{"title":"Dynamic data leakage detection model based approach for MapReduce computational security in cloud","authors":"S. Chhabra, Ashutosh Kumar Singh","doi":"10.1109/ECO-FRIENDLY.2016.7893234","DOIUrl":null,"url":null,"abstract":"Cloud computing has become a popular buzzword and come out to be of great success in recent years with many advanced contributions. As cloud is storing an enormous amount of digital data engaged with third party services over the internet which raises new security concerns. Efforts are being made by researchers to make cloud secure and reliable computing environment. The technique used in this paper can be recognized as one of the leading methods to secure our sensitive data. The data we used is weather forecasting data which we have accumulated from the website of the government of India. Proposed methodology balances the load of whole data into chunks so that parallel processing will increase and execution time will decrease. Then the whole data are made to undergo map reduce by analysis of filtering and reducing the data with the help of a well known Hadoop framework. There are two main constituents of map reduce: Job follower and Task follower. These constituents will assign the tasks further to slave nodes. It reduces data storage size up to 70%. Reduced data will build more secure by using data leakage detection. Also, when any leakage of data comes to our concern identification of the guilty agent is performed. With the help of s-max algorithm we can conclude that it gives a significant improvement to find a guilty agent in probability with respect to > 0.4 of the reduced data. The level of security is computed or analyzed in the range of 0 to 1, with some probability criteria.","PeriodicalId":405434,"journal":{"name":"2016 Fifth International Conference on Eco-friendly Computing and Communication Systems (ICECCS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"22","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Fifth International Conference on Eco-friendly Computing and Communication Systems (ICECCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECO-FRIENDLY.2016.7893234","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 22
Abstract
Cloud computing has become a popular buzzword and come out to be of great success in recent years with many advanced contributions. As cloud is storing an enormous amount of digital data engaged with third party services over the internet which raises new security concerns. Efforts are being made by researchers to make cloud secure and reliable computing environment. The technique used in this paper can be recognized as one of the leading methods to secure our sensitive data. The data we used is weather forecasting data which we have accumulated from the website of the government of India. Proposed methodology balances the load of whole data into chunks so that parallel processing will increase and execution time will decrease. Then the whole data are made to undergo map reduce by analysis of filtering and reducing the data with the help of a well known Hadoop framework. There are two main constituents of map reduce: Job follower and Task follower. These constituents will assign the tasks further to slave nodes. It reduces data storage size up to 70%. Reduced data will build more secure by using data leakage detection. Also, when any leakage of data comes to our concern identification of the guilty agent is performed. With the help of s-max algorithm we can conclude that it gives a significant improvement to find a guilty agent in probability with respect to > 0.4 of the reduced data. The level of security is computed or analyzed in the range of 0 to 1, with some probability criteria.