Comparative Analysis of Map Reducing Algorithm and Coding Approach in Using Big Data Technique
Keywords:
Big Data, Data Analytics, Algorithm and Coding Approach.Abstract
Big Data has fascinated a lot of concentration from academia, industry as well as government sectors. We are living in an era when a dangerous amount of data is being generated every day. Data is produced through many sources like commerce processes, transactions, social networking sites, web servers, etc. and leftovers in well thought-out as well as shapeless form. Processing and extracting a vast amount is data is a demanding task. Big Data refers to technologies and initiatives that grip data that is too diverse, fast- altering or enormous for conservative technologies, skills and infrastructure to address efficiently. Big Data size is continually moving target currently ranging from few dozen terabytes to many petabytes in a single data sets. Accurateness in big data may escort to more positive managerial. And better decisions can mean greater functioning efficiency, cost reductions and reduced hazard. Big Data is the newest trend in business and IT world right now. Big Data is derived from the datasets involved are so bulky that distinctive database systems are not able to store and analyse the datasets. Big Data is a well-liked term used to describe the exponential growth and availability of data, both structured and unstructured. Big Data is defined as the depiction of the progress of human being cognitive processes, regularly includes data set with sizes further than the capability of present technology, mode and hypothesis to capture, manage, and process the data within adequate elapsed time. The terms imply Big Data have following properties:
References
- Netto, M.; Calheiros, R.; Rodrigues, E.; Cunha, R.; Buyya, R. (2018). "HPC Cloud for Scientific and Business Applications: Taxonomy, Vision, and Research Challenges". ACM Computing Surveys. 51 (1): 8:1–8:29
- M. Tang, X. Dai, J. Liu, J. Chen, "Towards a trust evaluation middleware for cloud service selection", Future Gener. Comput. Syst., 74 (2017), pp. 302-312
- M. Tang, X. Dai, J. Liu, J. Chen, "Towards a trust evaluation middleware for cloud service selection", Future Gener. Comput. Syst., 74 (2017), pp. 302-312
- Y. Charband, N.J. Navimipour, "Online knowledge sharing mechanisms: a systematic review of the state of the art literature and recommendations for future research", Inf. Syst. Front. (2016), pp. 1-21
- Nidal Hassan Hussein, Ahmed Khalid, “A survey of Cloud Computing Security challenges and solutions”, International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 1, January 2016.
- James Kobielus, I., & Bob Marcus, E. S. (2014). Deploying Big Data Analytics Applications to the Cloud: Roadmap for Success. Cloud Standards Customer Council.
- J.K. Adjei, C. Blackman, C. Blackman, "Explaining the role of trust in cloud computing services", Info, 17 (2015)
- Swarnalata Bollavarapu and Bharat Gupta, “Data Security in Cloud Computing”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 3, March 2014.
- Chandrashekar, R., Kala, M., & Mane, D. (2014). Integration of Big Data in Cloud computing environments for enhanced data processing capabilities. International Journal of Engineering Research and General Science, 240-245.
- Thilakanathan, Danan; Chen, Shiping; Nepal, Surya; Calvo, Rafael A.; Liu, Dongxi; Zic, John, "Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices," Cloud Computing (CLOUD), 2014 IEEE 7th International Conference on , vol., no., pp.224,231, June 27 2014-July 2 2014.
- Wang, L., Wu, Z.: A Trustworthiness evaluation framework in cloud computing for service selection. In: IEEE 6th International Conf. on Cloud computing technology and science, Washington, DC, USA, 101-106 (2014).
- A.F. Barsoum, A. Hasan, "Enabling dynamic data and indirect mutual trust for cloud computing storage systems", IEEE Trans. Parallel Distrib. Syst., 24 (2013), pp. 2375-2385
- P. Manuel, "A trust model of cloud computing based on quality of service", Ann. Oper. Res. (2013), pp. 1-12
- J. Dykstra, A.T. Sherman, "Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques", Digital Invest., 9 (2012), pp. 90-98.
- Satyajeet N Srujan Kotikela, Mahadevan Gomathisankaran, “CTrust: A framework for Secure and Trustworthy application execution in Cloud computing”, International Conference on Cyber Security, 2012.
- Monoj Kumar Muchahari, Smriti Kumar Sinha, “A New Trust Management Architecture for Cloud Computing Environment”, IEEE International Symposium on Cloud and Services Computing (ISCOS), 2012.
- Shaikh, R., Sasikumar, M.: Trust framework for calculating security strength of a cloud service. In: Proceedings of International conference on Communication, Information & Computing Technology, 703-709 (2012).
- Rizwana Shaikh, M. Sasikumar, “Cloud Security issues: A Survey”, International Journal of Computer Applications, April 2012.
- Punyada M. Deshmukh, Achyut S. Gughane, Priyanka L. Hasija, Supriya P. Katpale, “Maintaining File Storage Security in Cloud Computing”, International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 10, October 2012.
- Yanjiang Yang and Youcheng Zhang. A Generic Scheme for Secure Data Sharing in Cloud. Parallel Processing Workshops (ICPPW), 2011 40th International Conference. Pages 145-153. September 2011.
- E. C. Liu, X. Zhang, J. Chen and C. Yang, "An Authenticated Key Exchange Scheme for Efficient Security Aware Scheduling of Scientific Applications in Cloud Computing”, IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), (2011), pp. 372 – 379.
- Y. Singh, F. Kandah and W. Zhang, "A secured cost-effective multi-cloud storage in cloud computing", IEEE Computer Communications Workshops (INFOCOM WKSHPS), (2011), pp. 619 – 624.
- F.B. Shaikh and S. Haider. Security threats in cloud computing. In Internet Technology and Secured Transactions (ICITST), 2011 International Conference for, pages 214-219, December 2011.
- Hyukho Kim, Hana Lee, Woongsup Kim, Yangwoo Kim, “A Trust Evaluation Model for QoS Guarantee in Cloud Systems”, International Journal of Grid and Distributed Computing, March, 2010.
- Google Scholar: http://scholar.google.com
- Microsoft Corporation: Microsoft azure: cloud computing platform and services, (2015).
- Park K, Nguyen MC & Won H, “Web-based collaborative big data analytics on big data as a service platform”, 17th International Conference on Advanced Communication Technology (ICACT), (2015), pp.564–567.
- Vakintis I, Panagiotakis S, Mastorakis G & Mavromoustakis CX, “Evaluation of a Web crowd-sensing IoT ecosystem providing Big data analysis”, Resource Management for Big Data Platforms, (2016), pp.461-488.
- Park K, Nguyen MC & Won H, “Web-based collaborative big data analytics on big data as a service platform”, 17th International Conference on Advanced Communication Technology (ICACT), (2015), pp.564–567.
- Zhang L, Xie T, Tillmann N, De Halleux P, Ma X & Lv J, “Environment modeling for automated testing of cloud applications”, IEEE Software, Special Issue on Software Engineering for Cloud Computing, Vol.1, No.20, (2012), pp.1-10.
- Nathiya T, “Reducing DDOS Attack Techniques in Cloud Computing Network Technology”, International Journal of Innovative Research in Applied Sciences and Engineering (IJIRASE), Vol.1, No.1, (2017), pp.23–29.
- Mahalakshmi B, “A Detailed Study on Deduplication in Cloud Computing”, International Journal of Innovative Research in Applied Sciences and Engineering (IJIRASE), Vol.1, No.1, (2017), pp.1–5.
- Klous, Sander, and Nart Wielaard. We are Big Data: The Future of the Information Society. Springer, 2016.
- SHAN, Y. C., Chao, L. V., ZHANG, Q. Y., & TIAN, X. Y. (2017). Research on Mechanism of Early Warning of Health Management Based on Cloud Computing and Big Data. In Proceedings of the 23rd International Conference on Industrial Engineering and Engineering Management 2016 (pp. 291-294). Atlantis Press, Paris.
- Parvin Ahmadi Doval Amiri and Mina Rahbari Gavgani, 2016. A Review on Relationship and Challenges of Cloud Computing And Big Data: Methods of Analysis and Data Transfer. Asian Journal of Information Technology, 15: 2516-2525
- Demchenko, Yuri, et al. "Big security for big data: Addressing security challenges for the big data infrastructure." Workshop on Secure Data Management. Springer, Cham, 2013.
- Calheiros, Rodrigo N., et al. "CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms." Software: Practice and experience 41.1 (2011): 23-50.
- R.Subhulakshmi , S.Suryagandhi , R.Mathubala , P.Sumathi, An evaluation on Cloud Computing Research Challenges and Its Novel Tools, International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST) Volume 2, Special Issue 19, October 2016.
- Fonseca, N., & Boutaba, R. (2015). Cloud services, networking, and management. John Wiley & Sons.
- Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: state-of-the-art and research challenges. Journal of internet services and applications, 1(1), 7-18.
- Vacca, J. R. (Ed.). (2016). Cloud Computing Security: Foundations and Challenges. CRC Press. ch-15.
- Terzo, O., Ruiu, P., Bucci, E., & Xhafa, F. (2013, July). Data as a service (DaaS) for sharing and processing of large data collections in the cloud. In Complex, Intelligent, and Software Intensive Systems (CISIS), 2013 Seventh International Conference on (pp. 475-480). IEEE.
- Rajesh Saturi, Data as a Service (Daas) in Cloud Computing [Data-As-A-Service in the Age of Data] Data as a Service Daas in Cloud Computing, Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 11 ,2012.
- Klous, Sander, and Nart Wielaard. are Big Data: The Future of the Information Society. Springer, 2016.
- Chen, Min, et al. Big data: related technologies, challenges and future prospects. Heidelberg: Springer, 2014.
- R. Subhulakshmi, S. Suryagandhi, R. Mathubala, P. Sumathi, An evaluation on Cloud Computing Research Challenges and Its Novel Tools, International Journal of Advanced Research in Basic Engineering Sciences and Technology (IJARBEST) Volume 2, Special Issue 19, October 2016.
- Big data: The next frontier for innovation, competition, and productivity. James Manyika, Michael Chui, Brad Brown, Jacques Bughin, Richard Dobbs, Charles Roxburgh, and Angela Hung Byers. McKinsey Global Institute. May 2011.
- Rouse, M. (2010a, August). Software as a service. Retrieved from http://searchcloudcomputing techtarget.com/definition/Software-as-a-Service.
- IOS Press. (2011). Guidelines on security and privacy in public cloud computing. Journal of E- Governance, 34 149-151. DOI: 10.3233/GOV-2011-0271.
- Apache: Apache Hadoop, http://hadoop.apache.org
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.