2020
DOI: 10.7717/peerj-cs.259
|View full text |Cite
|
Sign up to set email alerts
|

Attribute based honey encryption algorithm for securing big data: Hadoop distributed file system perspective

Abstract: Hadoop has become a promising platform to reliably process and store big data. It provides flexible and low cost services to huge data through Hadoop Distributed File System (HDFS) storage. Unfortunately, absence of any inherent security mechanism in Hadoop increases the possibility of malicious attacks on the data processed or stored through Hadoop. In this scenario, securing the data stored in HDFS becomes a challenging task. Hence, researchers and practitioners have intensified their efforts in working on m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(20 citation statements)
references
References 46 publications
0
20
0
Order By: Relevance
“…4 represents the whole malware analysis types and techniques that are used for securing web applications. Authors apply a multi criteria decision making (MCDM) approach called fuzzy-Analytical Hierarchy Process (AHP) for evaluating the priority and finding the most prioritized approach and type of malware analysis [46][47][48][49][50][51][52]. Fuzzy-AHP is methodology that is pre-verified and authors has expertise in fuzzy-based various MCDM approaches through their previous experience [53][54][55][56].…”
Section: Ranking Examinationmentioning
confidence: 99%
See 1 more Smart Citation
“…4 represents the whole malware analysis types and techniques that are used for securing web applications. Authors apply a multi criteria decision making (MCDM) approach called fuzzy-Analytical Hierarchy Process (AHP) for evaluating the priority and finding the most prioritized approach and type of malware analysis [46][47][48][49][50][51][52]. Fuzzy-AHP is methodology that is pre-verified and authors has expertise in fuzzy-based various MCDM approaches through their previous experience [53][54][55][56].…”
Section: Ranking Examinationmentioning
confidence: 99%
“…One of the examples in this context is that of Rami Sihwail et al The study provides a brief discussion on current malware analysis techniques [48], classification of malware in the current situation and also provides literature about different kinds of malware detection methods. There are some other related papers present in the study [49,50,75].…”
Section: Minimum Number Of Related Articles and Research Endeavorsmentioning
confidence: 99%
“…Nowadays, cloud services' development offers a wide source of information that causes many problems in this subject ( Jafari Kaleibar & Abbaspour, 2020 ). Without thinking carefully about some circumstances, such as functional, non-functional, and budgetary limitations, it is not probable to discover the numerous cloud providers ( Kapil et al, 2020 ). Therefore, efficient service discovery in the cloud is a significant challenge and an essential part of any distributed system ( Srirama, Paniagua & Liivi, 2013 ; Navimipour et al, 2014 ; Egbe et al, 2016 ).…”
Section: Introductionmentioning
confidence: 99%
“…Each has its unique characteristics, as well as its own unique methods for verifying the integrity and data security. The specific requirements of industrial networks often make protocols particularly vulnerable to interference [2], [15], [17]. Among the above-mentioned standard network protocols, DNP3 is the most popular.…”
Section: Introductionmentioning
confidence: 99%