Heuristic Auditing Strategy Using Big Data
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
Cloud storage services have turn into commercially famous now a day. To give unique and updated access of user file on cloud, a cloud service provider (CSP) keeps up multiple replicas for each every bit of information or data on geographically conveyed servers. The primary issue of using the replication technique as a part of clouds is very costly to maintain consistency among large data on clouds. In this paper, we first present a consistency as a service (CaaS) model, which have large data access as well conduct multiple small audits in clouds .Auditing use to ensure the consistency of the data played in cloud globally. Here I we study many existing papers and develop auditing model which uses heuristic auditing strategy that have two level of auditing among cloud data. These auditing uses a loosely synchronized clock and we develop algorithms to evaluate the severity of violation with two metrics such us commonality of violation and mustiness of the reading the data content and heuristic auditing strategy (HAS) to disclose as many violations as possible.
Authors and Affiliations
Thirunavukkarasu. K, Appandairaj. A
Comparison of leach and energy efficient protocol
Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants and to cooperativ...
Use of Plastic Waste in Bituminous Road
disposal of waste plastic has become a serious problem and waste plastics are thrown out which cause environmental pollution. Utilization of waste obtain in production of recycle plastic pipe may be used as coarse aggre...
Increasing the Lifetime of Cluster head Using Improved Stability Based Clustering Approach in VANETS
Increasing the lifetime of the cluster head is crucial for most applications and protocol designs in Vehicular Adhoc Networks (VANET).In traditional approaches, this is obtained by beacon based techniques, affinity propa...
Reduction in Heavy Metals and Microflora of Potable Water of Gwalior Region with the Application of Plant Extracts
This study was aimed to improve the quality of drinking water of municipal supply of Gwalior region (M.P.) with the application of plant extracts of Moringa oleifera, Vigna unguiculata (cowpeas), Vigna mungo (urad) and...
Securing Operating System
One of the fundamental concerns in the security of cyberspace and e-commerce is the security of operating systems that are the core piece of software running in all information systems, such as network devices (routers,...