Efficient Map/Reduce secure data using Multiagent System

Authors

  • Kousar H Dept. of CSE, East Point College of Engineering and Technology, Bangalore, India
  • Babu BRP Dept. of CSE, V.T.U, Belgaum, India

DOI:

https://doi.org/10.26438/ijcse/v6i5.144149

Keywords:

Multiagent, Hadoop, Internet of Things, Streaming of data Computing

Abstract

Today is an era of digital world where technology and information play a very important role in our lives. Huge amount of data is generated, more than in terms of zetabytes and this data is been transmitted over an internet. Data is from Internet search, mobile devices, Internet of Things which include variety of objects like tablet, sensors, smart phones, digital cameras, tablets, etc., business transactions, Government organization, next generation radio astronomy telescopes, traffic data etc. This result in the raise of big data application. Current technologies i.e. Hadoop is unable to process data and secure the data within a given elapsed time. In this paper we proposed Multiagent Map Reduce Secure Model (MMRSM) using cloud. MMRSM supports both batch processing of data and Streaming of data. The proposed system supports both data security and efficient resource management of processing streaming data with minimum cost and time.

References

Gartner cloud computing definition,

http://www.gartner.com/itglossary/cloud-computing/

Alexandros Labrinidis, H. V. Jagadish, Challenges and Opportunities of Big Data, Journal proceedings of the VLDB Endowment, Volume 5 Issue 12, August 2012, pages 2032 - 2033.

Big Data, http://en.wikipedia.org/wiki/Big_data

Randal E. Bryant, Randy H. Katz, Edward D." Lazowska, Big-Data Computing: Creating revolutionary breakthroughs in commerce, science, and society" Version 8: December 22, 2008

A. M. Talib, R. Atan, R. Abdullah and M. A. A. Murad, “Towards New Access Data Control Technique Based on Multi Agent System Architecture for Cloud Computing in Software Engineering and Computer Systems Part II,” In: V. Snasel, J. Platos and E. El- Qawasmeh, Eds., Springer Series: Communications in Computer and Information Science 189, Springer-Verlag, pp. 268-279.

R. Rivest, A. Shamir, L. Adleman, "A Method for Obtaining Digital

Signatures and Public-Key Cryptosystems,"Communications of the ACM, vol. 21, iss. 2, pp. 120–126, February 1978.

Sulaiman, R., D. Sharma, W. Ma and D. Tran, 2007. A Multi-agent security framework for e-health services. Knowl. Intell. Inform. Eng. Syst., 4693: 547-554. DOI: 10.1007/978-3-540-74827-4_69

J. Surbiryala, C. Li, and C. Rong, “A framework for improving security in cloud computing,” in 2nd IEEE International Conference on Cloud Computing and Big Data Analysis (ICCCBDA 2017). IEEE, 2017.

Kaur M, Mahajan M. (2013). “Using encryption Algorithms to enhance the Data Security in Cloud”. International journal of communication and computer technologies.

Arora R, Parashar A. “Secure User Data in Cloud Computing Using Encryption”, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1922-1926

Padhy R, P Patra, M. R., &Satapathy, S. C. “WINDOWS AZURE PAAS CLOUD : AN Overview”. International Journal of Computer Application., Issue 2, Volume 1, February 2012.

N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy- Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data,” Proc. IEEE INFOCOM, pp. 829-837, 2011.

I. Roy, S. Setty, A. Kilzer, V. Shmatikov, and E. Witchel. Airavat: Security and privacy for MapReduce. Technical Report TR-10- 09, UT-Austin, 2010.

K. Zhang, X. Zhou, Y. Chen, X. Wang, and Y. Ruan, “Sedic: Privacy-Aware Data Intensive Computing on Hybrid Clouds,” Proc. 18th ACM Conf. Computer and Comm. Security (CCS ’11), pp. 515-526, 2011.

Philip Derbekoa , Shlomi Dolevb, Ehud Gudesb , Shantanu Sharma "Security and Privacy Aspects in MapReduce on Clouds: A Survey" Elsevier Computer Science Review, May 4, 2016

X. Zhang, C. Liu, S. Nepal, S. Pandey, and J. Chen, “A Privacy Leakage Upper-Bound Constraint Based Approach for Cost- Effective Privacy Preserving of Intermediate Data Sets in Cloud,” IEEE Trans. Parallel and Distributed Systems, to be published, 2012.

Downloads

Published

2025-11-13
CITATION
DOI: 10.26438/ijcse/v6i5.144149
Published: 2025-11-13

How to Cite

[1]
H. Kousar and B. Babu, “Efficient Map/Reduce secure data using Multiagent System”, Int. J. Comp. Sci. Eng., vol. 6, no. 5, pp. 145–149, Nov. 2025.

Issue

Section

Research Article