{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T15:35:04Z","timestamp":1763480104569,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905202","type":"proceedings-article","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T12:17:16Z","timestamp":1472473036000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Agent based Security Model for Cloud Big Data"],"prefix":"10.1145","author":[{"given":"Sunil","family":"Kumar","sequence":"first","affiliation":[{"name":"S.V. Subharti University, Meerut, India"}]},{"given":"Jayant","family":"Shekhar","sequence":"additional","affiliation":[{"name":"S.V. Subharti University, Meerut, India"}]},{"given":"Himanshu","family":"Gupta","sequence":"additional","affiliation":[{"name":"Amity University, Noida, India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Cloud Security Alliance (CSA) 2014. Big Data Working Group Big Data Taxonomy September 14 https:\/\/cloudsecurityalliance.org\/research\/big-data\/  Cloud Security Alliance (CSA) 2014. Big Data Working Group Big Data Taxonomy September 14 https:\/\/cloudsecurityalliance.org\/research\/big-data\/"},{"key":"e_1_3_2_1_2_1","first-page":"20","volume-title":"Witchel","author":"Roy I.","year":"2010","unstructured":"Roy , I. , Setty , S.T.V. , Kilzer , A. , Shmatikov , V. , Shmatikov , E. , Witchel 2010 . Airavat : Security and privacy for MapReduce in USENIX conference on Networked systems design and implementation, pp. 20 -- 20 , 2010. Roy, I., Setty, S.T.V., Kilzer, A., Shmatikov, V., Shmatikov, E., Witchel 2010. Airavat: Security and privacy for MapReduce in USENIX conference on Networked systems design and implementation, pp. 20--20, 2010."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems","volume":"01","author":"Yulong R.","year":"2012","unstructured":"Yulong , R. , Wen T. 2012 . A service integrity assurance framework for cloud computing based on MapReduce . In Proceedings of2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems ( Hangzhou, China , Oct. 30 2012-Nov. 1 2012) CCIS '12, vol. 01 , IEEE, New York, NY, 240--244. DOI= http:\/\/dx.doi.org\/10.1109\/CCIS.2012.6664404. 10.1109\/CCIS.2012.6664404 Yulong, R., Wen T. 2012. A service integrity assurance framework for cloud computing based on MapReduce. In Proceedings of2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems(Hangzhou, China, Oct. 30 2012-Nov. 1 2012) CCIS '12, vol. 01, IEEE, New York, NY, 240--244. DOI= http:\/\/dx.doi.org\/10.1109\/CCIS.2012.6664404."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTM.2015.7225417"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2015.7225312"},{"key":"e_1_3_2_1_6_1","volume-title":"Jiankun H 2014","author":"Zhiyuan T.","year":"2014","unstructured":"Zhiyuan , T. , Nagar , U.T. , Xiangjian H , Nanda , P. , Ren , P.L. , Song W. , Jiankun H 2014 . Enhancing Big Data Security with Collaborative Intrusion Detection.Cloud Computing IEEE , ( September 2014 ), 27--33. DOI= http:\/\/dx.doi.org\/10.1109\/MCC.2014.53. 10.1109\/MCC.2014.53 Zhiyuan, T., Nagar, U.T., Xiangjian H, Nanda, P., Ren, P.L., Song W., Jiankun H 2014. Enhancing Big Data Security with Collaborative Intrusion Detection.Cloud Computing IEEE, (September 2014), 27--33. DOI= http:\/\/dx.doi.org\/10.1109\/MCC.2014.53."},{"key":"e_1_3_2_1_7_1","volume-title":"China","author":"Sung-Hwan K.","year":"2013","unstructured":"Sung-Hwan K. , Nam-Uk K. , Tai-Myoung C 2013. Attribute Relationship Evaluation Methodology for Big Data Security.In Proceedings of 2013 International Conference on IT Convergence and Security (Macao , China , Dec. 16-18 2013 ). ICITCS'13,IEEE, New York, NY , 1--4, DOI= http:\/\/dx.doi.org\/10.1109\/ICITCS.2013.6717808 10.1109\/ICITCS.2013.6717808 Sung-Hwan K., Nam-Uk K., Tai-Myoung C 2013. Attribute Relationship Evaluation Methodology for Big Data Security.In Proceedings of 2013 International Conference on IT Convergence and Security (Macao, China, Dec. 16-18 2013). ICITCS'13,IEEE, New York, NY, 1--4, DOI= http:\/\/dx.doi.org\/10.1109\/ICITCS.2013.6717808"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of 2013 IEEE International Conference on Big Data","author":"Min-Sheng L.","year":"2013","unstructured":"Min-Sheng , L. , Chien-Yi C. , Yuh-Jye L. , Hsing - Kuo P. 2013 , Malicious URL filtering --- A big data application . In Proceedings of 2013 IEEE International Conference on Big Data ( Silicon Valley, CA , Oct. 6-9 2013),IEEE, 589--596. DOI= http:\/\/dx.doi.org\/10.1109\/BigData.2013.6691627 10.1109\/BigData.2013.6691627 Min-Sheng, L., Chien-Yi C., Yuh-Jye L., Hsing- Kuo P. 2013, Malicious URL filtering --- A big data application. In Proceedings of 2013 IEEE International Conference on Big Data(Silicon Valley, CA, Oct. 6-9 2013),IEEE, 589--596. DOI= http:\/\/dx.doi.org\/10.1109\/BigData.2013.6691627"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.70"},{"key":"e_1_3_2_1_10_1","first-page":"512","volume-title":"ON","author":"Xueli H","year":"2014","unstructured":"Xueli , H , Xiaojiang , D. 2014 . Achieving big data privacy via hybrid cloud.In Proceedings of 2014 IEEE Conference on Computer Communications Workshops (Toronto , ON , April 27 2014-May 2 2014), INFOCOM WKSHPS'14, IEEE, New York, NY , pp. 512 -- 517 . DOI= http:\/\/dx.doi.org\/10.1109\/INFCOMW.2014.6849284. 10.1109\/INFCOMW.2014.6849284 Xueli, H, Xiaojiang, D. 2014. Achieving big data privacy via hybrid cloud.In Proceedings of 2014 IEEE Conference on Computer Communications Workshops (Toronto, ON, April 27 2014-May 2 2014), INFOCOM WKSHPS'14, IEEE, New York, NY, pp. 512--517. DOI= http:\/\/dx.doi.org\/10.1109\/INFCOMW.2014.6849284."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUDCOM-ASIA.2013.107"},{"key":"e_1_3_2_1_12_1","volume-title":"Engineering & Technical Innovation(Jalandhar","volume":"1","author":"Kumar S.","year":"2014","unstructured":"Kumar , S. and Shekhar , J . 2014. Current Security problems and solutions of Cloud storage:An Analysis.In Proceedingsof International Multi Track Conference on Sciences , Engineering & Technical Innovation(Jalandhar , Punjab, India , June 04-06 2014 ) IMTC'14, Vol. 1 , 317--321. DOI= 10.13140\/RG.2.1.3173.4801 Kumar, S. and Shekhar, J. 2014. Current Security problems and solutions of Cloud storage:An Analysis.In Proceedingsof International Multi Track Conference on Sciences, Engineering & Technical Innovation(Jalandhar, Punjab, India, June 04-06 2014) IMTC'14, Vol. 1, 317--321. DOI= 10.13140\/RG.2.1.3173.4801"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2378356.2378369"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694730.2694731"},{"key":"e_1_3_2_1_15_1","unstructured":"Current Data Security Issues of NoSQL Databases 2014. White paper. FidelisCybersecurity. URL=https:\/\/www.fidelissecurity.com\/files\/NDFInsightsWhitePaper.pdf  Current Data Security Issues of NoSQL Databases 2014. White paper. FidelisCybersecurity. URL=https:\/\/www.fidelissecurity.com\/files\/NDFInsightsWhitePaper.pdf"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2014.2362522"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905202","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:50Z","timestamp":1750221530000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905202"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":16,"alternative-id":["10.1145\/2905055.2905202","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905202","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}