References
[1]. Nitesh Jain, Pradeep Sharma, "A Security Key Management Model for Cloud Environment", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.1, pp.45-48, 2017.
[2]. B. Subasri, P. Vijayalakshmi, P. Yurega, E. Revathi, "Improving Zero Knowledge in Cloud Storage Auditing System", International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.204-207, 2014.
[3]. Rajesh Verma , "Comparative Based Study of Scheduling Algorithms for Resource Management in Cloud Computing Environment", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.4, pp.17-23, 2013.
[4]. B. Lakhe, “Monitoring in Hadoop”, Practical Hadoop Security, pp. 119–141, 2014.
[5]. Shubhangi D.C., Sabahat Fatima, "Privacy-Preserving Outsourcing of Medical Image Data using SIFT Descriptor", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.141-145, 2017.
[6]. Y. Wang, C. Xu, X. Li, and W. Yu, “JVM-Bypass for Efficient Hadoop Shuffling,” 2013 IEEE 27th International Symposium on Parallel and Distributed Processing, May 2013.
[7]. Ruchi Mittal and Ruhi Bagga, "Performance Analysis of Hadoop with Pseudo-Distributed Mode on Different Machines", International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.113-117, 2015.
[8]. J. Cohen and S. Acharya, “Towards a Trusted Hadoop Storage Platform: Design Considerations of an AES Based Encryption Scheme with TPM Rooted Key Protections,” 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, Dec. 2013.
[9]. W. Stallings, “Network Security Essentials: Applications and Standards”, Prentice-Hall Published, 2000.
[10]. P. Adluru, S. S. Datla, and X. Zhang, “Hadoop eco system for big data security and privacy,” 2015 Long Island Systems, Applications and Technology, May 2015.
[11]. D. Nunez, I. Agudo, and J. Lopez, “Delegated Access for Hadoop Clusters in the Cloud,” 2014 IEEE 6th International Conference on Cloud Computing Technology and Science, Dec. 2014.a
[12]. Xianqing Yu, P. Ning, and M. A. Vouk, “Enhancing security of Hadoop in a public cloud,” 2015 6th International Conference on Information and Communication Systems (ICICS), Apr. 2015.
[13]. Lin Wen-hui, Lei Zhen-Ming, Yang Jie, He Gang, Liu Jun, and Liu Fang, “Secure cloud storage management method based on time stamp authority,” National Doctoral Academic Forum on Information and Communications Technology 2013, 2013.
[14]. H. Zhou and Q. Wen, “A new solution of data security accessing for Hadoop based on CP-ABE,” 2014 IEEE 5th International Conference on Software Engineering and Service Science, Jun. 2014.
[15]. P. Zerfos, H. Yeo, B. D. Paulovicks, and V. Sheinin, “SDFS: Secure distributed file system for data-at-rest security for Hadoop-as-a-service,” 2015 IEEE International Conference on Big Data (Big Data), Oct. 2015.
[16]. A. Sharif, S. Cooney, S. Gong, and D. Vitek, “Current security threats and prevention measures relating to cloud services, Hadoop concurrent processing, and big data,” 2015 IEEE International Conference on Big Data (Big Data), Oct. 2015.
[17]. G. Zhou, D. Zhao, K. Zou, W. Xu, X. Lv, Q. Wang, and W. Yin, “The static security analysis in power system based on Spark Cloud Computing platform,” 2015 IEEE Innovative Smart Grid Technologies - Asia (ISGT ASIA), Nov. 2015.
[18]. A. Desai, Nagegowda K S, and Ninikrishna T, “Secure and QoS aware architecture for cloud using software defined networks and Hadoop,” 2015 International Conference on Computing and Network Communications (CoCoNet), Dec. 2015.
[19]. Arsha Sultana and S. Madhavi , "Generating Optimized Association Rule for Big Data Using GA and MLMS", International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.144-148, 2015.
[20]. V. Kapoor, "Data Encryption and Decryption Using Modified RSA Cryptography Based on Multiple Public Keys and ‘n’prime Number", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.35-38, 2013.
[21]. S.L.Mewada, U.K. Singh, P. Sharma, "Security Enhancement in Cloud Computing (CC)", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.31-37, 2013.
[22]. S. M. Khan and K. W. Hamlen, “Hatman: Intra-cloud Trust Management for Hadoop,” 2012 IEEE Fifth International Conference on Cloud Computing, Jun. 2012.
[23]. F. A. H. Jing, S. B. L. Renfa, and T. C. T. Zhuo, “The research of the data security for cloud disk based on the Hadoop framework,” 2013 Fourth International Conference on Intelligent Control and Information Processing (ICICIP), Jun. 2013.
[24]. XU Guang-hui, “Deploying and researching Hadoop in virtual
machines (ICAL)”, IEEE International Conference on Zhengzhou, pp. 395-399, 2012.
[25]. Z. Tang, J. Zhou, K. Li, and R. Li, “MTSD: A Task Scheduling Algorithm for MapReduce Base on Deadline Constraints,” 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum, May 2012.
[26]. P.N. Priyanka, S.V. Phaneendra, "Study on Migration from conventional File System to advancement of Bigdata Technologies in the real world", International Journal of Computer Sciences and Engineering, Vol.2, Issue.8, pp.11-20, 2014.
[27]. Da-Wei Zhang, Fu-Quan Sun, Xu Cheng, and Chao Liu, “Research on hadoop-based enterprise file cloud storage system,” 2011 3rd International Conference on Awareness Science and Technology (iCAST), Sep. 2011.
[28]. Hou Qinhua,Wu Yongwei,Zheng Weimin, “A Method on Protection of User Data Privacy in Cloud Storage Platform”, Journal of Computer Research and Development, pp.4871146-1154, 2011.
[29]. S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing,” 2010 Proceedings IEEE INFOCOM, Mar. 2010.