Enhancement Data Integrity Checking Using Combination MD5 and SHA1 Algorithm in Hadoop Architecture

  title={Enhancement Data Integrity Checking Using Combination MD5 and SHA1 Algorithm in Hadoop Architecture},
  author={Y. B. Idris and Saiful Adli Ismail and N. F. Azmi and Azri Azmi and A. Azizan},
The use of Big Data in decision-making is critical, in line with the growing size of data storage, either online or offline. However, there are only a few software applications that are capable to process large-capacity data such as Hadoop. Hadoop is open-source software for Big Data processing including several components joined together where one of its main components is Hadoop User Experience (Hue). Hue is being used to upload the data into Hadoop databases using Graphical User Interface… Expand
Analysis of password protected Document
This research paper analyzed the encryption process involved in word documents (Procedure involved in document protection), and focused on John the Ripper (JtR) tool reducing the file and memory complexity of brute force attacks. Expand
Forensic Based Cloud Computing Architecture – Exploration and Implementation
  • Sugandha Bhatia, J. Malhotra
  • Computer Science
  • 2019 3rd International Conference on Computing and Communications Technologies (ICCCT)
  • 2019
An architecture is being proposed to support forensic accession and investigation of cloud based system which is required for the sustainable growth of the cloud computing applications and services. Expand
Penerapan Hashing SHA1 dan Algoritma Asimetris RSA untuk Keamanan Data pada Sistem Informasi berbasis Web
Penggunaan teknologi informasi dalam memperoleh data di era society 5.0 merupakan hal yang tidak dapat dihindari. Hampir semua data yang kita gunakan tersimpan dalam database pada sebuah sistemExpand


External integrity verification for outsourced big data in cloud and IoT: A big picture
A big picture is provided through summarizing and analysis of the main results of external integrity verification schemes for big data in cloud through providing an analysis on authenticator-based data integrity verification techniques on cloud and Internet of Things data. Expand
Attack Tolerant Big Data File System
Data driven decisions derived from big data have assumed critical importance in many application domains, fueling the demand for collection, transportation, storage and processing of massive volumesExpand
Big Data and Hadoop-a Study in Security Perspective
The Big data issues are shown and more on security issue arises in Hadoop Architecture base layer called HDFS, the HDFS security is enhanced by using three approaches like Kerberos, Algorithm and Name node. Expand
A Review of Comparative Study of MD5 and SHA Security Algorithm
This research paper aims to analyze and juxtapose the two hash algorithms, MD5 and SHA, using various key features and performance metrics to provide the researchers a better comparison picture so that they can reach to the final upshot, which algorithm has superseded the other. Expand
The rise of "big data" on cloud computing: Review and open research issues
The definition, characteristics, and classification of big data along with some discussions on cloud computing are introduced, and research challenges are investigated, with focus on scalability, availability, data integrity, data transformation, data quality, data heterogeneity, privacy, legal and regulatory issues, and governance. Expand
Chapter 7 – Big Data Tools and Techniques
This chapter discusses the Hadoop Distributed File System (HDFS), introduces the programming model provided by MapReduce and YARN, and walks through associated tools such as Zookeeper and Hive. Expand
Fast online error detection and correction with thread signature calculae
  • B. Fechner
  • Computer Science
  • Microprocess. Microsystems
  • 2012
A compression-based and compression-free checksum-scheme, able to recognize transient faults before commitment and preserves binary compatibility, is suggested, which is applicable for time-redundant (virtual duplex and redundantly multithreaded systems) as well as structural redundant systems. Expand
Ensuring data integrity in storage: techniques and applications
It is described how logical redundancy can be used in today's systems to perform efficient and seamless integrity assurance and identifies and formalizes a new class of integrity assurance techniques that involve logical redundancy. Expand
Big Data, Hadoop, and Cloud Computing
Big Data, Hadoop, and cloud computing are presented as standalone material, each tying back into the overall analytics solution implementations presented in preceding chapters. Expand
A Comparative Analysis of SHA and MD 5 Algorithm
To compare the time taken to build a hash as well as it also compares the bit rate passes through a hash value, a deep analysis of message digest 5 and secure hashing algorithm is performed. Expand