Heuristic Auditing Strategy Using Big Data

Abstract

Cloud storage services have turn into commercially famous now a day. To give unique and updated access of user file on cloud, a cloud service provider (CSP) keeps up multiple replicas for each every bit of information or data on geographically conveyed servers. The primary issue of using the replication technique as a part of clouds is very costly to maintain consistency among large data on clouds. In this paper, we first present a consistency as a service (CaaS) model, which have large data access as well conduct multiple small audits in clouds .Auditing use to ensure the consistency of the data played in cloud globally. Here I we study many existing papers and develop auditing model which uses heuristic auditing strategy that have two level of auditing among cloud data. These auditing uses a loosely synchronized clock and we develop algorithms to evaluate the severity of violation with two metrics such us commonality of violation and mustiness of the reading the data content and heuristic auditing strategy (HAS) to disclose as many violations as possible.

Authors and Affiliations

Thirunavukkarasu. K, Appandairaj. A

Keywords

Related Articles

slugMultiple Periodicity Detectionandpattern Mining In Time Series Database

The time series database is analysed to retrieve the relevant patterns and to examine whether it is periodic in nature. Existing algorithms failed to generate flexible user interested patter...

Efficient Segmentation of Remote Sensing Images Using New Clustering Algorithm

Segmentation of real-world remote sensing images is challenging because of the large size of those data, particularly for very high resolution imagery. For segmentation of remote sensing images, many algorithms have bee...

Survey on Community and Social Networks in Big Data

Today’s world is interconnected through many types of links. These links include Web pages, blogs, and emails. This consider community mining and the mining of social networks as important topics. Big data has become an...

Secured Login Authentication on Key Attackers

An innovative solution is proposed to avoid the problem such as password security at application layer. For password security all lower case characters, upper case characters, special characters and digits in password c...

A Secure Based Approach in M-voting for Human Identification based on Iris Recognition using Biometrics

The iris recognition is one of the preeminent biometrics characteristics which are used for security purpose. This biometrics technology is related to human physiological and behavioral characteristics. This paper illus...

Download PDF file
  • EP ID EP20201
  • DOI -
  • Views 233
  • Downloads 4

How To Cite

Thirunavukkarasu. K, Appandairaj. A (2015). Heuristic Auditing Strategy Using Big Data. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(4), -. https://europub.co.uk/articles/-A-20201