A Comprehensive Overview on Different Cloud Storage Techniques and Security Mechanism
R.Sathiya1, N.Prathipa2, K.Gomathi3
1R.Sathiya, Department of Computer Science and Engineering, Adithya Institute of Technology, Kurumbapalayam, Coimbatore, (Tamil Nadu), India.
2N. Prathipa, Department of Computer Science and Engineering, Adithya Institute of Technology, Kurumbapalayam, Coimbatore, (Tamil Nadu), India.
3K.Gomathi, Department of Computer Science and Engineering, Adithya Institute of Technology, Kurumbapalayam, Coimbatore, (Tamil Nadu), India.
Manuscript received on September 28, 2013. | Revised Manuscript received on October 06, 2013. | Manuscript published on October 30, 2013. | PP: 189-193 | Volume-3, Issue-1, October 2013. | Retrieval Number: A2191103113/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: With the development of cloud computing, Data security becomes more and more important in cloud computing. This paper analyses the basic information about cloud computing and cloud computing data security issues , with the analysis of Hadoop map reduce and Merkel hash tree authentication of data elements. Finally we build a data security in real world for cloud computing.
Keywords: Characteristics of Cloud storage, Security issues, Data security, Map reducing Programming Model, Avoiding Bad Hadoop and Cloud Analytics Decisions.