A Providing Security on Cloud Data Hadoop using Symmetric Encryption and Identity Authentication
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 154 , Downloads: 108 | CTR: 70 %

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015

A Providing Security on Cloud Data Hadoop using Symmetric Encryption and Identity Authentication

Kale Rohitkumar Bhausaheb, R.L.Paikrao

Cloud computing is evolving as a much known data interactive paradigm to realize users data remotely stored in an online cloud server. - Security of distributed network is very important part in todays era. In order to solve the existing security problem of the distributed network cloud disk, such as transmission, storage security problems, etc., a network cloud disk safety storage scheme based on Hadoop is proposed. Based on the different confidential level of user data, it gives selective encryption scheme, which gives full consideration to the following security issues, such as the security of the user data transmission in the network, user data no verification, the user data privacy might be leaked, etc. Combined with the rapid encryption of symmetric encryption algorithm like Blowfish and identity authentication of RSA, overtime checking and the performance of Hadoop, the distributed network cloud data security storage disk can supply secured, effective, stable effect.

Keywords: HDFS, Cloud Computing, Blowfish, AES, RSA 3way handshake

Edition: Volume 4 Issue 7, July 2015

Pages: 1844 - 1847

Share this Article

How to Cite this Article?

Kale Rohitkumar Bhausaheb, R.L.Paikrao, "A Providing Security on Cloud Data Hadoop using Symmetric Encryption and Identity Authentication", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB156801, Volume 4 Issue 7, July 2015, 1844 - 1847

154 PDF Views | 108 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'HDFS'

Views: 134 , Downloads: 101 | CTR: 75 % | Weekly Popularity: ⮙2

Dissertation Chapters, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1721 - 1725

Secured Load Rebalancing for Distributed Files System in Cloud

Jayesh D. Kamble, Y. B. Gurav

Share this Article

Views: 126 , Downloads: 106 | CTR: 84 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2837 - 2842

Challenges for HDFS to Read and Write Using Different Technologies

Sunil Kumar S, Sanjeev G Kanabargi

Share this Article

Views: 130 , Downloads: 107 | CTR: 82 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1424 - 1430

Hadoop Distributed File System and Map Reduce Processing on Multi-Node Cluster

Dr. G. Venkata Rami Reddy, CH. V. V. N. Srikanth Kumar

Share this Article

Views: 154 , Downloads: 108 | CTR: 70 %

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1844 - 1847

A Providing Security on Cloud Data Hadoop using Symmetric Encryption and Identity Authentication

Kale Rohitkumar Bhausaheb, R.L.Paikrao

Share this Article

Views: 149 , Downloads: 109 | CTR: 73 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1620 - 1624

Hadoop: Understanding the Big Data Processing Method

Deepak Chandra Upreti, Pawan Sharma, Dr. Yaduvir Singh

Share this Article

Similar Articles with Keyword 'Cloud Computing'

Views: 201 , Downloads: 173 | CTR: 86 %

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Views: 122 , Downloads: 96 | CTR: 79 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Views: 151 , Downloads: 97 | CTR: 64 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

Views: 151 , Downloads: 97 | CTR: 64 % | Weekly Popularity: ⮙5

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Views: 134 , Downloads: 97 | CTR: 72 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 594 - 596

A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud

K. Sreelatha

Share this Article

Similar Articles with Keyword 'Blowfish'

Views: 135 , Downloads: 101 | CTR: 75 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Views: 154 , Downloads: 108 | CTR: 70 %

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1844 - 1847

A Providing Security on Cloud Data Hadoop using Symmetric Encryption and Identity Authentication

Kale Rohitkumar Bhausaheb, R.L.Paikrao

Share this Article

Views: 121 , Downloads: 108 | CTR: 89 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, Kenya, Volume 6 Issue 3, March 2017

Pages: 1702 - 1708

Enhanced Secure Data Storage in Cloud Computing Using Hybrid Cryptographic Techniques (AES and Blowfish)

Fortine Mata, Michael Kimwele, George Okeyo

Share this Article

Views: 143 , Downloads: 109 | CTR: 76 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 615 - 621

Advance Robust Watermarking Of Compressed and Encrypted Digital Media

Mohammad Asif Iqbal, Kemal Koche

Share this Article

Views: 125 , Downloads: 110 | CTR: 88 % | Weekly Popularity: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1833 - 1838

Study of Secure Fault Tolerant Routing Protocol for IoT

Chaithra.S, Gowrishankar S

Share this Article

Similar Articles with Keyword 'AES'

Views: 125 , Downloads: 98 | CTR: 78 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Views: 139 , Downloads: 98 | CTR: 71 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2084 - 2088

A Survey on Learning Crowdsourced User Preferences for Visual Summarization of Image Collections

Rupali Tanaji Waghmode, Nikita J. Kulkarni

Share this Article

Views: 152 , Downloads: 103 | CTR: 68 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Views: 130 , Downloads: 104 | CTR: 80 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1398 - 1401

A Review on Encryption Techniques to Secure a Cloud

Ramandeep Kaur, Ashish Verma

Share this Article

Views: 158 , Downloads: 104 | CTR: 66 %

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1435 - 1439

Review on Encryption Techniques in Multimedia Data

Ashwini G. Kamble, Prof. Nikita J. Kulkarni

Share this Article
Top