HIGH LEVEL VIEW OF CLOUD SECURITY : ISSUES AND SOLUTIONS

In this paper, we discuss security issues for cloud computing, Map Reduce and Hadoop environment. We also discuss various possible solutions for the issues in cloud computing security and Hadoop. Today, Cloud computing security is developing at a rapid pace which includes computer security, network security and information security. Cloud computing plays a very vital role in protecting data, applications and the related infrastructure with the help of policies, technologies and controls .

[1]  A. Kala Karun,et al.  A review on hadoop — HDFS infrastructure extensions , 2013, 2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES.

[2]  Chen Hao,et al.  Research of Cloud Computing Based on the Hadoop Platform , 2011, 2011 International Conference on Computational and Information Sciences.

[3]  Charles Lim,et al.  Toward cloud computing reference architecture: Cloud service management perspective , 2013, International Conference on ICT for Smart Society.

[4]  Marcos A. Simplício,et al.  A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing , 2011, CloudCom.

[5]  Vitaly Shmatikov,et al.  Airavat: Security and Privacy for MapReduce , 2010, NSDI.

[6]  Huang Lu,et al.  Research on Hadoop Cloud Computing Model and its Applications , 2012, 2012 Third International Conference on Networking and Distributed Computing.

[7]  Yulong Ren,et al.  A service integrity assurance framework for cloud computing based on MapReduce , 2012, 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems.

[8]  C. Kishor Kumar Reddy Third Party Data Protection Applied To Cloud and Xacml Implementation in the Hadoop Environment With Sparql , 2012 .

[9]  Elisa Bertino,et al.  Specifying and enforcing access control policies for XML document sources , 2004, World Wide Web.

[10]  Wei Jiang,et al.  A Map-Reduce System with an Alternate API for Multi-core Environments , 2010, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.

[11]  Avita Katal,et al.  Big data: Issues, challenges, tools and Good practices , 2013, 2013 Sixth International Conference on Contemporary Computing (IC3).

[12]  Elisa Bertino,et al.  Selective and authentic third-party distribution of XML documents , 2004, IEEE Transactions on Knowledge and Data Engineering.