Security amalgamation using cloud computing

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The Huge measure of substance data available should be composed along these lines keeping up a vital separation from the misuse of storage space, which can be expert by equivalent join framework. In this paper, we propose, near join strategy, which is an in light of Map Reduce structure used is uses strings for tantamount join and support set based and character based functionalities. Key regard sets are made using marks. Association based count can be used execute, which unite broad number of noteworthy worth key sets which aide decreases the transmission cost. Here we are using “light-weight” channel units to grow the execution, which generally trims huge number of various regard key sets with less transmission cost.

Cite

CITATION STYLE

APA

Jeyapriya, D., Theivasigamani, S., Velvizhi, R., & Nandhini, P. (2019). Security amalgamation using cloud computing. International Journal of Innovative Technology and Exploring Engineering, 8(9 Special Issue 3), 1208–1210. https://doi.org/10.35940/ijitee.I3266.0789S319

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free