Skip to main content

2018 | OriginalPaper | Buchkapitel

A Secure and Efficient Temporal Features Based Framework for Cloud Using MapReduce

verfasst von : P. Srinivasa Rao, P. E. S. N. Krishna Prasad

Erschienen in: Intelligent Systems Design and Applications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A new data mining method called temporal pattern identification in cloud is developed using MapReduce: a power full feature of hadoop with temporal features. In the paper a new approach called temporal features based authentication approach has been introduced where a user will be verified by 2 phases. In phase1 the user facial features will be stored at HIB (Hadoop Image Bundle) and in second phase the user credentials will be checked by using symmetric encryption technique. The hadoop cluster can be exported to cloud based on user demand such as IAAS, SAAS, and PAAS. This cloud model is useful to deploy applications that can be use to transmit massive data over cloud environment. It also allows different kinds of optimization techniques and functionalities. The framework can also be used to give optimized security to the massive data stored by user at cloud environment. The article make use of temporal patters of user who entered into cloud by updating it in a logfile. Experimentation conducted by hiding text, image and both in video file and the performance of the cluster is monitored by using efficient monitoring tool called ganglia to provide auto-scaling functionality of the cluster.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wong, C.K., Lam, S.S.: Digital signatures for flows and multicasts. IEEE/ACM Trans. Netw. 7(4), 502–513 (1999)CrossRef Wong, C.K., Lam, S.S.: Digital signatures for flows and multicasts. IEEE/ACM Trans. Netw. 7(4), 502–513 (1999)CrossRef
2.
Zurück zum Zitat Basescu, C., Leordeanu, C., Costan, A., Carpen-Amarie, A., Antoniu, G.: Managing data access on clouds: a generic framework for enforcing security policies. In: 25th International Conference on Advanced Information Networking and Applications, vol. 10, pp. 459–466 (2011) Basescu, C., Leordeanu, C., Costan, A., Carpen-Amarie, A., Antoniu, G.: Managing data access on clouds: a generic framework for enforcing security policies. In: 25th International Conference on Advanced Information Networking and Applications, vol. 10, pp. 459–466 (2011)
3.
Zurück zum Zitat Koslovski, G., Yeow, W.-L., Westphal, C., Huu, T.T., Montagnat, J., Vicat-Blanc, P.: Reliability support in virtual infrastructures. In: IEEE International Conference on Cloud Computing Technology and Science, vol. 10 (2010) Koslovski, G., Yeow, W.-L., Westphal, C., Huu, T.T., Montagnat, J., Vicat-Blanc, P.: Reliability support in virtual infrastructures. In: IEEE International Conference on Cloud Computing Technology and Science, vol. 10 (2010)
4.
Zurück zum Zitat Yu, J., et al.: Towards dynamic resource provisioning for traffic mining service cloud. White paper (2011) Yu, J., et al.: Towards dynamic resource provisioning for traffic mining service cloud. White paper (2011)
5.
Zurück zum Zitat Kambatla, K., Pathak, A., Pucha, H.: Towards optimizing Hadoop provisioning in the cloud. White paper (2011) Kambatla, K., Pathak, A., Pucha, H.: Towards optimizing Hadoop provisioning in the cloud. White paper (2011)
6.
Zurück zum Zitat Munir, K., Palaniappan, S.: Framework for secure cloud computing. Int. J. Cloud Comput. Serv. Archit. (IJCCSA) 3(2), pp. 21–35 (2013) Munir, K., Palaniappan, S.: Framework for secure cloud computing. Int. J. Cloud Comput. Serv. Archit. (IJCCSA) 3(2), pp. 21–35 (2013)
7.
Zurück zum Zitat Hamlen, K., Kantarcioglu, M., Khan, L., Thuraisingham, B.: Security issues for cloud computing. Int. J. Inf. Secur. Priv. 4(2), 39–51 (2010)CrossRef Hamlen, K., Kantarcioglu, M., Khan, L., Thuraisingham, B.: Security issues for cloud computing. Int. J. Inf. Secur. Priv. 4(2), 39–51 (2010)CrossRef
8.
Zurück zum Zitat kitu File whilte, et al.: Symmetric vs asymmetric encryption (2010) kitu File whilte, et al.: Symmetric vs asymmetric encryption (2010)
9.
Zurück zum Zitat Harn, L., et al.: Generalized digital certificate for user authentication and key establishment for secure communications. IEEE (2011) Harn, L., et al.: Generalized digital certificate for user authentication and key establishment for secure communications. IEEE (2011)
10.
Zurück zum Zitat Almeer, M.H., et al.: Cloud Hadoop map reduce for remote sensing image analysis. J. Emerg. Trends Comput. Inf. Sci. 3(4), 637–644 (2012) Almeer, M.H., et al.: Cloud Hadoop map reduce for remote sensing image analysis. J. Emerg. Trends Comput. Inf. Sci. 3(4), 637–644 (2012)
11.
Zurück zum Zitat Chowdhur, N.M.M.K., Boutaba, R.: A Survey of Network Virtualization, vol. 54, pp. 862–876. Elsevier (2010) Chowdhur, N.M.M.K., Boutaba, R.: A Survey of Network Virtualization, vol. 54, pp. 862–876. Elsevier (2010)
12.
Zurück zum Zitat Schoo, P., Fusenig, V., Souza, V., Melo, M., Murray, P., Debar, H., Medhioub, H., Zeghlache, D.: Challenges for cloud networking security. In: 2nd International ICST Conference on Mobile Networks and Management, vol. 137, 22–24 September 2010 Schoo, P., Fusenig, V., Souza, V., Melo, M., Murray, P., Debar, H., Medhioub, H., Zeghlache, D.: Challenges for cloud networking security. In: 2nd International ICST Conference on Mobile Networks and Management, vol. 137, 22–24 September 2010
13.
Zurück zum Zitat Dutta, P., et al.: Data hiding in audio signal: a review. Int. J. Database Theor. Appl. 2(2), 1–8 (2009) Dutta, P., et al.: Data hiding in audio signal: a review. Int. J. Database Theor. Appl. 2(2), 1–8 (2009)
14.
Zurück zum Zitat Rao, P.S., et al.: A novel approach for identifying cloud Hadoop temporal patterns using MapReduce. IJITCS 4, 37–42 (2014)CrossRef Rao, P.S., et al.: A novel approach for identifying cloud Hadoop temporal patterns using MapReduce. IJITCS 4, 37–42 (2014)CrossRef
15.
Zurück zum Zitat Senhadji, S., et al.: Association rule mining and load balancing strategy in grid systems. IAJIT 11(4), 338–344 (2013) Senhadji, S., et al.: Association rule mining and load balancing strategy in grid systems. IAJIT 11(4), 338–344 (2013)
16.
Zurück zum Zitat De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Pelosi, G., Samarati, P.: Encryption-based policy enforcement for cloud storage. White paper (2012) De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Pelosi, G., Samarati, P.: Encryption-based policy enforcement for cloud storage. White paper (2012)
17.
Zurück zum Zitat Ries, T., Fusenig, V., Vilbois, C., Engel, T.: Verification of data location in cloud networking. In: Fourth IEEE International Conference on Utility and Cloud Computing, vol. 72, pp. 439–444 (2011) Ries, T., Fusenig, V., Vilbois, C., Engel, T.: Verification of data location in cloud networking. In: Fourth IEEE International Conference on Utility and Cloud Computing, vol. 72, pp. 439–444 (2011)
18.
Zurück zum Zitat Streitberger, W., Ruppel, A.: Cloud computing security – protection goals, taxonomy, market review. Institute for Secure Information Technology SIT, Technical report (2010) Streitberger, W., Ruppel, A.: Cloud computing security – protection goals, taxonomy, market review. Institute for Secure Information Technology SIT, Technical report (2010)
Metadaten
Titel
A Secure and Efficient Temporal Features Based Framework for Cloud Using MapReduce
verfasst von
P. Srinivasa Rao
P. E. S. N. Krishna Prasad
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-76348-4_12