Third Party Data Protection Applied To Cloud and Xacml Implementation in the Hadoop Environment With Sparql

@article{Reddy2012ThirdPD,
  title={Third Party Data Protection Applied To Cloud and Xacml Implementation in the Hadoop Environment With Sparql},
  author={Ch. Ashok Kumar Reddy},
  journal={IOSR Journal of Computer Engineering},
  year={2012},
  volume={2},
  pages={39-46}
}
  • C. Reddy
  • Published 2012
  • Computer Science
  • IOSR Journal of Computer Engineering
Cloud computing security (sometimes referred to simply as "cloud security") is an evolving sub- domain of Computer security, Network security and, more broadly, Information security It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. Cloud security is not to be confused with security software offerings that are "cloud-based" (a.k.a. security-as-a-service).There are a number of security… 

Figures from this paper

Ten Security Concerns to be Kept in Mind While Accessing Cloud
TLDR
The major security issues for the data stored in cloud and its concerns, services and finally solutions for the security are discussed.
Research opportunities and challenges of security concerns associated with big data in cloud computing
TLDR
This paper strives to offer leading research opportunities and challenges in security services in adoption of cloud Computing with big data applications and also with solutions, which can help the stakeholders to better use of cloud computing services.
Creating a Secured Cloud Based Data Center Using Billboard Manager (BM) and Secuare Co- Processor
TLDR
A secure cloud data center architecture where end users can connect over a secure channel and store their encrypted data in suitable storage area with the help of secure co-processor and Billboard Manager is discussed.
Security Issues and Challenges Combined with Big Data and Cloud Computing
TLDR
This paper discusses security issues in cloud computing that are associated with big data, Big data, Map Reduce and Hadoop environment, and discusses various possible solutions for the issues.
IMPLICATION OF SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING
TLDR
Security issues for cloud computing, Big data, Map Reduce and Hadoop environment are discussed, which includes computer security, network security, information security, and data privacy.
HIGH LEVEL VIEW OF CLOUD SECURITY : ISSUES AND SOLUTIONS
TLDR
Security issues for cloud computing, Map Reduce and Hadoop environment, and various possible solutions for the issues in cloud computing security andHadoop are discussed.
A survey on big data analytics for enhanced security on cloud
TLDR
This survey depicts the limitations of the existing approaches and the requirements for a novel and enhanced approach that ensures integrity of the data stored in cloud enabling better performance with reduced complexity.
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES
TLDR
Security issues for cloud computing, Map Reduce and Hadoop environment, and various possible solutions for the issues in cloud computing security andHadoop are discussed.
Towards introducing and verifying heterogeneous data integration model for cloud
TLDR
A model for integrating heterogeneous data on the cloud focusing on the security of data at rest is proposed, based on service oriented computing, as services are based on fundamental features of interoperability and loose coupling.
Security Issues Associated With Big Data in Cloud Computing
TLDR
Security issues for cloud computing, Big data, Map Reduce and Hadoop environment are discussed, with main focus on security issues in cloud computing that are associated with bigdata.
...
...

References

SHOWING 1-10 OF 11 REFERENCES
Selective and authentic third-party distribution of XML documents
TLDR
By embedding in the query response one digital signature generated by the Owner and some hash values, a subject is able to locally verify the authenticity of a query response, and an approach is presented that, for a wide range of queries, allows a subject to verify the completeness of query results.
Access control for XML documents and data
Certified In-lined Reference Monitoring on .NET
TLDR
MOBILE is an extension of the .NET Common Intermediate Language that supports certified In-Lined Reference Monitoring that can be certified by a simple type-checker to eliminate the need to trust the producer of the IRM.
Building a HighLevel Dataflow System on top of MapReduce: The Pig Experience
TLDR
Pig is a high-level dataflow system that aims at a sweet spot between SQL and Map-Reduce, and performance comparisons between Pig execution and raw Map- Reduce execution are reported.
Aspect-oriented in-lined reference monitors
TLDR
An Aspect-Oriented, declarative, security policy specification language is presented, for enforcement by In-lined Reference Monitors, wherein policy specifications denote Aspects of Oriented security automata---security automata whose edge labels are encoded as pointcut expressions.
Application Of Fuzzy Theory To Writer Recognition Of Chinese Characters
TLDR
A new method to recognize waters in a short time with a simple algorithm that combines the combination of SOSUM and FPDAT, because it can absorb the instability of handwriting characters by membership functions.
The neurophysiology of binocular vision.
ActionScript bytecode verification with co-logic programming
TLDR
A prototype security policy verification system for Action-Script binaries is presented, whose implementation leverages recent advances in co-logic programming, resulting in an unusually small trusted computing base, making the verification system well-suited to frameworks like certifying in-lined reference monitoring systems, which require small, light-weight verifiers.
Application of fuzzy theory to writer recognition
  • IBM PCI cryptographic coprocessor. Retrieved from http://www.ibm.com/security/ crypto cards.Jena. (n.d.). Retrieved from http://jena.sourceforge. net Journal Papers:
  • 2004
...
...