Views: 154 , Downloads: 108 | CTR: 70 %
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015
A Providing Security on Cloud Data Hadoop using Symmetric Encryption and Identity Authentication
Kale Rohitkumar Bhausaheb, R.L.Paikrao
Cloud computing is evolving as a much known data interactive paradigm to realize users data remotely stored in an online cloud server. - Security of distributed network is very important part in todays era. In order to solve the existing security problem of the distributed network cloud disk, such as transmission, storage security problems, etc., a network cloud disk safety storage scheme based on Hadoop is proposed. Based on the different confidential level of user data, it gives selective encryption scheme, which gives full consideration to the following security issues, such as the security of the user data transmission in the network, user data no verification, the user data privacy might be leaked, etc. Combined with the rapid encryption of symmetric encryption algorithm like Blowfish and identity authentication of RSA, overtime checking and the performance of Hadoop, the distributed network cloud data security storage disk can supply secured, effective, stable effect.
Keywords: HDFS, Cloud Computing, Blowfish, AES, RSA 3way handshake
Edition: Volume 4 Issue 7, July 2015
Pages: 1844 - 1847
How to Cite this Article?
Kale Rohitkumar Bhausaheb, R.L.Paikrao, "A Providing Security on Cloud Data Hadoop using Symmetric Encryption and Identity Authentication", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB156801, Volume 4 Issue 7, July 2015, 1844 - 1847
154 PDF Views | 108 PDF Downloads
Similar Articles with Keyword 'HDFS'
Views: 134 , Downloads: 101 | CTR: 75 % | Weekly Popularity: ⮙2
Dissertation Chapters, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1721 - 1725Secured Load Rebalancing for Distributed Files System in Cloud
Jayesh D. Kamble, Y. B. Gurav
Views: 126 , Downloads: 106 | CTR: 84 % | Weekly Popularity: ⮙2
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2837 - 2842Challenges for HDFS to Read and Write Using Different Technologies
Sunil Kumar S, Sanjeev G Kanabargi
Views: 130 , Downloads: 107 | CTR: 82 % | Weekly Popularity: ⮙2
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1424 - 1430Hadoop Distributed File System and Map Reduce Processing on Multi-Node Cluster
Dr. G. Venkata Rami Reddy, CH. V. V. N. Srikanth Kumar
Views: 154 , Downloads: 108 | CTR: 70 %
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1844 - 1847A Providing Security on Cloud Data Hadoop using Symmetric Encryption and Identity Authentication
Kale Rohitkumar Bhausaheb, R.L.Paikrao
Views: 149 , Downloads: 109 | CTR: 73 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1620 - 1624Hadoop: Understanding the Big Data Processing Method
Deepak Chandra Upreti, Pawan Sharma, Dr. Yaduvir Singh
Similar Articles with Keyword 'Cloud Computing'
Views: 201 , Downloads: 173 | CTR: 86 %
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Views: 122 , Downloads: 96 | CTR: 79 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 2242 - 2246Efficient and Secure Auditing of Cloud Data with Key -Updating
Niranjana S, Manjusha M S
Views: 151 , Downloads: 97 | CTR: 64 % | Weekly Popularity: ⮙3
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2483 - 2487Accountability of Data usage in Cloud Computing
Nitin P. Doiphode, Hemlata Channe
Views: 151 , Downloads: 97 | CTR: 64 % | Weekly Popularity: ⮙5
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1939 - 1946An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud
Nagaraj S Kolhar, Dr. Suvarna Nandyal
Views: 134 , Downloads: 97 | CTR: 72 % | Weekly Popularity: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 594 - 596A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud
K. Sreelatha
Similar Articles with Keyword 'Blowfish'
Views: 135 , Downloads: 101 | CTR: 75 % | Weekly Popularity: ⮙5
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Views: 154 , Downloads: 108 | CTR: 70 %
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1844 - 1847A Providing Security on Cloud Data Hadoop using Symmetric Encryption and Identity Authentication
Kale Rohitkumar Bhausaheb, R.L.Paikrao
Views: 121 , Downloads: 108 | CTR: 89 % | Weekly Popularity: ⮙4
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, Kenya, Volume 6 Issue 3, March 2017
Pages: 1702 - 1708Enhanced Secure Data Storage in Cloud Computing Using Hybrid Cryptographic Techniques (AES and Blowfish)
Fortine Mata, Michael Kimwele, George Okeyo
Views: 143 , Downloads: 109 | CTR: 76 % | Weekly Popularity: ⮙3
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 615 - 621Advance Robust Watermarking Of Compressed and Encrypted Digital Media
Mohammad Asif Iqbal, Kemal Koche
Views: 125 , Downloads: 110 | CTR: 88 % | Weekly Popularity: ⮙6
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1833 - 1838Study of Secure Fault Tolerant Routing Protocol for IoT
Chaithra.S, Gowrishankar S
Similar Articles with Keyword 'AES'
Views: 125 , Downloads: 98 | CTR: 78 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1732 - 1734A Secure Video Encryption Technique Using Rijndael Algorithm
N. Geetha, K. Mahesh
Views: 139 , Downloads: 98 | CTR: 71 % | Weekly Popularity: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2084 - 2088A Survey on Learning Crowdsourced User Preferences for Visual Summarization of Image Collections
Rupali Tanaji Waghmode, Nikita J. Kulkarni
Views: 152 , Downloads: 103 | CTR: 68 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1613 - 1619Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++
Monika Arora, Anish Sandiliya
Views: 130 , Downloads: 104 | CTR: 80 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1398 - 1401A Review on Encryption Techniques to Secure a Cloud
Ramandeep Kaur, Ashish Verma
Views: 158 , Downloads: 104 | CTR: 66 %
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1435 - 1439Review on Encryption Techniques in Multimedia Data
Ashwini G. Kamble, Prof. Nikita J. Kulkarni