Scientific Research An Academic Publisher
OPEN ACCESS
Add your e-mail address to receive free newsletters from SCIRP.
Select Journal AA AAD AAR AASoci AAST ABB ABC ABCR ACES ACS ACT AD ADR AE AER AHS AID AiM AIT AJAC AJC AJCC AJCM AJIBM AJMB AJOR AJPS ALAMT ALC ALS AM AMI AMPC ANP APD APE APM ARS ARSci AS ASM BLR CC CE CellBio ChnStd CM CMB CN CRCM CS CSTA CUS CWEEE Detection EMAE ENG EPE ETSN FMAR FNS GEP GIS GM Graphene GSC Health IB ICA IIM IJAA IJAMSC IJCCE IJCM IJCNS IJG IJIDS IJIS IJMNTA IJMPCERO IJNM IJOC IJOHNS InfraMatics JACEN JAMP JASMI JBBS JBCPR JBiSE JBM JBNB JBPC JCC JCDSA JCPT JCT JDAIP JDM JEAS JECTC JEMAA JEP JFCMV JFRM JGIS JHEPGC JHRSS JIBTVA JILSA JIS JMF JMGBND JMMCE JMP JPEE JQIS JSBS JSEA JSEMAT JSIP JSS JSSM JST JTR JTST JTTs JWARP LCE MC ME MI MME MNSMS MPS MR MRC MRI MSA MSCE NJGC NM NR NS OALib OALibJ ODEM OJA OJAB OJAcct OJAnes OJAP OJApo OJAppS OJAPr OJAS OJBD OJBIPHY OJBM OJC OJCB OJCD OJCE OJCM OJD OJDer OJDM OJE OJEE OJEM OJEMD OJEpi OJER OJF OJFD OJG OJGas OJGen OJI OJIC OJIM OJINM OJL OJM OJMC OJMetal OJMH OJMI OJMIP OJML OJMM OJMN OJMP OJMS OJMSi OJN OJNeph OJO OJOG OJOGas OJOp OJOph OJOPM OJOTS OJPathology OJPC OJPChem OJPed OJPM OJPP OJPS OJPsych OJRA OJRad OJRD OJRM OJS OJSS OJSST OJST OJSTA OJTR OJTS OJU OJVM OPJ POS PP PST PSYCH SAR SCD SGRE SM SN SNL Soft SS TEL TI UOAJ VP WET WJA WJCD WJCMP WJCS WJET WJM WJNS WJNSE WJNST WJV WSN YM
More>>
Ko, S.Y., Hoque, I., Cho, B. and Gupta, I. (2010) Making Cloud Intermediate Data Fault-Tolerant. Proceedings of the 1st ACM Symposium on Cloud Computing, Indianapolis, 2010, 181-192. http://dx.doi.org/10.1145/1807128.1807160
has been cited by the following article:
TITLE: Trusted Heartbeat Framework for Cloud Computing
AUTHORS: Dipen Contractor, Dhiren Patel, Shreya Patel
KEYWORDS: Trusted Heartbeat, Cloud Computing, Hadoop Framework, Reputation, Attestation
JOURNAL NAME: Journal of Information Security, Vol.7 No.3, April 1, 2016
ABSTRACT: In cloud computing environment, as the infrastructure not owned by users, it is desirable that its security and integrity must be protected and verified time to time. In Hadoop based scalable computing setup, malfunctioning nodes generate wrong output during the run time. To detect such nodes, we create collaborative network between worker node (i.e. data node of Hadoop) and Master node (i.e. name node of Hadoop) with the help of trusted heartbeat framework (THF). We propose procedures to register node and to alter status of node based on reputation provided by other co-worker nodes.
Related Articles:
Data Integrity Checking Protocol with Data Dynamics in Cloud Computing
Junjie Feng, Shigong Long
DOI: 10.4236/ijcns.2017.105B027 1,063 Downloads 2,406 Views Citations
Pub. Date: May 26, 2017
Cloud Computing of E-Government
Tamara Almarabeh, Yousef Kh. Majdalawi, Hiba Mohammad
DOI: 10.4236/cn.2016.81001 5,461 Downloads 8,121 Views Citations
Pub. Date: February 18, 2016
Forensics Issues in Cloud Computing
Aqil Burney, Muhammad Asif, Zain Abbas
DOI: 10.4236/jcc.2016.410007 2,486 Downloads 5,203 Views Citations
Pub. Date: August 22, 2016
Cloud versus On-Premise Computing
Cameron Fisher
DOI: 10.4236/ajibm.2018.89133 1,862 Downloads 4,913 Views Citations
Pub. Date: September 30, 2018
Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review
Osama Harfoushi, Bader Alfawwaz, Nazeeh A. Ghatasheh, Ruba Obiedat, Mua’ad M. Abu-Faraj, Hossam Faris
DOI: 10.4236/cn.2014.61003 12,757 Downloads 25,883 Views Citations
Pub. Date: February 13, 2014