Skip to main content
Top

2018 | OriginalPaper | Chapter

A Secure and Efficient Temporal Features Based Framework for Cloud Using MapReduce

Authors : P. Srinivasa Rao, P. E. S. N. Krishna Prasad

Published in: Intelligent Systems Design and Applications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A new data mining method called temporal pattern identification in cloud is developed using MapReduce: a power full feature of hadoop with temporal features. In the paper a new approach called temporal features based authentication approach has been introduced where a user will be verified by 2 phases. In phase1 the user facial features will be stored at HIB (Hadoop Image Bundle) and in second phase the user credentials will be checked by using symmetric encryption technique. The hadoop cluster can be exported to cloud based on user demand such as IAAS, SAAS, and PAAS. This cloud model is useful to deploy applications that can be use to transmit massive data over cloud environment. It also allows different kinds of optimization techniques and functionalities. The framework can also be used to give optimized security to the massive data stored by user at cloud environment. The article make use of temporal patters of user who entered into cloud by updating it in a logfile. Experimentation conducted by hiding text, image and both in video file and the performance of the cluster is monitored by using efficient monitoring tool called ganglia to provide auto-scaling functionality of the cluster.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Wong, C.K., Lam, S.S.: Digital signatures for flows and multicasts. IEEE/ACM Trans. Netw. 7(4), 502–513 (1999)CrossRef Wong, C.K., Lam, S.S.: Digital signatures for flows and multicasts. IEEE/ACM Trans. Netw. 7(4), 502–513 (1999)CrossRef
2.
go back to reference Basescu, C., Leordeanu, C., Costan, A., Carpen-Amarie, A., Antoniu, G.: Managing data access on clouds: a generic framework for enforcing security policies. In: 25th International Conference on Advanced Information Networking and Applications, vol. 10, pp. 459–466 (2011) Basescu, C., Leordeanu, C., Costan, A., Carpen-Amarie, A., Antoniu, G.: Managing data access on clouds: a generic framework for enforcing security policies. In: 25th International Conference on Advanced Information Networking and Applications, vol. 10, pp. 459–466 (2011)
3.
go back to reference Koslovski, G., Yeow, W.-L., Westphal, C., Huu, T.T., Montagnat, J., Vicat-Blanc, P.: Reliability support in virtual infrastructures. In: IEEE International Conference on Cloud Computing Technology and Science, vol. 10 (2010) Koslovski, G., Yeow, W.-L., Westphal, C., Huu, T.T., Montagnat, J., Vicat-Blanc, P.: Reliability support in virtual infrastructures. In: IEEE International Conference on Cloud Computing Technology and Science, vol. 10 (2010)
4.
go back to reference Yu, J., et al.: Towards dynamic resource provisioning for traffic mining service cloud. White paper (2011) Yu, J., et al.: Towards dynamic resource provisioning for traffic mining service cloud. White paper (2011)
5.
go back to reference Kambatla, K., Pathak, A., Pucha, H.: Towards optimizing Hadoop provisioning in the cloud. White paper (2011) Kambatla, K., Pathak, A., Pucha, H.: Towards optimizing Hadoop provisioning in the cloud. White paper (2011)
6.
go back to reference Munir, K., Palaniappan, S.: Framework for secure cloud computing. Int. J. Cloud Comput. Serv. Archit. (IJCCSA) 3(2), pp. 21–35 (2013) Munir, K., Palaniappan, S.: Framework for secure cloud computing. Int. J. Cloud Comput. Serv. Archit. (IJCCSA) 3(2), pp. 21–35 (2013)
7.
go back to reference Hamlen, K., Kantarcioglu, M., Khan, L., Thuraisingham, B.: Security issues for cloud computing. Int. J. Inf. Secur. Priv. 4(2), 39–51 (2010)CrossRef Hamlen, K., Kantarcioglu, M., Khan, L., Thuraisingham, B.: Security issues for cloud computing. Int. J. Inf. Secur. Priv. 4(2), 39–51 (2010)CrossRef
8.
go back to reference kitu File whilte, et al.: Symmetric vs asymmetric encryption (2010) kitu File whilte, et al.: Symmetric vs asymmetric encryption (2010)
9.
go back to reference Harn, L., et al.: Generalized digital certificate for user authentication and key establishment for secure communications. IEEE (2011) Harn, L., et al.: Generalized digital certificate for user authentication and key establishment for secure communications. IEEE (2011)
10.
go back to reference Almeer, M.H., et al.: Cloud Hadoop map reduce for remote sensing image analysis. J. Emerg. Trends Comput. Inf. Sci. 3(4), 637–644 (2012) Almeer, M.H., et al.: Cloud Hadoop map reduce for remote sensing image analysis. J. Emerg. Trends Comput. Inf. Sci. 3(4), 637–644 (2012)
11.
go back to reference Chowdhur, N.M.M.K., Boutaba, R.: A Survey of Network Virtualization, vol. 54, pp. 862–876. Elsevier (2010) Chowdhur, N.M.M.K., Boutaba, R.: A Survey of Network Virtualization, vol. 54, pp. 862–876. Elsevier (2010)
12.
go back to reference Schoo, P., Fusenig, V., Souza, V., Melo, M., Murray, P., Debar, H., Medhioub, H., Zeghlache, D.: Challenges for cloud networking security. In: 2nd International ICST Conference on Mobile Networks and Management, vol. 137, 22–24 September 2010 Schoo, P., Fusenig, V., Souza, V., Melo, M., Murray, P., Debar, H., Medhioub, H., Zeghlache, D.: Challenges for cloud networking security. In: 2nd International ICST Conference on Mobile Networks and Management, vol. 137, 22–24 September 2010
13.
go back to reference Dutta, P., et al.: Data hiding in audio signal: a review. Int. J. Database Theor. Appl. 2(2), 1–8 (2009) Dutta, P., et al.: Data hiding in audio signal: a review. Int. J. Database Theor. Appl. 2(2), 1–8 (2009)
14.
go back to reference Rao, P.S., et al.: A novel approach for identifying cloud Hadoop temporal patterns using MapReduce. IJITCS 4, 37–42 (2014)CrossRef Rao, P.S., et al.: A novel approach for identifying cloud Hadoop temporal patterns using MapReduce. IJITCS 4, 37–42 (2014)CrossRef
15.
go back to reference Senhadji, S., et al.: Association rule mining and load balancing strategy in grid systems. IAJIT 11(4), 338–344 (2013) Senhadji, S., et al.: Association rule mining and load balancing strategy in grid systems. IAJIT 11(4), 338–344 (2013)
16.
go back to reference De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Pelosi, G., Samarati, P.: Encryption-based policy enforcement for cloud storage. White paper (2012) De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Pelosi, G., Samarati, P.: Encryption-based policy enforcement for cloud storage. White paper (2012)
17.
go back to reference Ries, T., Fusenig, V., Vilbois, C., Engel, T.: Verification of data location in cloud networking. In: Fourth IEEE International Conference on Utility and Cloud Computing, vol. 72, pp. 439–444 (2011) Ries, T., Fusenig, V., Vilbois, C., Engel, T.: Verification of data location in cloud networking. In: Fourth IEEE International Conference on Utility and Cloud Computing, vol. 72, pp. 439–444 (2011)
18.
go back to reference Streitberger, W., Ruppel, A.: Cloud computing security – protection goals, taxonomy, market review. Institute for Secure Information Technology SIT, Technical report (2010) Streitberger, W., Ruppel, A.: Cloud computing security – protection goals, taxonomy, market review. Institute for Secure Information Technology SIT, Technical report (2010)
Metadata
Title
A Secure and Efficient Temporal Features Based Framework for Cloud Using MapReduce
Authors
P. Srinivasa Rao
P. E. S. N. Krishna Prasad
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-76348-4_12

Premium Partner