well, this is out capcha image     ISSN 2320-7639 (Online)  
Call for Paper
Paper Submission
Journal Contents
Current Issue
Special Issues
Archive Issue
Best Paper Award
Author & Reviewer
Author Guidelines
Coverage Areas
Correction Policy
Reviewer Guidelines
Peer Review Process
Ethics and Malpractice
Hard Copy Request

Directaly Press request for print hard copy of issue via email

  Digital Certificate
    Regular Issues Certificate
    Special Issue Certificate
    Paper Format
    Copyright Transfer Form
    Originality Certificate
Full Paper View
Open Access   Article

Security Issues in Big Data with Cloud Computing
Anitya Kumar Gupta1 , Srishti Gupta2
  • Computer Science Engineering, Apeejay Stya University, Gurugram, India.
  • Electronics and Communication Engineering, Bharti Vidyapeeth College of Engineering, Delhi, India .
Correspondence should be addressed to:
Section:Review Paper, Product Type: Isroset-Journal
Vol.5 , Issue.6 , pp.27-32, Dec-2017


Online published on Dec 31, 2017
Copyright © Anitya Kumar Gupta, Srishti Gupta . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at   Google Scholar | DPI Digital Library
  XML View PDF Download  
Citation :
IEEE Style Citation: Anitya Kumar Gupta, Srishti Gupta, “Security Issues in Big Data with Cloud Computing”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.6, pp.27-32, 2017.

MLA Style Citation: Anitya Kumar Gupta, Srishti Gupta "Security Issues in Big Data with Cloud Computing." International Journal of Scientific Research in Computer Science and Engineering 5.6 (2017): 27-32.

APA Style Citation: Anitya Kumar Gupta, Srishti Gupta, (2017). Security Issues in Big Data with Cloud Computing. International Journal of Scientific Research in Computer Science and Engineering, 5(6), 27-32.
1 Views    1 Downloads    1 Downloads
Abstract :
In this paper, we examine security issues for cloud computing, Big Data, Map Reduce and Hadoop environment. The fundamental focus is on security issues in distributed computing that are connected with huge information. Big data information applications are an awesome advantage to associations, business, organizations and numerous substantial scale and little scale ventures. We additionally talk about different conceivable answers for the issues in distributed computing security and Hadoop. Distributed computing security is creating at a quick pace which incorporates PC security, system security, data security, and information protection. Distributed computing assumes an extremely indispensable part in securing information, applications and the related foundation with the assistance of arrangements, innovations, controls, and enormous information instruments. In addition, distributed computing, enormous information and its applications, focal points are prone to speak to the most promising new frontiers in science.
Key-Words / Index Term :
Big Data, Cloud Computing, Hadoop, HDFS (Hadoop Distributed File System), Map Reduce
References :
[1] Ren, Yulong, and Wen Tang. "A Service Integrity Assurance Framework For Cloud Computing Based On Mapreduce."Proceedings of IEEE CCIS2012. Hangzhou: 2012, pp 240 –244, Oct. 30 2012-Nov. 1 2012
[2]N, Gonzalez, Miers C, Redigolo F, Carvalho T, Simplicio M, de Sousa G.T, and Pourzandi M. "A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing.". Athens: 2011. pp 231 – 238, Nov. 29 2011- Dec. 1 2011
[3] A. Haripriya, A.P. Siva Kumar, "An Effective Patient Treatment Plan Recommendation with Predicted Treatment Time Using Hadoop", International Journal of Computer Sciences and Engineering, Vol.5, Issue.8, pp.155-158, 2017.
[4] Ujjwal Agarwal, "Cloud Computing: BDaaS and HDaaS (Big Data as a Service and Hadoop as a Service)", International Journal of Computer Sciences and Engineering, Vol.5, Issue.11, pp.131-134, 2017.
[5] "Security-Enhanced Linux.” Security-Enhanced Linux. N.p. Web. 13 Dec 2013.
[6] Big data adoption- Infrastructure consideration –TCS White paper
User Section

If you do not have an account Click here for registration.
Email Id :   *
Password :   *
New User?   Forgot Password
Authorization Required

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us atΒ or view contact page for more details.

Open Access
     Home l Cancellation Policy l Refund Policy l Terms & Conditions l Privacy Policy l Our Services l Sitemap This work is licensed under an Attribution-NC-ND 4.0 International (CC BY-NC-ND 4.0)
ISROSET is the world's largest leading and growing professional organization dedicated to pioneering scientific research for the benefit of humanity without financial restriction.
© Copyright-2016 IJSRCSE: All rights reserved. Use of this website signifies your agreement to the terms and conditions. Reg. No: 24143/IND/CE/2012