

Group Policy based Self-Destruction Data System
Abstract
Keywords
References
N.S Jeyakarthikka, S.Bhaggiaraj, A.Abuthaheer, “Self Destructing Data System Based On Session Key”, International Journal of Scientific & Technology Research Volume 3, ISSUE 2, FEBRUARY 2014, ISSN 2277-8616.
Priya P. Sharma, Chandrakant P. Navdeti “Securing Big Data Hadoop: A Review of Security Issues, Threats and Solution”, ISSN: 0975-9646, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2), 2014.
Poonam Patel, Amar Buchade, “Survey on Achivey Privacy Preserving using Multi-Key Approach in Cloud Environment”, IJIRIS, 2014.
Seonyoung Park and Youngseok Lee, “Secure Hadoop with Encrypted HDFS”, Chungnam National University, Daejeon, Republic of Korea, Springer Verlag Berlin Heidelberg 2013.
Rajesh Laxman Gaikwad1, Prof. Dhananjay M Dakhane2 and Prof. Ravindra L Pardhi3, “Network Security Enhancement in Hadoop”, international Journal of Application or Innovation in Engineering & Management (IJAIEM), ISSN 2319 – 4847, Volume 2, Issue 3, March 2013.
L.Zeng, S.Chenting, Q.Wei, D.feng, “SeDas: A Self-Destructing Data System Based on Active Storage Framework”, IEEE TRANSACTIONS ON MAGNETICS, VOL.49, NO.6, JUNE 2013.
Jason croft, Robert signorile, “A self-destructing file distribution system with feedback for peer to peer networks”, Proc. ACM Conf. Computer and Communication Security (CCS), pp. 97-106, 2011.
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou, “Achieving Secure, Scalable, and Fine grained Data Access Control in Cloud Computing”, Proc. IEEE INFOCOM, pp. 534-542, 2010.
R.Geambasu, T. Konno, A. Levy, H. Levy, “Vanish: Increasing data privacy with self-destructing data”, in Proc. USENIX security Symp, Montreal, Canada, Aug. 2009, pp.299- 315.
S.wolchok, O. S. Hofmann, N. Heninger, E. W. Felten, J. Alex Harderman, C.J. Rossbach, B. Waters, E. Witchel, “Defeating vanish with low-cost Sybil attacks against large DHEs”, 2009.
J. R. Douceur, “The Sybil attack”, in Proc. IPTPS 01: Revised Papers from the first Int. Workshop on Peer-to-Peer System, 2002.
White, Tom (June 16, 2009), Hadoop: “The Definitive Guide”, (1st Ed.) O. Reilly Media. P. 524. ISBN 0-596-52197-9.
“Running Hadoop on Ubantu Linux (Single Node Cluster)”, Retrieved 6 June 2013.
Yannan Ma, Yu Zhou, YaoYu , Chenglei Peng, Ziqiang Wang, Sidan Du, “A Novel Approach for Improving Security and Storage Efficiency on HDFS”, The 6th International Conference, ELSEVIER, on Ambient Systems, Networks and Technologies(ANT 2015).
“The Big Data Security Gap: Protecting the Hadoop Cluster”, ZETTASET, WHITE PAPER.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.