HASSAN BIJIK, 2023 - Google Patents
A review on securing distributed Big Data Storage in Cloud EnvironmentHASSAN BIJIK, 2023
- Document ID
- 12466214301102724868
- Author
- HASSAN BIJIK A
- Publication year
External Links
- 238000013500 data storage 0 title abstract description 25
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30312—Storage and indexing structures; Management thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
- G06F17/3015—Redundancy elimination performed by the file system
- G06F17/30156—De-duplication implemented within the file system, e.g. based on file segments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from or digital output to record carriers, e.g. RAID, emulated record carriers, networked record carriers
- G06F3/0601—Dedicated interfaces to storage systems
- G06F3/0628—Dedicated interfaces to storage systems making use of a particular technique
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from or digital output to record carriers, e.g. RAID, emulated record carriers, networked record carriers
- G06F3/0601—Dedicated interfaces to storage systems
- G06F3/0602—Dedicated interfaces to storage systems specifically adapted to achieve a particular effect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/24—Editing, e.g. insert/delete
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chadwick et al. | A cloud-edge based data security architecture for sharing and analysing cyber threat information | |
Akhtar et al. | A comprehensive overview of privacy and data security for cloud storage | |
Kulkarni et al. | A security aspects in cloud computing | |
Ghani et al. | Issues and challenges in cloud storage architecture: a survey | |
Rong et al. | Beyond lightning: A survey on security challenges in cloud computing | |
Wu et al. | Recent Advances in Cloud Security. | |
Ahmed et al. | Cloud computing: study of security issues and research challenges | |
Murray et al. | Cloud service security & application vulnerability | |
Pandith | Data security and privacy concerns in cloud computing | |
Mehra et al. | Analyzing cloud computing security issues and challenges | |
Dean et al. | Engineering scalable, secure, multi-tenant cloud for healthcare data | |
Bhardwaj et al. | Review of solutions for securing end user data over cloud applications | |
Ghani et al. | Cloud storage architecture: research challenges and opportunities | |
Gunadham et al. | Security concerns in cloud computing for knowledge management systems | |
Gattoju et al. | A Survey on Security of the Hadoop Framework in the Environment of Bigdata | |
HASSAN BIJIK | A review on securing distributed Big Data Storage in Cloud Environment | |
D'Agostino | Data Security in Cloud Computing, Volume I | |
Li et al. | A deep understanding of cloud computing security | |
Vörös et al. | Securing personal data in public cloud | |
Mudgal et al. | ‘International journal of engineering sciences & research technology enhancing data security using encryption and splitting technique over multi-cloud environment | |
Sanchez-Gomez et al. | Combining usability and privacy protection in free-access public cloud storage servers: review of the main threats and challenges | |
Kaur et al. | Multi Round Selective Encryption using AES Over Storage Cloud | |
Subhadra | An Analysis of Data Security and Privacy for Cloud Computing | |
Khosla et al. | Big data security solutions in cloud | |
Kong et al. | Introduction to cloud computing and security issues |