Efficient Map/Reduce secure data using Multiagent System
DOI:
https://doi.org/10.26438/ijcse/v6i5.144149Keywords:
Multiagent, Hadoop, Internet of Things, Streaming of data ComputingAbstract
Today is an era of digital world where technology and information play a very important role in our lives. Huge amount of data is generated, more than in terms of zetabytes and this data is been transmitted over an internet. Data is from Internet search, mobile devices, Internet of Things which include variety of objects like tablet, sensors, smart phones, digital cameras, tablets, etc., business transactions, Government organization, next generation radio astronomy telescopes, traffic data etc. This result in the raise of big data application. Current technologies i.e. Hadoop is unable to process data and secure the data within a given elapsed time. In this paper we proposed Multiagent Map Reduce Secure Model (MMRSM) using cloud. MMRSM supports both batch processing of data and Streaming of data. The proposed system supports both data security and efficient resource management of processing streaming data with minimum cost and time.
References
Gartner cloud computing definition,
http://www.gartner.com/itglossary/cloud-computing/
Alexandros Labrinidis, H. V. Jagadish, Challenges and Opportunities of Big Data, Journal proceedings of the VLDB Endowment, Volume 5 Issue 12, August 2012, pages 2032 - 2033.
Big Data, http://en.wikipedia.org/wiki/Big_data
Randal E. Bryant, Randy H. Katz, Edward D." Lazowska, Big-Data Computing: Creating revolutionary breakthroughs in commerce, science, and society" Version 8: December 22, 2008
A. M. Talib, R. Atan, R. Abdullah and M. A. A. Murad, “Towards New Access Data Control Technique Based on Multi Agent System Architecture for Cloud Computing in Software Engineering and Computer Systems Part II,” In: V. Snasel, J. Platos and E. El- Qawasmeh, Eds., Springer Series: Communications in Computer and Information Science 189, Springer-Verlag, pp. 268-279.
R. Rivest, A. Shamir, L. Adleman, "A Method for Obtaining Digital
Signatures and Public-Key Cryptosystems,"Communications of the ACM, vol. 21, iss. 2, pp. 120–126, February 1978.
Sulaiman, R., D. Sharma, W. Ma and D. Tran, 2007. A Multi-agent security framework for e-health services. Knowl. Intell. Inform. Eng. Syst., 4693: 547-554. DOI: 10.1007/978-3-540-74827-4_69
J. Surbiryala, C. Li, and C. Rong, “A framework for improving security in cloud computing,” in 2nd IEEE International Conference on Cloud Computing and Big Data Analysis (ICCCBDA 2017). IEEE, 2017.
Kaur M, Mahajan M. (2013). “Using encryption Algorithms to enhance the Data Security in Cloud”. International journal of communication and computer technologies.
Arora R, Parashar A. “Secure User Data in Cloud Computing Using Encryption”, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1922-1926
Padhy R, P Patra, M. R., &Satapathy, S. C. “WINDOWS AZURE PAAS CLOUD : AN Overview”. International Journal of Computer Application., Issue 2, Volume 1, February 2012.
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy- Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data,” Proc. IEEE INFOCOM, pp. 829-837, 2011.
I. Roy, S. Setty, A. Kilzer, V. Shmatikov, and E. Witchel. Airavat: Security and privacy for MapReduce. Technical Report TR-10- 09, UT-Austin, 2010.
K. Zhang, X. Zhou, Y. Chen, X. Wang, and Y. Ruan, “Sedic: Privacy-Aware Data Intensive Computing on Hybrid Clouds,” Proc. 18th ACM Conf. Computer and Comm. Security (CCS ’11), pp. 515-526, 2011.
Philip Derbekoa , Shlomi Dolevb, Ehud Gudesb , Shantanu Sharma "Security and Privacy Aspects in MapReduce on Clouds: A Survey" Elsevier Computer Science Review, May 4, 2016
X. Zhang, C. Liu, S. Nepal, S. Pandey, and J. Chen, “A Privacy Leakage Upper-Bound Constraint Based Approach for Cost- Effective Privacy Preserving of Intermediate Data Sets in Cloud,” IEEE Trans. Parallel and Distributed Systems, to be published, 2012.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
