Volume- 3
Issue- 3
Year- 2015
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Mr. Yannam Apparao , Mrs. K.Laxminarayanamma
paper proposed the security issue on secure data storage and transaction logs in associated with data storage, management, and processing, though security not available in various things in big data unauthorized access may corrupt the data, this paper provides the security on transaction logs are transfer the information from once source to another source while transferring the data unauthorized access may tamper and forwards therefore users may not get exact data. Hence the paper proves security issue on secure data storage and transaction logs.
[1] Ren, Yulong, and Wen Tang. "A Service Integrity Assurance Framework for Cloud Computing Based on Mapreduce."Proceedings of IEEE CCIS2012. Hangzhou: 2012, pp 240 – 244, Oct. 30 2012-Nov. 1 2012.
[2] N, Gonzalez, Miers C, Redigolo F, Carvalho T, Simplicio M, de Sousa G.T, and Pourzandi M. "A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing.". Athens: 2011., pp 231 – 238, Nov. 29 2011- Dec. 1 2011
[3] Hao, Chen, and Ying Qiao. "Research of Cloud Computing based on the Hadoop platform.". Chengdu, China: 2011, pp. 181 – 184, 21-23 Oct 2011.
[4] Y, Amanatullah, Ipung H.P., Juliandri A, and Lim C. "Toward cloud computing reference architecture: Cloud service management perspective.". Jakarta: 2013, pp. 1-4, 13- 14 Jun. 2013.
[5] A, Katal, Wazid M, and Goudar R.H. "Big data: Issues, challenges, tools and Good practices.". Noida: 2013, pp. 404 – 409, 8-10 Aug. 2013.
[6]. Foster I, Zhao Y, Raicu I, Lu S (2008) Cloud Computing and Grid Computing 360-Degree Compared. In: Grid Computing Environments Workshop (GCE’08). oi:10.1109/GCE.2008.4738445
[7]. Fellowes, W. (2008). Partly Cloudy, Blue-Sky Thinking about Cloud Computing. White paper. 451 Groups.
[8]. M. Casassa-Mont, S. Pearson and P. Bramhall, “Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services”, Proc. DEXA 2003, IEEE Computer Society, 2003, pp. 377-382
[9]. https://www.pcisecuritystandards.org/index.shtml
[10].http://en.wikipedia.org/wiki/Payment_Card_Industry_Dat a_Security_Standard, 24 January 2010
[11]. J. Salmon, “Clouded in uncertainty – the legal pitfalls of cloud computing”, Computing, 24 Sept 2008, http://www.computing.co.uk/computing/features/2226701/clo uded-uncertainty-4229153
[12]. Khajeh-Hosseini, A., Greenwood, D., Sommerville, I., (2010). Cloud Migration: A Case Study of Migrating an Enterprise IT System to IaaS. Submitted to IEEE CLOUD 2010
[13]. S. Overby, How to Negotiate a Better Cloud Computing Contract, CIO, April 21, 2010, http://www.cio.com/article/591629/How_to_Negotiate_a_Bett er_Cloud_Computing_Contract
[14]. Krautheim FJ (2009) Private virtual infrastructure for cloud computing. In: Proc of HotCloud
[15]. Santos N, Gummadi K, Rodrigues R (2009) Towards trusted cloud computing. In: Proc of HotCloud.
[16]. Arnon Rosenthal and Edward Sciore, View Security as the Basis for Data Warehouse Security
[17]. Arnon Rosenthal and Edward Sciore, View Security as the Basis for Data Warehouse Security, Proceedings of the International Workshop on Design and Management of Data Warehouse (DMDW’2000), Sweden, June, 2000.
[18]. Alan R. Downing, Ira B. Greenberg, and Teresa F. Lunt, ISSUES IN DISTRIBUTED DATABASE SECURITY
Currently working as Associate Professor, Marri Laxman Reddy Institute of Technology and Management, Dundigal, Quthbullar(M),R. R. Distic, Telangana-500043,India.
No. of Downloads: 3 | No. of Views: 2032