardware [12]. The HDFS layer in our framework stores the data files corresponding to tables that are created in Hive [28]. Our security assumption is that these files can neither be accessed using Hadoop’s [29] web interface nor Hadoop’s command line interface but only by using our system. 4. IMPLEMENTATION DETAILS AND RESULTS In this section we present the implementation details of our system by providing performance graphs for the insert and query processes for tables with different sizes. We begin by giving a brief description of our implementation setup followed by the implementation details. 4.1 Implementation Setup Our implementation was done on a 19 node cluster with a mix of two different configurations for nodes. Further, all nodes are in the same rack. Out of the 19 nodes 11 nodes ran Ubuntu v10.04 Lucid Lynx, on an Intel Pentium 4, 3.2GHz CPU with 4GB SDRAM 400 MHz memory and a 40GB divided into sub-queries manually since our web application does not support this feature. We also think that the results obtained by running the queries selected above is indicative of the performance of all the other TPC-H benchmark queries that can be run on our system. 4.2 Experimental Datasets
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 39 
We have used two different datasets to test the performance of our system versus Hive. The first dataset is the Freebase [30] system which is an open repository of structured data that has approximately 12 million topics or entities. An entity is aperson, place or thing with a unique identifier. We wanted to simulate an environment of cooperating organizations by using the people, business, film, sports, organization and awards datasets from the Freebase system. We assume that each dataset is loaded into our system by a different organization and further, users can run various queries across these datasets based on their permissions. The queries we have used to test our implementation were created by us based on the datasets of the Freebase system. The second dataset we have used to test our system is the well known TPC-H benchmark [31]. The TPC-H benchmark is a decision support benchmark that consists of a schema that is typical to any business organization. The benchmark contains 8 tables and provides 22 queries with a high degree of complexity. We have used this benchmark to test the performance of our system versus Hive in performing complex queries. The TPC-H benchmark provides a tool for data generation (DBGEN) and a tool for query generation (QGEN). We have used DBGEN to generate datasets with varying Scale Factor’s (SF) from 1 to 1000 as specified in the benchmark document. The reader should note that a scale factor of 1 is approximately 1GB of data. Thus we have tested our system with data sizes varying from 1GB to 1000GB. The smaller of these datasets (SF=1, SF=10, and SF=30) are used to test the loading performance of our system versus Hive. On the other hand, the larger datasets (SF=100, SF=300, and SF=1000) are used to run a few of the benchmark queries. 
(a) Data Loading Time 
(b) “SELECT * FROM” Query Time Fig. 2 Experimental comparison between our application and Hive for the Freebase dataset The number of tuples, N = [actual table size] We have used queries Q1, Q3, Q6 and Q13 of the TPC-H benchmark to test our system. These queries were randomly selected after applying the following criterion to the study given in [32]. The original query does not need to be divided into subqueries manually since our web application does not support this feature. We also think that the results obtained by running the queries selected above is indicative of the performance of all the other TPC-H benchmark queries that can be run on our system. 4.3 Implementation Results We have tested our web-based system for performance metrics such as data loading and querying times. Further, we have compared these metrics with the Hive command line interface (CLI). All query times that are used in performance graphs and result tables in this subsection are averaged over three separate runs. We ran two sets of experiments, one using the Freebase system and the other using the TPC-H benchmark. Figure 2 shows a comparison of the data loading and querying time of our application versus Hive for the Freebase datasets. As we see from figure 2(a) the data loading time for our application is almost the same as Hive’s time for small tables (0.1 and 0.3 million tuples). As the number of tuples increases to 0.5 million and then to 1.67 million tuples our system gets slower than Hive at loading tuples. This is primarily because of the overhead associated with establishing a connection with the Hive database as well as the time associated with building a XACML policy for the table being loaded. 
Figure 2(b) shows a comparison of the running time for a simple “SELECT * FROM” query between our application and Hive. We have run the query on the same tables that were used for data loading in figure 2(a) but we restricted our results by using the LIMIT clause to only the first 100 tuples.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 40 
This was done to avoid the large time difference that would occur between our application and Hive’s CLI since we have implemented a paging mechanism on the results whereas Hive’s CLI would display all results on the screen. We see that our application times are slightly faster than the running time for the query on the Hive CLI. This difference is because of the time taken by the Hive CLI to display the results of the query on the screen. Both running times are fast because Hive does not need to run a Map-Reduce [33] job for this query but simply needs to return the whole file for the corresponding table from the HDFS. 
Table 1: Comparison of running times for various queries on our system versus hive for the freebase system 
Query Type 
Query 
System Time 
Hive Time 
(sec) 
(sec) 
Query Table SELECT name, id FROM Person LIMIT 100; 
27.1 
28.4 
Query Table SELECT id FROM Person; 
30.2 
30.5 
WHERE name = ’Frank Mann’ LIMIT 100; 
Create View CREATE VIEW Person View AS 
0.19 
0.114 
SELECT name, id FROM Person; 
Query View SELECT name, id FROM Person View LIMIT 100; 
22.5 
23.2 
Query View SELECT id FROM Person View 
30.1 
29.3 
WHERE name = ’Sachin’ LIMIT 100; 
Join Query SELECT p.name, d.place of death 
70 
68.6 
FROM Person p JOIN Deceased people d 
ON (p.id = d.id AND p.name = d.name) 
LIMIT 100; 
Aggregate Query SELECT p.name, COUNT(DISTINCT p.id) 
64 
64.3 
FROM Person p GROUP BY p.name LIMIT 100; 
Insert Query INSERT INTO Person Insert 
29.2 
27.77 
SELECT name,id,profession FROM Person; 
We have also run a number of other queries and compared the running times of these queries on our system versus Hive for the Freebase system. These queries test the performance of our system in creating and querying views/tables versus Hive. We have tested a variety of queries including insert, create, select, aggregate and join queries. We present each query and the average running time on our system and on Hive in table I. Figure 3 shows a comparison of the data loading time of our application versus Hive for the “Customer” and “Supplier” tables for SF = 1, 10 and 30 from the TPC-H benchmark. Our system currently allows users to upload data files that are at most 1GB in size. The TPC-H benchmark’s DBGEN tool generates files for the “Customer” and “Supplier” tables for SF = 1, 10, and 30 that are less than 1GB in size. These are the reasons why we have selected the “Customer” and “Supplier” tables with SF = 1, 10, and 30 to compare the data loading performance of our system versus Hive. Figure 3 shows us results that are similar to the results
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 41 
obtained from figure 2(a). Our system performs similar to Hive at the smallest SF of 1 and as the SF increases our system gets slower than Hive for data loading. Again, this difference in execution performance is because of the overhead associated with the Hive database connection and XACML policy generation. The trend for both, our system and Hive is linear as expected, since the size of these tables increases linearly with the SF.Table II shows a comparison of the performance of four TPC-H benchmark queries on our system versus Hive. We see that our system performs as well as the Hive command line interface for the selected queries. Based on the query performance times for both, our system and Hive, we see that as the size of the tables increases the time for benchmark query execution also increases, as expected. In a production environment such queries would not be performed at runtime on large datasets. We would rather run these queries offline and could store the results in Hive as views. We could then use a query rewriting mechanism to return these results efficiently. 5. CONCLUSIONS AND FUTURE WORK 
In this paper we have presented a system that allows cooperating organizations to securely share large amounts of data. We have ensured that the organizations have a large common storage area by using Hadoop. Further, we have used Hive to present users of our system with a structured view of the data and to also enable them to query the data with a SQLlike language. We have used a simple salted hash mechanism to authenticate users in the current version of our system. We plan to implement a more sophisticated technique for authentication in future versions of our system. In this paper we have used the ZQL parser to parse any SQL query that is input by the user. We plan to extend this parser with support for keywords such as DESCRIBE, JOIN etc that are currently not supported in ZQL. We have abstracted the user from the use of Hive by implementing some basic query rewriting rules. A part of our future work is to implement materialized views in Hive and extend the basic query rewriting rules into a complete engine for Hive that takes into account all existing tables/materialized views and the XACML policies defined on them. We have provided fine- grained access control on the shared data using XACML policies. We have also incorporated role based access control in our framework based on the kinds of queries that users will submit to our system. In the current version of our system we only provide support for two types of keywords, INSERT and SELECT, as groups for XACML policies. In the future we plan to extend our system to include other keyword based groups such as DELETE, UPDATE etc. We also plan to test the impact of using different values for parameters provided by Hadoop and Hive on query execution performance. Lastly, the current system is implemented in a private cloud which will be extended to include public clouds such as Amazon Web Services and Amazon Simple Storage Services in future versions 
(a) “Customer” Table Loading Time (b) “Supplier” Table Loading Time Fig. 3 Comparison of loading and querying times between our application and Hive for the TPC-H benchmark Table 2: Comparison of running times for TPC-H benchmark queries on our system versus hive 
Query 
Scale Factor (SF) 
System Time (sec) 
Hive Time (sec) 
100 605.24 590.663 Q6 300 1815.454 1806.4 1000 6240.33 6249.679 100 870.704 847.52 Q13 300 1936.351 1910.186 1000 7322.541 7304.392
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 42 
100 1210.04 1209.786 Q1 300 5407.14 5411.616 1000 42780.67 42768.83 100 1675.19 1670.765 Q3 300 7532.23 7511.523 1000 61411.21 61390.71 
ACKNOWLEDGEMENTS The work carried out in this paper was guided by Mr. Faisal Siddiqui, Assistant Professor, CSE Department, Dr. MCSCET, LKO on secure cloud computing. I thank Mr. Faisal Siddiqui for his support and encouragement of my work. REFERENCES [1]. World Wide Web. http://en.wikipedia.org/wiki/World Wide Web. [2]. Samuel Axon. Facebook Will Celebrate 500 Million Users Next Week. http://news.yahoo.com/s/mashable/20100717/tcmashable/facebook will celebrate 500 million users next week, July 2010. [3]. Andreas Weigend. The Social Data Revolution(s). http://blogs.hbr.org/now-new-next/2009/05/the-social-data- revolution.html, May 2009. [4]. Ganesh Variar. Data Explosion: A guide to connecting the dots. http://advice.cio.com/ganesh variar/data explosion a guide to connecting the dots?source=rss Blogs and Discussion All, January 2010. [5]. Nokia Research Center - Open Innovation. http://research.nokia.com/openinnovation. [6]. Salesforce.com and Facebook Create New Opportunities for Enterprise Applications to Serve Facebook’s 120 Million Users. http://www.facebook.com/press/releases.php?p=63948, November 2008. [7]. Ann All. Cloud Data Storage: It’ll Still Cost +You, So Give It Some Thought. http://www.itbusinessedge.com/cm/blogs/all/cloud-data- storage-itll-still-cost-you-so-give-it-some- thought/?cs=38733, January 2010. [8]. John Sawyer. Tech Insight: How To Cut Security Costs Without A Lot Of Pain. http://www.darkreading.com/smb- security/security/ management/showArticle.jhtml?articleID=226200159, July 2010. [9]. First Annual Cost of Cyber Crime Security. Technical report, Ponemon Institute, July 2010. [10]. Subra Kumaraswamy, Sitaraman Lakshminarayanan, Michael Reiter Joseph Stein, and Yvonne Wilson. Domain 12: Guidance for Identity & Access Management V2.1, April 2010. [11]. Pranav Parikh. Secured Information Integration with a Semantic Webbased Framework. Master’s thesis, The University of Texas at Dallas, December 2009. 
[12]. Dhruba Borthakur. HDFS Architecture. http://hadoop.apache.org/common/docs/current/hdfs design.html, 2010. 
[13]. Apache Hive. http://wiki.apache.org/hadoop/Hive. 
[14]. Tim Moses. eXtensible Access Control Markup Language (XACML) Version 2.0. http://docs.oasis- open.org/xacml/2.0/accesscontrol-xacml-2.0-core-spec- os.pdf, February 2005. [15]. David Talbot. How Secure Is Cloud Computing? http://www.technologyreview.com/computing/23951/, November 2009. [16]. Robert L. Mitchell. Cloud storage triggers security worries. http://www.computerworld.com/s/article/340438/Confidence in the Cloud?, July 2009. [17]. Windows Azure Platform - Whitepapers. http://www.microsoft.com/windowsazure/whitepapers/. [18]. Amazon Web Services: Overview of Security Processes. http://awsmedia.s3.amazonaws.com/pdf/AWS Security Whitepaper.pdf, November 2009. [19]. Owen O’Malley, Kan Zhang, Sanjay Radia, Ram Marti, and Christopher Harrell. Hadoop Security Design. http://bit.ly/75011o, October 2009. [20]. Amazon Web Services. http://aws.amazon.com/. [21]. Andrew Marshall, Michael Howard, Grant Bugher, and Brian Harden. Security Best Practices For Developing Windows Azure Applications. http://download.microsoft.com/download/7/3/E/73E4EE93- 559F-4D0F-A6FC-7FEC5F1542D1/ SecurityBestPracticesWindowsAzureApps.docx [22]. Jon Brodkin. Microsoft Windows Azure and Amazon EC2 on collision course. http://www.networkworld.com/news/2010/062510- microsoft-azure-amazon-ec2.html, June 2010. [23]. JASYPT - Java simplified encryption. http://www.jasypt.org/index.html. [24]. Zql: a Java SQL parser. http://www.gibello.com/code/zql/. [25]. David F. Ferraiolo and D. Richard Kuhn. Role-Based Access Controls. In National Computer Security Conference, pages 554–563, 1992. [26]. Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Role-Based Access Control Models. IEEE Computer, 29(2):38–47, 1996. [27]. Sun XACML Implemetation. http://sunxacml.sourceforge.net/. 
[28]. Ashish Thusoo, Joydeep Sen Sarma, Namit Jain, Zheng Shao, Prasad Chakka, Suresh Anthony, Hao Liu, Pete Wyckoff, and Raghotham Murthy. Hive - A Warehousing
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 43 
Solution Over a Map-Reduce Framework. PVLDB, 2(2):1626–1629, 2009. [29]. Apache Hadoop. http://hadoop.apache.org/. [30] Freebase. http://www.freebase.com/. [31]. TPC BENCHMARK H. http://tpc.org/tpch/spec/tpch2.11.0.pdf. [32]. Running the TPC-H Benchmark on Hive. https://issues.apache.org/jira/secure/attachment/12416257/TPC-H on Hive 2009-08-11.pdf. [33]. Apache MapReduce. http://hadoop.apache.org/mapreduce/. Websites [1]. 1http://www.amazon.com/ [2]. 2http://www.facebook.com/ [3]. 3http://twitter.com/ [4]. 4http://cs.utdallas.edu/secure-cloud-repository/

More Related Content

What's hot

Iaetsd time constrained self-destructing
Iaetsd time constrained self-destructingIaetsd time constrained self-destructing
Iaetsd time constrained self-destructing
Iaetsd Iaetsd
 
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud StorageA Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
ijtsrd
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
Associate Professor in VSB Coimbatore
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com
 
Cloud Data Security and Secure Data Sharing Methods
 Cloud Data Security and Secure Data Sharing Methods Cloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing Methods
IJCSIS Research Publications
 
Research Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformResearch Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud Platform
Samuel Borthwick
 
Exploring Cloud Encryption
Exploring Cloud EncryptionExploring Cloud Encryption
Exploring Cloud Encryption
Samuel Borthwick
 
Security and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud ArchitectureSecurity and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud Architecture
ijsrd.com
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIntegrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
IJERA Editor
 
Cloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing MethodsCloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing Methods
IJCSIS Research Publications
 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
IRJET Journal
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
eSAT Journals
 
Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...
eSAT Publishing House
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
irjes
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
 
A Third Party Auditor Based Technique for Cloud Security
A Third Party Auditor Based Technique for Cloud SecurityA Third Party Auditor Based Technique for Cloud Security
A Third Party Auditor Based Technique for Cloud Security
ijsrd.com
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
IJERA Editor
 

What's hot (20)

Iaetsd time constrained self-destructing
Iaetsd time constrained self-destructingIaetsd time constrained self-destructing
Iaetsd time constrained self-destructing
 
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud StorageA Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
Cloud Data Security and Secure Data Sharing Methods
 Cloud Data Security and Secure Data Sharing Methods Cloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing Methods
 
Research Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformResearch Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud Platform
 
Exploring Cloud Encryption
Exploring Cloud EncryptionExploring Cloud Encryption
Exploring Cloud Encryption
 
Security and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud ArchitectureSecurity and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud Architecture
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIntegrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
 
Cloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing MethodsCloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing Methods
 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
 
A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...A cloud storage system for sharing data securely with privacy preservation an...
A cloud storage system for sharing data securely with privacy preservation an...
 
Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
A Third Party Auditor Based Technique for Cloud Security
A Third Party Auditor Based Technique for Cloud SecurityA Third Party Auditor Based Technique for Cloud Security
A Third Party Auditor Based Technique for Cloud Security
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 

Viewers also liked

Automatic anti glare system for night time driving using liquid crystal screens
Automatic anti glare system for night time driving using liquid crystal screensAutomatic anti glare system for night time driving using liquid crystal screens
Automatic anti glare system for night time driving using liquid crystal screens
eSAT Publishing House
 
Effect of skew angle on static behaviour of reinforced
Effect of skew angle on static behaviour of reinforcedEffect of skew angle on static behaviour of reinforced
Effect of skew angle on static behaviour of reinforced
eSAT Publishing House
 
Holographic optical elements for beautification
Holographic optical elements for beautificationHolographic optical elements for beautification
Holographic optical elements for beautification
eSAT Publishing House
 
A simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor networkA simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor network
eSAT Publishing House
 
Study of brass wire and cryogenic treated brass wire on titanium alloy using ...
Study of brass wire and cryogenic treated brass wire on titanium alloy using ...Study of brass wire and cryogenic treated brass wire on titanium alloy using ...
Study of brass wire and cryogenic treated brass wire on titanium alloy using ...
eSAT Publishing House
 
Comparison of symmetrical and asymmetrical cascaded
Comparison of symmetrical and asymmetrical cascadedComparison of symmetrical and asymmetrical cascaded
Comparison of symmetrical and asymmetrical cascadedeSAT Publishing House
 
Case study on slender multi storey rc building with brick infill
Case study on slender multi storey rc building with brick infillCase study on slender multi storey rc building with brick infill
Case study on slender multi storey rc building with brick infill
eSAT Publishing House
 
Hazard object reporting to respective authorities
Hazard object reporting to respective authoritiesHazard object reporting to respective authorities
Hazard object reporting to respective authorities
eSAT Publishing House
 
Separation of mineral matter from indian coal by using
Separation of mineral matter from indian coal by usingSeparation of mineral matter from indian coal by using
Separation of mineral matter from indian coal by using
eSAT Publishing House
 
Verification of uart ip core using uvm
Verification of uart ip core using uvmVerification of uart ip core using uvm
Verification of uart ip core using uvm
eSAT Publishing House
 
Comparative study of various supervisedclassification methodsforanalysing def...
Comparative study of various supervisedclassification methodsforanalysing def...Comparative study of various supervisedclassification methodsforanalysing def...
Comparative study of various supervisedclassification methodsforanalysing def...
eSAT Publishing House
 
Status of noise in yeshwanthpur circle (bangalore north) based on on site dat...
Status of noise in yeshwanthpur circle (bangalore north) based on on site dat...Status of noise in yeshwanthpur circle (bangalore north) based on on site dat...
Status of noise in yeshwanthpur circle (bangalore north) based on on site dat...
eSAT Publishing House
 
Performance of slope under seismic conditions
Performance of slope under seismic conditionsPerformance of slope under seismic conditions
Performance of slope under seismic conditions
eSAT Publishing House
 
Design issues and challenges of reliable and secure transmission of medical i...
Design issues and challenges of reliable and secure transmission of medical i...Design issues and challenges of reliable and secure transmission of medical i...
Design issues and challenges of reliable and secure transmission of medical i...
eSAT Publishing House
 
Locational marginal pricing framework in secured dispatch scheduling under co...
Locational marginal pricing framework in secured dispatch scheduling under co...Locational marginal pricing framework in secured dispatch scheduling under co...
Locational marginal pricing framework in secured dispatch scheduling under co...
eSAT Publishing House
 
Impact resistance capacity of a green ultra high performance hybrid fibre rei...
Impact resistance capacity of a green ultra high performance hybrid fibre rei...Impact resistance capacity of a green ultra high performance hybrid fibre rei...
Impact resistance capacity of a green ultra high performance hybrid fibre rei...
eSAT Publishing House
 
Cnt reinforced basalt fiber based ship hulls
Cnt reinforced basalt fiber based ship hullsCnt reinforced basalt fiber based ship hulls
Cnt reinforced basalt fiber based ship hulls
eSAT Publishing House
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
eSAT Publishing House
 
Implementation of linux based uart device driver
Implementation of linux based uart device driverImplementation of linux based uart device driver
Implementation of linux based uart device driver
eSAT Publishing House
 
Selection of drains coverings type in eastern of egypt
Selection of drains coverings type in eastern of egyptSelection of drains coverings type in eastern of egypt
Selection of drains coverings type in eastern of egypt
eSAT Publishing House
 

Viewers also liked (20)

Automatic anti glare system for night time driving using liquid crystal screens
Automatic anti glare system for night time driving using liquid crystal screensAutomatic anti glare system for night time driving using liquid crystal screens
Automatic anti glare system for night time driving using liquid crystal screens
 
Effect of skew angle on static behaviour of reinforced
Effect of skew angle on static behaviour of reinforcedEffect of skew angle on static behaviour of reinforced
Effect of skew angle on static behaviour of reinforced
 
Holographic optical elements for beautification
Holographic optical elements for beautificationHolographic optical elements for beautification
Holographic optical elements for beautification
 
A simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor networkA simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor network
 
Study of brass wire and cryogenic treated brass wire on titanium alloy using ...
Study of brass wire and cryogenic treated brass wire on titanium alloy using ...Study of brass wire and cryogenic treated brass wire on titanium alloy using ...
Study of brass wire and cryogenic treated brass wire on titanium alloy using ...
 
Comparison of symmetrical and asymmetrical cascaded
Comparison of symmetrical and asymmetrical cascadedComparison of symmetrical and asymmetrical cascaded
Comparison of symmetrical and asymmetrical cascaded
 
Case study on slender multi storey rc building with brick infill
Case study on slender multi storey rc building with brick infillCase study on slender multi storey rc building with brick infill
Case study on slender multi storey rc building with brick infill
 
Hazard object reporting to respective authorities
Hazard object reporting to respective authoritiesHazard object reporting to respective authorities
Hazard object reporting to respective authorities
 
Separation of mineral matter from indian coal by using
Separation of mineral matter from indian coal by usingSeparation of mineral matter from indian coal by using
Separation of mineral matter from indian coal by using
 
Verification of uart ip core using uvm
Verification of uart ip core using uvmVerification of uart ip core using uvm
Verification of uart ip core using uvm
 
Comparative study of various supervisedclassification methodsforanalysing def...
Comparative study of various supervisedclassification methodsforanalysing def...Comparative study of various supervisedclassification methodsforanalysing def...
Comparative study of various supervisedclassification methodsforanalysing def...
 
Status of noise in yeshwanthpur circle (bangalore north) based on on site dat...
Status of noise in yeshwanthpur circle (bangalore north) based on on site dat...Status of noise in yeshwanthpur circle (bangalore north) based on on site dat...
Status of noise in yeshwanthpur circle (bangalore north) based on on site dat...
 
Performance of slope under seismic conditions
Performance of slope under seismic conditionsPerformance of slope under seismic conditions
Performance of slope under seismic conditions
 
Design issues and challenges of reliable and secure transmission of medical i...
Design issues and challenges of reliable and secure transmission of medical i...Design issues and challenges of reliable and secure transmission of medical i...
Design issues and challenges of reliable and secure transmission of medical i...
 
Locational marginal pricing framework in secured dispatch scheduling under co...
Locational marginal pricing framework in secured dispatch scheduling under co...Locational marginal pricing framework in secured dispatch scheduling under co...
Locational marginal pricing framework in secured dispatch scheduling under co...
 
Impact resistance capacity of a green ultra high performance hybrid fibre rei...
Impact resistance capacity of a green ultra high performance hybrid fibre rei...Impact resistance capacity of a green ultra high performance hybrid fibre rei...
Impact resistance capacity of a green ultra high performance hybrid fibre rei...
 
Cnt reinforced basalt fiber based ship hulls
Cnt reinforced basalt fiber based ship hullsCnt reinforced basalt fiber based ship hulls
Cnt reinforced basalt fiber based ship hulls
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Implementation of linux based uart device driver
Implementation of linux based uart device driverImplementation of linux based uart device driver
Implementation of linux based uart device driver
 
Selection of drains coverings type in eastern of egypt
Selection of drains coverings type in eastern of egyptSelection of drains coverings type in eastern of egypt
Selection of drains coverings type in eastern of egypt
 

Similar to Secure data storage and retrieval in the cloud

A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...
IJAAS Team
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stack
Rishabh Agarwal
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelscloudresearcher
 
Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Mervat Bamiah
 
EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...
EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...
EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...
IAEME Publication
 
A Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the CloudA Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the Cloud
Editor IJCATR
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
IJCSIS Research Publications
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
IOSR Journals
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
eSAT Publishing House
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
IIJSRJournal
 
Efficient and reliable hybrid cloud architecture for big database
Efficient and reliable hybrid cloud architecture for big databaseEfficient and reliable hybrid cloud architecture for big database
Efficient and reliable hybrid cloud architecture for big database
ijccsa
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
Jahangeer Qadiree
 
Cc unit 3 updated version
Cc unit 3 updated versionCc unit 3 updated version
Cc unit 3 updated version
Dr. Radhey Shyam
 
For this assignment, select one social institution from the list b.docx
For this assignment, select one social institution from the list b.docxFor this assignment, select one social institution from the list b.docx
For this assignment, select one social institution from the list b.docx
sleeperharwell
 
For this assignment, select one social institution from the list b.docx
For this assignment, select one social institution from the list b.docxFor this assignment, select one social institution from the list b.docx
For this assignment, select one social institution from the list b.docx
lmelaine
 
Overview of cloud computing architecture service
Overview of cloud computing architecture serviceOverview of cloud computing architecture service
Overview of cloud computing architecture service
eSAT Publishing House
 
Overview of cloud computing architecture
Overview of cloud computing architectureOverview of cloud computing architecture
Overview of cloud computing architecture
eSAT Journals
 
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingSmart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud Computing
MangaiK4
 
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingSmart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud Computing
MangaiK4
 

Similar to Secure data storage and retrieval in the cloud (20)

A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stack
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery models
 
Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)
 
EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...
EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...
EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...
 
A Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the CloudA Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the Cloud
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Ijetcas14 424
Ijetcas14 424Ijetcas14 424
Ijetcas14 424
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
 
Efficient and reliable hybrid cloud architecture for big database
Efficient and reliable hybrid cloud architecture for big databaseEfficient and reliable hybrid cloud architecture for big database
Efficient and reliable hybrid cloud architecture for big database
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
 
Cc unit 3 updated version
Cc unit 3 updated versionCc unit 3 updated version
Cc unit 3 updated version
 
For this assignment, select one social institution from the list b.docx
For this assignment, select one social institution from the list b.docxFor this assignment, select one social institution from the list b.docx
For this assignment, select one social institution from the list b.docx
 
For this assignment, select one social institution from the list b.docx
For this assignment, select one social institution from the list b.docxFor this assignment, select one social institution from the list b.docx
For this assignment, select one social institution from the list b.docx
 
Overview of cloud computing architecture service
Overview of cloud computing architecture serviceOverview of cloud computing architecture service
Overview of cloud computing architecture service
 
Overview of cloud computing architecture
Overview of cloud computing architectureOverview of cloud computing architecture
Overview of cloud computing architecture
 
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingSmart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud Computing
 
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingSmart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud Computing
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 

Recently uploaded (20)

Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 

Secure data storage and retrieval in the cloud

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 35 SECURE DATA STORAGE AND RETRIEVAL IN THE CLOUD Shashi Kant Gupta1, Faisal Siddiqui2 1Student (CS), Azad Institute of Engineering & Technology, Lucknow, 2Assistant Professor in CSE Dept. MCSCET, Lucknow Abstract With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the world generate a large amount of data daily. This data would be more useful to cooperating organizations if they were able to share their data. Two major obstacles to this process of data sharing are providing a common storage space and secure access to the shared data. In this paper we address these issues by combining cloud computing technologies such as Hive and Hadoop with XACML policy based security mechanisms that provide fine-grained access to resources. HIVE supports queries expressed in SQL-like language called HiveQL which are compiled into MR jobs that are executed on Hadoop. We further present a web-based application that uses this combination and allows collaborating organizations to securely store and retrieve large amounts of data. Keywords—Cloud Computing, Hadoop, Hive, Web applications --------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION The World Wide Web (WWW) is envisioned as a system of interlinked hypertext documents that are accessed using the Internet [1]. With the emergence of organizations that provide e-commerce such as Amazon.com1 and social network applications such as Facebook2 and Twitter3 on the World Wide Web, the volume of data generated by them daily is massive [2]. It was estimated that the amount of data that would be generated by individuals in the year 2009 would be more than that generated in the entire history of mankind through 2008 [3]. The large amount of data generated by one organization could be valuable to other organizations or researchers if it can be correlated with the data that they have [4]. This is especially true for various governmental intelligence organizations. This has led to another trend of forming partnerships between business organizations and universities for research collaborations [5] and between business organizations for data sharing to create better applications [6]. The two main obstacles to this process of collaboration among organizations are arranging a large, common data storage area and providing secure access to the shared data. Organizations across the world invest a great deal of resources on minimizing storage costs and with the introduction of cloud-based services it is estimated that this cost would be reduced further [7]. Additionally, organizations spend a large amount of their yearly budget on security but this is still not sufficient to prevent security breaches [8], [9]. In this paper we present a web-based system (Hive Access Control4) that aims to achieve the previously stated goals by combining cloud computing technologies with policy-based security mechanisms. This idea comes in part from the recommendations of the Cloud Security Alliance for Identity and Access Management [10] and our previous work using XACML policies [11]. We have combined the Hadoop Distributed File System [12] with Hive [13] to provide a common storage area for participating organizations. Further, we have used a XACML [14] policy- based security mechanism to provide fine-grained access controls over the shared data. Users of our system are divided into groups based on the kinds of queries that they can run such as SELECT and INSERT. Our system provides a secure login feature to users based on a salted hash technique. When a user logs into our sytem, based on the group that the user belongs to he/she is provided with different options. We allow collaborating organizations to load data to the shared storage space in the form of relational tables and views. Users can also define fine-grained XACML access control policies on tables/views for groups of users. Users can then query the entire database based on the credentials that they have. We have provided some basic query rewriting rules in our system that abstract users from the query language of Hive (HiveQL). This allows them to enter regular SQL queries in the web application which are translated into HiveQL using the basic rewriting rules. Our system also allows new users to register but only a designated special user “admin” can assign these users to the appropriate groups. The contributions of this paper include:  Mechanism to load and query shared data securely that is stored in HDFS using Hive.  Additional layer of security above HDFS and Hive using a XACML policy-based mechanism.  Basic query rewriting rules that abstract a user from HiveQL and allow him/her to enter SQL queries.  Incorporation of the above mechanisms into a web- based system. This paper is structured as follows: Section II presents the related work in the area of secure storage and retrieval of information in the cloud. In section III we present our architecture for solving the problem of secure large scale data sharing based on combining cloud computing technologies with XACML policy based security mechanisms. Further in section IV we present the details of our implementation by giving performance graphs and some sample screenshots. Finally section V presents our conclusions and future work.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 36 2. RELATED WORK The aim of our paper is to combine cloud computing technologies with security mechanisms so that cooperating organizations can share vast amounts of data securely. Since the birth of cloud computing technologies there has been much interest generated among researchers, business organizations and media outlets about security issues with these technologies [15], [16]. This interest has resulted in large-scale research and development efforts from business organizations [17], [18], [19]. A part of the work related to security in the cloud has been focused on implementing security at the infrastructure level. Reference [19] presents the vision for security design in Hadoop. This document presents a few security risks with Hadoop and outlines solutions to them. These solutions have been implemented in beta versions of Hadoop v0.20. This development effort is an important step towards securing cloud infrastructures but is only in its inception stage. The goal of our system is to add another layer of security above the security offered by Hadoop. Once the security offered by Hadoop becomes robust it will only strengthen the effectiveness of our system. Amazon Web Services (AWS) is a web services infras- tructure platform in the cloud [20]. Reference [18] offers an overview of security aspects that are relevant to AWS such as physical security, network security and AWS security. Our system is different from AWS in the sense that our cloud in- frastructure is completely private versus AWS’s infrastructure that is in the public domain. This distinguishing factor makes our infrastructure “trusted” over the AWS infrastructure where data must be stored in an encrypted format since AWS is in the public domain. In the future we plan to extend our work to include both, public and private clouds. The Windows Azure platform is an Internet-scale cloud computing services platform hosted in Microsoft data centers [17]. Reference [21] provides an overview of the security chal-lenges and recommended approaches to design and develop more secure applications for the Windows Azure platform. However according to reference [22], the Windows Azure platform is suitable for building new applications, but it is not optimal to migrate existing applications. The main reason that we did not use the Windows Azure platform is that we wanted to port our existing application to an open source system instead of writing our code from scratch as would be needed with Windows Azure. We also did not want to be tied to the Windows framework but rather allow our work to be used on any kind of system. We will be able to test our system on the Windows Azure platform once the platform supports the use of virtual machines (VM’s) to run existing applications [22]. As we see from the discussions above, the research efforts identified in our study of related work have either just started or fit a completely different domain. We believe, to the best of our knowledge that our system is the first of its kind to introduce a layer of security that is independent of the security provided by current cloud infrastructures. 3. SYSTEM ARCHITECTURE In this section we present our architecture that securely provides access to a large common storage space (the “Cloud”) thus allowing cooperating organizations to share data reliably. We begin by giving an overview of the architecture followed by a discussion of each of its component layers. Figure 1 shows the architecture of our system. Each rectangle in the figure represents a different component of our frame- work. The various line styles for arrows indicate the flow of control for a specific task that can be accomplished with this system. Next we present each of the component layers in the architecture. 3.1 The Web Application Layer The Web Application layer is the only interface provided by our system to the user to access the cloud infrastructure. We provide different functions based on the permissions assigned to a user. The web application provides a login page that can be used by any user to log into the system. We use the Java simplified encryption (JASYPT) library’s [23] salted hash technique to store usernames and passwords in a file. Further, that file is stored in a secure location that is not accessible to any user. The system currently supports three types of users,  users who can only query the existing tables/views,  users who can create tables/views and define XACML policies on them in addition to querying all tables/views, and finally,  a special “admin” user who in addition to the previous functions can also assign new users to either of the above categories. 3.2 The ZQL Parser Layer The ZQL Parser [24] layer takes as input any query submitted by a user and either proceeds to the XACML policy evaluator if the query is successfully parsed or returns an error message to the user. The ZQL Parser is a SQL parser written in Java that takes a SQL query as input and fills different Java Vectors with different parts of the query [24]. For example, given the query, SELECT a.id, a.name FROM a WHERE a.id > 5;, the ZQL Parser parses the query and constructs different Java Vectors for every part of the query (SELECT, FROM and WHERE). In our system, the Vector of attribute names in the SELECT clause for the query above is returned to the web application layer to be used in displaying the results returned by the query. The Vector of table/view names in the FROM clause is passed to the XACML Policy Evaluator to ensure that the current user has permissions to access all tables/views specified in the query. If the evaluator determines that the current user has the required permissions,
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 37 the query is processed further, else an error message is returned to the web application layer. The ZQL Parser currently supports the SQL DELETE, INSERT, SELECT and UPDATE statement. Fig. 1 System Architecture Our future work involves adding support for other keywords such as CREATE, DROP etc. 3.3 The XACML Policy Layer The eXtensible Access Control Markup Language (XACML) is a XML-based language that is used to define access control policies on resources. The same language is also used to determine whether access is allowed for a particular resource based on the policy defined for that resource [14]. The following subsections explain how we have defined and used XACML policies in our framework. In our system, for every table/view that a user wants to create they are given the option of uploading their own pre-defined XACML policy or having the framework build a policy for them. If a user selects the latter option they must also specify the kinds of queries (e.g. INSERT, SELECT etc.) that will be allowed on the table/view. We then use Sun’s XACML implementation [27] to build a policy for that table/view with
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 38 the groups specified by that particular user. 1) XACML Policy Builder: In our framework the tables and views defined by users are treated as resources for building XACML policies. Further, we have defined role based access control [25], [26] policies on these resources based on the kinds of queries that are provided by our system. For every type of query supported by our framework we define a mapping between this type and all users that are allowed to run that kind of query. A sample listing of such a mapping is given below, INSERT admin user1 user2 SELECT admin user1 user3 2) XACML Policy Evaluator: Our system uses Sun’s XACML implementation [27] to evaluate if the current user has access to all tables/views that are defined in any user query. If permission is granted for all tables/views then the query is processed further, else an error message is returned to the user. The policy evaluator is used both, during regular user query execution as well as during view creation since the only way to create a view in Hive is by specifying a SELECT query on the existing tables/views. The current user must have access to all tables/views specified in this SELECT query before the view can be created. 3.4 The Basic Query Rewriting Layer This layer enables us to add another layer of abstraction between the user and HiveQL by allowing users to enter SQL queries that are rewritten according to HiveQL’s syntax. In our current system we provide two basic rewriting rules for user-specified SQL queries,  HiveQL does not allow multiple tables in the FROM clause of a query, but rather expects this kind of query to be given as a sequence of JOIN statements. The user is abstracted from this fact by allowing him/her to enter a regular SQL query with multiple tables in the FROM clause that we transform to a sequence of JOIN statements in conformance with HiveQL’s syntax. As an example, SELECT a.id, b.age FROM a, b; ⇒ SELECT a.id, b.age FROM a JOIN b;  HiveQL uses a modified version of SQL’s INSERT- SELECT statement, INSERT OVERWRITE TABLE <tablename> SELECT rather than INSERT INTO <tablename> SELECT. Again we abstract this from the user by allowing him/her to enter the traditional INSERT INTO <tablename> SELECT which we then rewrite into HiveQL’s INSERT OVERWRITE TABLE <tablename> SELECT. As an example, INSERT INTO a SELECT * FROM b; ⇒ INSERT OVERWRITE TABLE a SELECT * FROM b; As part of our future work we plan to extend these basic rewriting rules with more complicated rules in a complete query rewriting engine. 3.5 The Hive Layer Hive is a data warehouse infrastructure built on top of Hadoop [13]. Hive provides the ability to structure the data in the underlying HDFS as well as to query this data. The arrows in Figure 1 between the tables in this layer and the files in the HDFS layer indicate that each table in Hive is stored as a file in the HDFS. These files contain the data that this table represents. There are no arrows between the views in this layer and the files in the HDFS layer since a view is only a logical concept in Hive that is created with a SELECT query. In our framework, Hive is used to structure the data that will be shared by collaborating organizations. Further we use Hive’s SQL-like query language, HiveQL, to enable access to this data. The advantage of using Hive in our system is that users can query the data using a familiar SQL- like syntax. 3.6 The Hadoop Distributed File System (HDFS) Layer The Hadoop Distributed File System (HDFS) is a distributed file system that is designed to run on basic hardware [12]. The HDFS layer in our framework stores the data files corresponding to tables that are created in Hive [28]. Our security assumption is that these files can neither be accessed using Hadoop’s [29] web interface nor Hadoop’s command line interface but only by using our system. 4. IMPLEMENTATION DETAILS AND RESULTS In this section we present the implementation details of our system by providing performance graphs for the insert and query processes for tables with different sizes. We begin by giving a brief description of our implementation setup followed by the implementation details. 4.1 Implementation Setup Our implementation was done on a 19 node cluster with a mix of two different configurations for nodes. Further, all nodes are in the same rack. Out of the 19 nodes 11 nodes ran Ubuntu v10.04 Lucid Lynx, on an Intel Pentium 4, 3.2GHz CPU with 4GB SDRAM 400 MHz memory and a 40GB divided into sub-queries manually since our web application does not support this feature. We also think that the results obtained by running the queries selected above is indicative of the performance of all the other TPC-H benchmark queries that can be run on our system. 4.2 Experimental Datasets
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 39 We have used two different datasets to test the performance of our system versus Hive. The first dataset is the Freebase [30] system which is an open repository of structured data that has approximately 12 million topics or entities. An entity is aperson, place or thing with a unique identifier. We wanted to simulate an environment of cooperating organizations by using the people, business, film, sports, organization and awards datasets from the Freebase system. We assume that each dataset is loaded into our system by a different organization and further, users can run various queries across these datasets based on their permissions. The queries we have used to test our implementation were created by us based on the datasets of the Freebase system. The second dataset we have used to test our system is the well known TPC-H benchmark [31]. The TPC-H benchmark is a decision support benchmark that consists of a schema that is typical to any business organization. The benchmark contains 8 tables and provides 22 queries with a high degree of complexity. We have used this benchmark to test the performance of our system versus Hive in performing complex queries. The TPC-H benchmark provides a tool for data generation (DBGEN) and a tool for query generation (QGEN). We have used DBGEN to generate datasets with varying Scale Factor’s (SF) from 1 to 1000 as specified in the benchmark document. The reader should note that a scale factor of 1 is approximately 1GB of data. Thus we have tested our system with data sizes varying from 1GB to 1000GB. The smaller of these datasets (SF=1, SF=10, and SF=30) are used to test the loading performance of our system versus Hive. On the other hand, the larger datasets (SF=100, SF=300, and SF=1000) are used to run a few of the benchmark queries. (a) Data Loading Time (b) “SELECT * FROM” Query Time Fig. 2 Experimental comparison between our application and Hive for the Freebase dataset The number of tuples, N = [actual table size] We have used queries Q1, Q3, Q6 and Q13 of the TPC-H benchmark to test our system. These queries were randomly selected after applying the following criterion to the study given in [32]. The original query does not need to be divided into subqueries manually since our web application does not support this feature. We also think that the results obtained by running the queries selected above is indicative of the performance of all the other TPC-H benchmark queries that can be run on our system. 4.3 Implementation Results We have tested our web-based system for performance metrics such as data loading and querying times. Further, we have compared these metrics with the Hive command line interface (CLI). All query times that are used in performance graphs and result tables in this subsection are averaged over three separate runs. We ran two sets of experiments, one using the Freebase system and the other using the TPC-H benchmark. Figure 2 shows a comparison of the data loading and querying time of our application versus Hive for the Freebase datasets. As we see from figure 2(a) the data loading time for our application is almost the same as Hive’s time for small tables (0.1 and 0.3 million tuples). As the number of tuples increases to 0.5 million and then to 1.67 million tuples our system gets slower than Hive at loading tuples. This is primarily because of the overhead associated with establishing a connection with the Hive database as well as the time associated with building a XACML policy for the table being loaded. Figure 2(b) shows a comparison of the running time for a simple “SELECT * FROM” query between our application and Hive. We have run the query on the same tables that were used for data loading in figure 2(a) but we restricted our results by using the LIMIT clause to only the first 100 tuples.
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 40 This was done to avoid the large time difference that would occur between our application and Hive’s CLI since we have implemented a paging mechanism on the results whereas Hive’s CLI would display all results on the screen. We see that our application times are slightly faster than the running time for the query on the Hive CLI. This difference is because of the time taken by the Hive CLI to display the results of the query on the screen. Both running times are fast because Hive does not need to run a Map-Reduce [33] job for this query but simply needs to return the whole file for the corresponding table from the HDFS. Table 1: Comparison of running times for various queries on our system versus hive for the freebase system Query Type Query System Time Hive Time (sec) (sec) Query Table SELECT name, id FROM Person LIMIT 100; 27.1 28.4 Query Table SELECT id FROM Person; 30.2 30.5 WHERE name = ’Frank Mann’ LIMIT 100; Create View CREATE VIEW Person View AS 0.19 0.114 SELECT name, id FROM Person; Query View SELECT name, id FROM Person View LIMIT 100; 22.5 23.2 Query View SELECT id FROM Person View 30.1 29.3 WHERE name = ’Sachin’ LIMIT 100; Join Query SELECT p.name, d.place of death 70 68.6 FROM Person p JOIN Deceased people d ON (p.id = d.id AND p.name = d.name) LIMIT 100; Aggregate Query SELECT p.name, COUNT(DISTINCT p.id) 64 64.3 FROM Person p GROUP BY p.name LIMIT 100; Insert Query INSERT INTO Person Insert 29.2 27.77 SELECT name,id,profession FROM Person; We have also run a number of other queries and compared the running times of these queries on our system versus Hive for the Freebase system. These queries test the performance of our system in creating and querying views/tables versus Hive. We have tested a variety of queries including insert, create, select, aggregate and join queries. We present each query and the average running time on our system and on Hive in table I. Figure 3 shows a comparison of the data loading time of our application versus Hive for the “Customer” and “Supplier” tables for SF = 1, 10 and 30 from the TPC-H benchmark. Our system currently allows users to upload data files that are at most 1GB in size. The TPC-H benchmark’s DBGEN tool generates files for the “Customer” and “Supplier” tables for SF = 1, 10, and 30 that are less than 1GB in size. These are the reasons why we have selected the “Customer” and “Supplier” tables with SF = 1, 10, and 30 to compare the data loading performance of our system versus Hive. Figure 3 shows us results that are similar to the results
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 41 obtained from figure 2(a). Our system performs similar to Hive at the smallest SF of 1 and as the SF increases our system gets slower than Hive for data loading. Again, this difference in execution performance is because of the overhead associated with the Hive database connection and XACML policy generation. The trend for both, our system and Hive is linear as expected, since the size of these tables increases linearly with the SF.Table II shows a comparison of the performance of four TPC-H benchmark queries on our system versus Hive. We see that our system performs as well as the Hive command line interface for the selected queries. Based on the query performance times for both, our system and Hive, we see that as the size of the tables increases the time for benchmark query execution also increases, as expected. In a production environment such queries would not be performed at runtime on large datasets. We would rather run these queries offline and could store the results in Hive as views. We could then use a query rewriting mechanism to return these results efficiently. 5. CONCLUSIONS AND FUTURE WORK In this paper we have presented a system that allows cooperating organizations to securely share large amounts of data. We have ensured that the organizations have a large common storage area by using Hadoop. Further, we have used Hive to present users of our system with a structured view of the data and to also enable them to query the data with a SQLlike language. We have used a simple salted hash mechanism to authenticate users in the current version of our system. We plan to implement a more sophisticated technique for authentication in future versions of our system. In this paper we have used the ZQL parser to parse any SQL query that is input by the user. We plan to extend this parser with support for keywords such as DESCRIBE, JOIN etc that are currently not supported in ZQL. We have abstracted the user from the use of Hive by implementing some basic query rewriting rules. A part of our future work is to implement materialized views in Hive and extend the basic query rewriting rules into a complete engine for Hive that takes into account all existing tables/materialized views and the XACML policies defined on them. We have provided fine- grained access control on the shared data using XACML policies. We have also incorporated role based access control in our framework based on the kinds of queries that users will submit to our system. In the current version of our system we only provide support for two types of keywords, INSERT and SELECT, as groups for XACML policies. In the future we plan to extend our system to include other keyword based groups such as DELETE, UPDATE etc. We also plan to test the impact of using different values for parameters provided by Hadoop and Hive on query execution performance. Lastly, the current system is implemented in a private cloud which will be extended to include public clouds such as Amazon Web Services and Amazon Simple Storage Services in future versions (a) “Customer” Table Loading Time (b) “Supplier” Table Loading Time Fig. 3 Comparison of loading and querying times between our application and Hive for the TPC-H benchmark Table 2: Comparison of running times for TPC-H benchmark queries on our system versus hive Query Scale Factor (SF) System Time (sec) Hive Time (sec) 100 605.24 590.663 Q6 300 1815.454 1806.4 1000 6240.33 6249.679 100 870.704 847.52 Q13 300 1936.351 1910.186 1000 7322.541 7304.392
  • 8. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 42 100 1210.04 1209.786 Q1 300 5407.14 5411.616 1000 42780.67 42768.83 100 1675.19 1670.765 Q3 300 7532.23 7511.523 1000 61411.21 61390.71 ACKNOWLEDGEMENTS The work carried out in this paper was guided by Mr. Faisal Siddiqui, Assistant Professor, CSE Department, Dr. MCSCET, LKO on secure cloud computing. I thank Mr. Faisal Siddiqui for his support and encouragement of my work. REFERENCES [1]. World Wide Web. http://en.wikipedia.org/wiki/World Wide Web. [2]. Samuel Axon. Facebook Will Celebrate 500 Million Users Next Week. http://news.yahoo.com/s/mashable/20100717/tcmashable/facebook will celebrate 500 million users next week, July 2010. [3]. Andreas Weigend. The Social Data Revolution(s). http://blogs.hbr.org/now-new-next/2009/05/the-social-data- revolution.html, May 2009. [4]. Ganesh Variar. Data Explosion: A guide to connecting the dots. http://advice.cio.com/ganesh variar/data explosion a guide to connecting the dots?source=rss Blogs and Discussion All, January 2010. [5]. Nokia Research Center - Open Innovation. http://research.nokia.com/openinnovation. [6]. Salesforce.com and Facebook Create New Opportunities for Enterprise Applications to Serve Facebook’s 120 Million Users. http://www.facebook.com/press/releases.php?p=63948, November 2008. [7]. Ann All. Cloud Data Storage: It’ll Still Cost +You, So Give It Some Thought. http://www.itbusinessedge.com/cm/blogs/all/cloud-data- storage-itll-still-cost-you-so-give-it-some- thought/?cs=38733, January 2010. [8]. John Sawyer. Tech Insight: How To Cut Security Costs Without A Lot Of Pain. http://www.darkreading.com/smb- security/security/ management/showArticle.jhtml?articleID=226200159, July 2010. [9]. First Annual Cost of Cyber Crime Security. Technical report, Ponemon Institute, July 2010. [10]. Subra Kumaraswamy, Sitaraman Lakshminarayanan, Michael Reiter Joseph Stein, and Yvonne Wilson. Domain 12: Guidance for Identity & Access Management V2.1, April 2010. [11]. Pranav Parikh. Secured Information Integration with a Semantic Webbased Framework. Master’s thesis, The University of Texas at Dallas, December 2009. [12]. Dhruba Borthakur. HDFS Architecture. http://hadoop.apache.org/common/docs/current/hdfs design.html, 2010. [13]. Apache Hive. http://wiki.apache.org/hadoop/Hive. [14]. Tim Moses. eXtensible Access Control Markup Language (XACML) Version 2.0. http://docs.oasis- open.org/xacml/2.0/accesscontrol-xacml-2.0-core-spec- os.pdf, February 2005. [15]. David Talbot. How Secure Is Cloud Computing? http://www.technologyreview.com/computing/23951/, November 2009. [16]. Robert L. Mitchell. Cloud storage triggers security worries. http://www.computerworld.com/s/article/340438/Confidence in the Cloud?, July 2009. [17]. Windows Azure Platform - Whitepapers. http://www.microsoft.com/windowsazure/whitepapers/. [18]. Amazon Web Services: Overview of Security Processes. http://awsmedia.s3.amazonaws.com/pdf/AWS Security Whitepaper.pdf, November 2009. [19]. Owen O’Malley, Kan Zhang, Sanjay Radia, Ram Marti, and Christopher Harrell. Hadoop Security Design. http://bit.ly/75011o, October 2009. [20]. Amazon Web Services. http://aws.amazon.com/. [21]. Andrew Marshall, Michael Howard, Grant Bugher, and Brian Harden. Security Best Practices For Developing Windows Azure Applications. http://download.microsoft.com/download/7/3/E/73E4EE93- 559F-4D0F-A6FC-7FEC5F1542D1/ SecurityBestPracticesWindowsAzureApps.docx [22]. Jon Brodkin. Microsoft Windows Azure and Amazon EC2 on collision course. http://www.networkworld.com/news/2010/062510- microsoft-azure-amazon-ec2.html, June 2010. [23]. JASYPT - Java simplified encryption. http://www.jasypt.org/index.html. [24]. Zql: a Java SQL parser. http://www.gibello.com/code/zql/. [25]. David F. Ferraiolo and D. Richard Kuhn. Role-Based Access Controls. In National Computer Security Conference, pages 554–563, 1992. [26]. Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Role-Based Access Control Models. IEEE Computer, 29(2):38–47, 1996. [27]. Sun XACML Implemetation. http://sunxacml.sourceforge.net/. [28]. Ashish Thusoo, Joydeep Sen Sarma, Namit Jain, Zheng Shao, Prasad Chakka, Suresh Anthony, Hao Liu, Pete Wyckoff, and Raghotham Murthy. Hive - A Warehousing
  • 9. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 10 | NCCOTII 2014 | Jun-2014, Available @ http://www.ijret.org 43 Solution Over a Map-Reduce Framework. PVLDB, 2(2):1626–1629, 2009. [29]. Apache Hadoop. http://hadoop.apache.org/. [30] Freebase. http://www.freebase.com/. [31]. TPC BENCHMARK H. http://tpc.org/tpch/spec/tpch2.11.0.pdf. [32]. Running the TPC-H Benchmark on Hive. https://issues.apache.org/jira/secure/attachment/12416257/TPC-H on Hive 2009-08-11.pdf. [33]. Apache MapReduce. http://hadoop.apache.org/mapreduce/. Websites [1]. 1http://www.amazon.com/ [2]. 2http://www.facebook.com/ [3]. 3http://twitter.com/ [4]. 4http://cs.utdallas.edu/secure-cloud-repository/