Open Access   Article Go Back

Efficient Map/Reduce secure data using Multiagent System

H. Kousar1 , B.R.P. Babu2

  1. Dept. of CSE, East Point College of Engineering and Technology, Bangalore, India.
  2. Dept. of CSE, V.T.U, Belgaum, India.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 144-149, May-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i5.144149

Online published on May 31, 2018

Copyright © H. Kousar, B.R.P. Babu . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: H. Kousar, B.R.P. Babu, “Efficient Map/Reduce secure data using Multiagent System,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.144-149, 2018.

MLA Style Citation: H. Kousar, B.R.P. Babu "Efficient Map/Reduce secure data using Multiagent System." International Journal of Computer Sciences and Engineering 6.5 (2018): 144-149.

APA Style Citation: H. Kousar, B.R.P. Babu, (2018). Efficient Map/Reduce secure data using Multiagent System. International Journal of Computer Sciences and Engineering, 6(5), 144-149.

BibTex Style Citation:
@article{Kousar_2018,
author = {H. Kousar, B.R.P. Babu},
title = {Efficient Map/Reduce secure data using Multiagent System},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {144-149},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1953},
doi = {https://doi.org/10.26438/ijcse/v6i5.144149}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.144149}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1953
TI - Efficient Map/Reduce secure data using Multiagent System
T2 - International Journal of Computer Sciences and Engineering
AU - H. Kousar, B.R.P. Babu
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 144-149
IS - 5
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
703 313 downloads 169 downloads
  
  
           

Abstract

Today is an era of digital world where technology and information play a very important role in our lives. Huge amount of data is generated, more than in terms of zetabytes and this data is been transmitted over an internet. Data is from Internet search, mobile devices, Internet of Things which include variety of objects like tablet, sensors, smart phones, digital cameras, tablets, etc., business transactions, Government organization, next generation radio astronomy telescopes, traffic data etc. This result in the raise of big data application. Current technologies i.e. Hadoop is unable to process data and secure the data within a given elapsed time. In this paper we proposed Multiagent Map Reduce Secure Model (MMRSM) using cloud. MMRSM supports both batch processing of data and Streaming of data. The proposed system supports both data security and efficient resource management of processing streaming data with minimum cost and time.

Key-Words / Index Term

Multiagent, Hadoop, Internet of Things, Streaming of data Computing

References

[1] Gartner cloud computing definition,
http://www.gartner.com/itglossary/cloud-computing/
[2] Alexandros Labrinidis, H. V. Jagadish, Challenges and Opportunities of Big Data, Journal proceedings of the VLDB Endowment, Volume 5 Issue 12, August 2012, pages 2032 - 2033.
[3] Big Data, http://en.wikipedia.org/wiki/Big_data
[4] Randal E. Bryant, Randy H. Katz, Edward D." Lazowska, Big-Data Computing: Creating revolutionary breakthroughs in commerce, science, and society" Version 8: December 22, 2008
[5] A. M. Talib, R. Atan, R. Abdullah and M. A. A. Murad, “Towards New Access Data Control Technique Based on Multi Agent System Architecture for Cloud Computing in Software Engineering and Computer Systems Part II,” In: V. Snasel, J. Platos and E. El- Qawasmeh, Eds., Springer Series: Communications in Computer and Information Science 189, Springer-Verlag, pp. 268-279.
[6] R. Rivest, A. Shamir, L. Adleman, "A Method for Obtaining Digital
Signatures and Public-Key Cryptosystems,"Communications of the ACM, vol. 21, iss. 2, pp. 120–126, February 1978.
[7] Sulaiman, R., D. Sharma, W. Ma and D. Tran, 2007. A Multi-agent security framework for e-health services. Knowl. Intell. Inform. Eng. Syst., 4693: 547-554. DOI: 10.1007/978-3-540-74827-4_69
[8] J. Surbiryala, C. Li, and C. Rong, “A framework for improving security in cloud computing,” in 2nd IEEE International Conference on Cloud Computing and Big Data Analysis (ICCCBDA 2017). IEEE, 2017.
[9] Kaur M, Mahajan M. (2013). “Using encryption Algorithms to enhance the Data Security in Cloud”. International journal of communication and computer technologies.
[10] Arora R, Parashar A. “Secure User Data in Cloud Computing Using Encryption”, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1922-1926
[11] Padhy R, P Patra, M. R., &Satapathy, S. C. “WINDOWS AZURE PAAS CLOUD : AN Overview”. International Journal of Computer Application., Issue 2, Volume 1, February 2012.
[12] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy- Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data,” Proc. IEEE INFOCOM, pp. 829-837, 2011.
[13] I. Roy, S. Setty, A. Kilzer, V. Shmatikov, and E. Witchel. Airavat: Security and privacy for MapReduce. Technical Report TR-10- 09, UT-Austin, 2010.
[14] K. Zhang, X. Zhou, Y. Chen, X. Wang, and Y. Ruan, “Sedic: Privacy-Aware Data Intensive Computing on Hybrid Clouds,” Proc. 18th ACM Conf. Computer and Comm. Security (CCS ’11), pp. 515-526, 2011.
[15] Philip Derbekoa , Shlomi Dolevb, Ehud Gudesb , Shantanu Sharma "Security and Privacy Aspects in MapReduce on Clouds: A Survey" Elsevier Computer Science Review, May 4, 2016
[16] X. Zhang, C. Liu, S. Nepal, S. Pandey, and J. Chen, “A Privacy Leakage Upper-Bound Constraint Based Approach for Cost- Effective Privacy Preserving of Intermediate Data Sets in Cloud,” IEEE Trans. Parallel and Distributed Systems, to be published, 2012.