International Journal of Information Technology and Computer Science(IJITCS)

ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)

Published By: MECS Press

IJITCS Vol.6, No.4, Mar. 2014

A Novel Approach for Identification of Hadoop Cloud Temporal Patterns Using Map Reduce

Full Text (PDF, 429KB), PP.37-42

Views:168   Downloads:4


P.Srinivasa Rao, K.Thammi Reddy, MHM.Krishna Prasad

Index Terms

Big Data, Hadoop, Mapreduce, Cloud Computing, Temporal Patterns


Due to the latest developments in the area of science and Technology resulted in the developments of efficient data transfer, capability of handling huge data and the retrieval of data efficiently. Since the data that is stored is increasing voluminously, methods to retrieve relative information and security related concerns are to be addressed efficiently to secure this bulk data. Also with emerging concepts of big data, these security issues are a challenging task. This paper addresses the issue of secure data transfer using the concepts of data mining in cloud environment using hadoop mapreduce. Based on the experimentation done results are analyzed and represented with respect to time and space complexity when compared hadoop with non hadoop approach.

Cite This Paper

P.Srinivasa Rao, K.Thammi Reddy, MHM.Krishna Prasad,"A Novel Approach for Identification of Hadoop Cloud Temporal Patterns Using Map Reduce", International Journal of Information Technology and Computer Science(IJITCS), vol.6, no.4, pp.37-42, 2014. DOI: 10.5815/ijitcs.2014.04.04


[1]KejaingYe et all, vHadoop: A Scalable hadoop virtual cluster platform for MapReduce- Based Parallel Machine learning with Performance Consideration, 2012 IEEE International Conference on Cluster Computing Workships,PP:152-160, 2012

[2]J. Dean and S. Ghemawat, “Map Reduce: Simplified Data processing on large clusters”, communications of the ACM.Vol.51, no.1,,pp 107-113, 2008.

[3]T. White, Hadoop: The Definitive guide. yahoo press ,2010.

[4]Mohamed H. Almeer et al “cloud hadoop mapreduce for remote sensing image analysis” Journal of Emerging Trends in Computing and Information Sciences, VOL. 3, NO. 4, April 2012.

[5]Abhipal Singh et al “File Transfer Using Secure Sockets in Linux Environment”, Proceedings of the 4th National Conference; INDIACom-2010.

[6]Matthieu Bloch et al “Network Security for Client-Server Architecture Using Wiretap Codes”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 3, NO. 3, SEPTEMBER 2008

[7]Xinyi Huang et al “Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013.

[8]Bhaskar Prasad Rimal et al “A Taxonomy and survey of cloud computing system”, Fifth international joint Conference on INC,I MS, IDC, 2009.

[9]Poulami Dutta1 et al “Data Hiding in Audio Signal: A Review” International Journal of Database Theory and Application Vol. 2, No. 2, June 2009

[10]Elisa Bertino et al, “privacy-preserving digital identity management for cloud computing” IEEE computer society technical committee on data Engineering, 2009.

[11]S.Fischer-Hubner and H. Hebdon, “PRIME privacy and identity management for Europe” August 2010.

[12]kitu File whilte et al “symmetric vs Asymmetric encryption” 2010.

[13]Kumar Gunjan et al,international journal of Engineering Research and Technology (IJERT),ISSN 2278-0181 vol1 issue4 june 2012.

[14]Make D.Ryan et al “Cloud computing Security:The Scientific journal of systems and Software challenge, and a survey of solutions”,Elsevier,2013.

[15]Jittin et al . ”An analysis on privacy preserving in cloud computing”, International journal of computer trends and Technology(IJCTT),volume 4 ,issue 6 june 2013.

[16]Man Qi* et al, “Social Networking searching and privacy issues” information security technical report,Elsevier 2011.

[17]Mohiuddin Ahmed et al, “An Advanced survey on Cloud Computing and state of the art Research issues” international journal of computer Sceince issues, vol 9 issue1,jan 2012.

[18]P.Srinivasa Rao et al “A Novel and Efficient Method for Protecting Internet usage from Unauthorized Access Using Map Reduce” international journal of information technology and computer science, vol5, N3-6, Feb 2013.