Advertisement

A Secure and Efficient Temporal Features Based Framework for Cloud Using MapReduce

  • P. Srinivasa Rao
  • P. E. S. N. Krishna Prasad
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 736)

Abstract

A new data mining method called temporal pattern identification in cloud is developed using MapReduce: a power full feature of hadoop with temporal features. In the paper a new approach called temporal features based authentication approach has been introduced where a user will be verified by 2 phases. In phase1 the user facial features will be stored at HIB (Hadoop Image Bundle) and in second phase the user credentials will be checked by using symmetric encryption technique. The hadoop cluster can be exported to cloud based on user demand such as IAAS, SAAS, and PAAS. This cloud model is useful to deploy applications that can be use to transmit massive data over cloud environment. It also allows different kinds of optimization techniques and functionalities. The framework can also be used to give optimized security to the massive data stored by user at cloud environment. The article make use of temporal patters of user who entered into cloud by updating it in a logfile. Experimentation conducted by hiding text, image and both in video file and the performance of the cluster is monitored by using efficient monitoring tool called ganglia to provide auto-scaling functionality of the cluster.

Keywords

Bigdata Hadoop MapReduce Cloud computing Temporal patterns 

References

  1. 1.
    Wong, C.K., Lam, S.S.: Digital signatures for flows and multicasts. IEEE/ACM Trans. Netw. 7(4), 502–513 (1999)CrossRefGoogle Scholar
  2. 2.
    Basescu, C., Leordeanu, C., Costan, A., Carpen-Amarie, A., Antoniu, G.: Managing data access on clouds: a generic framework for enforcing security policies. In: 25th International Conference on Advanced Information Networking and Applications, vol. 10, pp. 459–466 (2011)Google Scholar
  3. 3.
    Koslovski, G., Yeow, W.-L., Westphal, C., Huu, T.T., Montagnat, J., Vicat-Blanc, P.: Reliability support in virtual infrastructures. In: IEEE International Conference on Cloud Computing Technology and Science, vol. 10 (2010)Google Scholar
  4. 4.
    Yu, J., et al.: Towards dynamic resource provisioning for traffic mining service cloud. White paper (2011)Google Scholar
  5. 5.
    Kambatla, K., Pathak, A., Pucha, H.: Towards optimizing Hadoop provisioning in the cloud. White paper (2011)Google Scholar
  6. 6.
    Munir, K., Palaniappan, S.: Framework for secure cloud computing. Int. J. Cloud Comput. Serv. Archit. (IJCCSA) 3(2), pp. 21–35 (2013)Google Scholar
  7. 7.
    Hamlen, K., Kantarcioglu, M., Khan, L., Thuraisingham, B.: Security issues for cloud computing. Int. J. Inf. Secur. Priv. 4(2), 39–51 (2010)CrossRefGoogle Scholar
  8. 8.
    kitu File whilte, et al.: Symmetric vs asymmetric encryption (2010)Google Scholar
  9. 9.
    Harn, L., et al.: Generalized digital certificate for user authentication and key establishment for secure communications. IEEE (2011)Google Scholar
  10. 10.
    Almeer, M.H., et al.: Cloud Hadoop map reduce for remote sensing image analysis. J. Emerg. Trends Comput. Inf. Sci. 3(4), 637–644 (2012)Google Scholar
  11. 11.
    Chowdhur, N.M.M.K., Boutaba, R.: A Survey of Network Virtualization, vol. 54, pp. 862–876. Elsevier (2010)Google Scholar
  12. 12.
    Schoo, P., Fusenig, V., Souza, V., Melo, M., Murray, P., Debar, H., Medhioub, H., Zeghlache, D.: Challenges for cloud networking security. In: 2nd International ICST Conference on Mobile Networks and Management, vol. 137, 22–24 September 2010Google Scholar
  13. 13.
    Dutta, P., et al.: Data hiding in audio signal: a review. Int. J. Database Theor. Appl. 2(2), 1–8 (2009)Google Scholar
  14. 14.
    Rao, P.S., et al.: A novel approach for identifying cloud Hadoop temporal patterns using MapReduce. IJITCS 4, 37–42 (2014)CrossRefGoogle Scholar
  15. 15.
    Senhadji, S., et al.: Association rule mining and load balancing strategy in grid systems. IAJIT 11(4), 338–344 (2013)Google Scholar
  16. 16.
    De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Pelosi, G., Samarati, P.: Encryption-based policy enforcement for cloud storage. White paper (2012)Google Scholar
  17. 17.
    Ries, T., Fusenig, V., Vilbois, C., Engel, T.: Verification of data location in cloud networking. In: Fourth IEEE International Conference on Utility and Cloud Computing, vol. 72, pp. 439–444 (2011)Google Scholar
  18. 18.
    Streitberger, W., Ruppel, A.: Cloud computing security – protection goals, taxonomy, market review. Institute for Secure Information Technology SIT, Technical report (2010)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • P. Srinivasa Rao
    • 1
  • P. E. S. N. Krishna Prasad
    • 2
  1. 1.MVGR College of EngineeringVizianagaramIndia
  2. 2.Prasad V. Potluri Siddhartha Institute of TechnologyVijayawadaIndia

Personalised recommendations