[go: up one dir, main page]

HASSAN BIJIK, 2023 - Google Patents

A review on securing distributed Big Data Storage in Cloud Environment

HASSAN BIJIK, 2023

Document ID
12466214301102724868
Author
HASSAN BIJIK A
Publication year

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30312Storage and indexing structures; Management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30129Details of further file system functionalities
    • G06F17/3015Redundancy elimination performed by the file system
    • G06F17/30156De-duplication implemented within the file system, e.g. based on file segments
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from or digital output to record carriers, e.g. RAID, emulated record carriers, networked record carriers
    • G06F3/0601Dedicated interfaces to storage systems
    • G06F3/0628Dedicated interfaces to storage systems making use of a particular technique
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from or digital output to record carriers, e.g. RAID, emulated record carriers, networked record carriers
    • G06F3/0601Dedicated interfaces to storage systems
    • G06F3/0602Dedicated interfaces to storage systems specifically adapted to achieve a particular effect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/24Editing, e.g. insert/delete

Similar Documents

Publication Publication Date Title
Chadwick et al. A cloud-edge based data security architecture for sharing and analysing cyber threat information
Akhtar et al. A comprehensive overview of privacy and data security for cloud storage
Kulkarni et al. A security aspects in cloud computing
Ghani et al. Issues and challenges in cloud storage architecture: a survey
Rong et al. Beyond lightning: A survey on security challenges in cloud computing
Wu et al. Recent Advances in Cloud Security.
Ahmed et al. Cloud computing: study of security issues and research challenges
Murray et al. Cloud service security & application vulnerability
Pandith Data security and privacy concerns in cloud computing
Mehra et al. Analyzing cloud computing security issues and challenges
Dean et al. Engineering scalable, secure, multi-tenant cloud for healthcare data
Bhardwaj et al. Review of solutions for securing end user data over cloud applications
Ghani et al. Cloud storage architecture: research challenges and opportunities
Gunadham et al. Security concerns in cloud computing for knowledge management systems
Gattoju et al. A Survey on Security of the Hadoop Framework in the Environment of Bigdata
HASSAN BIJIK A review on securing distributed Big Data Storage in Cloud Environment
D'Agostino Data Security in Cloud Computing, Volume I
Li et al. A deep understanding of cloud computing security
Vörös et al. Securing personal data in public cloud
Mudgal et al. ‘International journal of engineering sciences & research technology enhancing data security using encryption and splitting technique over multi-cloud environment
Sanchez-Gomez et al. Combining usability and privacy protection in free-access public cloud storage servers: review of the main threats and challenges
Kaur et al. Multi Round Selective Encryption using AES Over Storage Cloud
Subhadra An Analysis of Data Security and Privacy for Cloud Computing
Khosla et al. Big data security solutions in cloud
Kong et al. Introduction to cloud computing and security issues