Stacked multi‐layer security for Hadoop distributed file system using HSCT steganography
Summary Big data needs to have scalable storage platforms as well as parallel processing environments. Hadoop is preferable because it is an open‐source software which works in a distributed, parallel processing environment and no need of any special hardware. In recent developments of Hadoop, secur...
Uložené v:
| Vydané v: | Concurrency and computation Ročník 35; číslo 21 |
|---|---|
| Hlavní autori: | , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Hoboken, USA
John Wiley & Sons, Inc
25.09.2023
Wiley Subscription Services, Inc |
| Predmet: | |
| ISSN: | 1532-0626, 1532-0634 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Summary
Big data needs to have scalable storage platforms as well as parallel processing environments. Hadoop is preferable because it is an open‐source software which works in a distributed, parallel processing environment and no need of any special hardware. In recent developments of Hadoop, security was introduced as optional. A symmetric block cipher advanced encryption standard (AES) is used for encryption. A 128 MB block of data needs 8 million encryptions. A better way of hiding the data from unauthorized access is preferable. Steganography, a more contemporary security technology than cryptography, is the art and science of hiding subconscious information in hidden item while exposing opponents their existence. The cover is an image, and the secret information may be a photo, music, video, or text. A double layer hexcode substituted–color space transformed (HSCT) steganography with 3 band splitting of data ensures confidentiality of the data and one time pad key generated with client's ID provides authentication also. Considering the volume of data, steganography concept is much faster than AES or any other cipher. Hiding the data inside the random images will indulge in fast reconstruction of data when needed for processing using either MapReduce or tools like spark. |
|---|---|
| AbstractList | Big data needs to have scalable storage platforms as well as parallel processing environments. Hadoop is preferable because it is an open‐source software which works in a distributed, parallel processing environment and no need of any special hardware. In recent developments of Hadoop, security was introduced as optional. A symmetric block cipher advanced encryption standard (AES) is used for encryption. A 128 MB block of data needs 8 million encryptions. A better way of hiding the data from unauthorized access is preferable. Steganography, a more contemporary security technology than cryptography, is the art and science of hiding subconscious information in hidden item while exposing opponents their existence. The cover is an image, and the secret information may be a photo, music, video, or text. A double layer hexcode substituted–color space transformed (HSCT) steganography with 3 band splitting of data ensures confidentiality of the data and one time pad key generated with client's ID provides authentication also. Considering the volume of data, steganography concept is much faster than AES or any other cipher. Hiding the data inside the random images will indulge in fast reconstruction of data when needed for processing using either MapReduce or tools like spark. Summary Big data needs to have scalable storage platforms as well as parallel processing environments. Hadoop is preferable because it is an open‐source software which works in a distributed, parallel processing environment and no need of any special hardware. In recent developments of Hadoop, security was introduced as optional. A symmetric block cipher advanced encryption standard (AES) is used for encryption. A 128 MB block of data needs 8 million encryptions. A better way of hiding the data from unauthorized access is preferable. Steganography, a more contemporary security technology than cryptography, is the art and science of hiding subconscious information in hidden item while exposing opponents their existence. The cover is an image, and the secret information may be a photo, music, video, or text. A double layer hexcode substituted–color space transformed (HSCT) steganography with 3 band splitting of data ensures confidentiality of the data and one time pad key generated with client's ID provides authentication also. Considering the volume of data, steganography concept is much faster than AES or any other cipher. Hiding the data inside the random images will indulge in fast reconstruction of data when needed for processing using either MapReduce or tools like spark. |
| Author | Suganya, S. Selvamuthukumaran, S. |
| Author_xml | – sequence: 1 givenname: S. orcidid: 0009-0009-5534-7697 surname: Suganya fullname: Suganya, S. email: suganyaavcp@gmail.com organization: Anna University – sequence: 2 givenname: S. orcidid: 0000-0002-4820-7006 surname: Selvamuthukumaran fullname: Selvamuthukumaran, S. email: smksmk@gmail.com organization: A.V.C. College of Engineering |
| BookMark | eNp10M1Kw0AQB_BFKthWwUdY8OIldT-y2eQooVqhoNB68bLsV2pqmo27CSU3H8Fn9ElMrXjzNDPwY4b5T8CodrUF4BKjGUaI3OjGzjjH-ASMMaMkQgmNR389Sc7AJIQtQhgjisfgZdVK_WYN3HVVW359fFaytx4Gqztftj0snIcLaZxroClD60vVtYMuysrC0IfW7mAXynoDF6t8DYd5I2u38bJ57c_BaSGrYC9-6xQ8383X-SJaPt4_5LfLSBMW48hgEiPGDLWJVJIarknKbZoZkmWKcY40i02BFE8VznDBlVEaxxmhGHFdpIpOwdVxb-Pde2dDK7au8_VwUpCUMU5JEpNBXR-V9i4EbwvR-HInfS8wEofkxJCcOCQ30OhI98OX_b9O5E_zH_8N0lNyJA |
| Cites_doi | 10.1109/SPIN.2016.7566661 10.1109/ICIOTA.2017.8073624 10.1016/j.ijleo.2019.04.074 10.1109/TCSVT.2019.2896270 10.1109/ICPECA51329.2021.9362537 10.1109/ARTCom.2009.122 10.1109/TIFS.2006.890310 10.1504/IJESDF.2018.089214 10.1109/ICCTCT.2018.8550957 10.1109/INFCOM.1995.515956 10.1088/1742-6596/1362/1/012060 10.24423/cames.375 10.4018/IJORIS.20210701.oa4 10.1007/978-3-319-68505-2_11 10.1109/CCAA.2016.7813878 10.1088/1742-6596/2089/1/012031 10.5769/J201501001 |
| ContentType | Journal Article |
| Copyright | 2023 John Wiley & Sons, Ltd. |
| Copyright_xml | – notice: 2023 John Wiley & Sons, Ltd. |
| DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| DOI | 10.1002/cpe.7711 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Computer and Information Systems Abstracts CrossRef |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1532-0634 |
| EndPage | n/a |
| ExternalDocumentID | 10_1002_cpe_7711 CPE7711 |
| Genre | article |
| GroupedDBID | .3N .DC .GA 05W 0R~ 10A 1L6 1OC 33P 3SF 3WU 4.4 50Y 50Z 51W 51X 52M 52N 52O 52P 52S 52T 52U 52W 52X 5GY 5VS 66C 702 7PT 8-0 8-1 8-3 8-4 8-5 8UM 930 A03 AAESR AAEVG AAHHS AAHQN AAMNL AANLZ AAONW AAXRX AAYCA AAZKR ABCQN ABCUV ABEML ABIJN ACAHQ ACCFJ ACCZN ACPOU ACSCC ACXBN ACXQS ADBBV ADEOM ADIZJ ADKYN ADMGS ADOZA ADXAS ADZMN ADZOD AEEZP AEIGN AEIMD AEQDE AEUQT AEUYR AFBPY AFFPM AFGKR AFPWT AFWVQ AHBTC AITYG AIURR AIWBW AJBDE AJXKR ALMA_UNASSIGNED_HOLDINGS ALUQN ALVPJ AMBMR AMYDB ATUGU AUFTA AZBYB BAFTC BDRZF BFHJK BHBCM BMNLL BROTX BRXPI BY8 CS3 D-E D-F DCZOG DPXWK DR2 DRFUL DRSTM EBS F00 F01 F04 F5P G-S G.N GNP GODZA HGLYW HHY HZ~ IX1 JPC KQQ LATKE LAW LC2 LC3 LEEKS LH4 LITHE LOXES LP6 LP7 LUTES LYRES MEWTI MK4 MRFUL MRSTM MSFUL MSSTM MXFUL MXSTM N04 N05 N9A O66 O9- OIG P2W P2X P4D PQQKQ Q.N Q11 QB0 QRW R.K ROL RWI RX1 SUPJJ TN5 UB1 V2E W8V W99 WBKPD WIH WIK WOHZO WQJ WRC WXSBR WYISQ WZISG XG1 XV2 ~IA ~WT AAYXX ADMLS AEYWJ AGHNM AGYGG CITATION O8X 7SC 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c2541-d124055d3e6aba3d7c287e89d299b5770c54df0b78b191f7bdbc14923107cf8b3 |
| IEDL.DBID | DRFUL |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000961603700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1532-0626 |
| IngestDate | Sun Nov 09 07:36:16 EST 2025 Sat Nov 29 03:49:54 EST 2025 Wed Jan 22 16:17:05 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 21 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c2541-d124055d3e6aba3d7c287e89d299b5770c54df0b78b191f7bdbc14923107cf8b3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0009-0009-5534-7697 0000-0002-4820-7006 |
| PQID | 2855732642 |
| PQPubID | 2045170 |
| PageCount | 14 |
| ParticipantIDs | proquest_journals_2855732642 crossref_primary_10_1002_cpe_7711 wiley_primary_10_1002_cpe_7711_CPE7711 |
| PublicationCentury | 2000 |
| PublicationDate | 25 September 2023 |
| PublicationDateYYYYMMDD | 2023-09-25 |
| PublicationDate_xml | – month: 09 year: 2023 text: 25 September 2023 day: 25 |
| PublicationDecade | 2020 |
| PublicationPlace | Hoboken, USA |
| PublicationPlace_xml | – name: Hoboken, USA – name: Hoboken |
| PublicationTitle | Concurrency and computation |
| PublicationYear | 2023 |
| Publisher | John Wiley & Sons, Inc Wiley Subscription Services, Inc |
| Publisher_xml | – name: John Wiley & Sons, Inc – name: Wiley Subscription Services, Inc |
| References | 2021; 2089 2017; 20 2019; 30 2015; 10 2009 1995 2019; 1362 2022; 29 2019; 187 2017; 95 2012; 3 2021; 12 2021; 33 2014; 2 2021 2020 2019; 45 2022; 13 2019 2018 2017 2016 2007; 2 2018; 10 2018; 13 Rajeh W (e_1_2_9_7_1) 2022; 13 Dwivedi N (e_1_2_9_29_1) 2019 e_1_2_9_11_1 e_1_2_9_10_1 e_1_2_9_12_1 e_1_2_9_15_1 e_1_2_9_19_1 e_1_2_9_18_1 Al‐Azzawi AF (e_1_2_9_25_1) 2018; 10 e_1_2_9_20_1 e_1_2_9_22_1 Singh A (e_1_2_9_31_1) 2014; 2 e_1_2_9_21_1 Baawi SS (e_1_2_9_14_1) 2017; 95 e_1_2_9_24_1 e_1_2_9_23_1 e_1_2_9_8_1 e_1_2_9_6_1 Khosravi B (e_1_2_9_16_1) 2019; 45 e_1_2_9_5_1 e_1_2_9_3_1 e_1_2_9_2_1 Hamzah AA (e_1_2_9_13_1) 2021; 33 e_1_2_9_9_1 Baawi SS (e_1_2_9_17_1) 2018; 13 e_1_2_9_26_1 e_1_2_9_28_1 Abusukhon A (e_1_2_9_30_1) 2012; 3 Gattoju S (e_1_2_9_4_1) 2021; 12 Malik A (e_1_2_9_27_1) 2017; 20 |
| References_xml | – volume: 12 start-page: 1 issue: 3 year: 2021 end-page: 7 article-title: An enhanced security measure for multimedia images using Hadoop cluster publication-title: Int J Oper Res Inf Syst – volume: 13 start-page: 23 year: 2022 end-page: 42 article-title: Hadoop distributed file system security challenges and examination of unauthorized access issue publication-title: J Inf Secur – volume: 10 start-page: 61 year: 2018 end-page: 78 article-title: Information hiding: Arabic text steganography by using Unicode characters to hide secret data publication-title: Int J Electron Secur Digit Forensics – start-page: 22 year: 2021 end-page: 23 – volume: 30 start-page: 685 issue: 3 year: 2019 end-page: 696 article-title: A new payload partition strategy in color image steganography publication-title: IEEE Trans Circuits Syst Video Technol – volume: 29 start-page: 33 year: 2022 end-page: 48 article-title: Hybrid encryption algorithm for big data security in the Hadoop distributed file system publication-title: Comput Assist Methods Eng Sci – start-page: 1090 year: 2016 end-page: 1094 – year: 2018 – volume: 95 start-page: 6247 year: 2017 end-page: 6255 article-title: New text steganography technique based on a set of two‐letterwords publication-title: J Theor Appl Inf Technol – start-page: 853 year: 1995 end-page: 80 – start-page: 158 year: 2019 end-page: 169 – volume: 12 start-page: 1027 issue: 4 year: 2021 end-page: 1037 article-title: An efficient approach for bigdata security based on Hadoop system using cryptographic techniques publication-title: Indian J CSE – volume: 20 start-page: 72 issue: 1 year: 2017 end-page: 79 article-title: A high capacity text steganography scheme based on LZW compression and color coding publication-title: Eng Sci Technol Int J – volume: 13 start-page: 1854 year: 2018 end-page: 1863 article-title: A comparative study on the advancement of text steganography techniques in digital media publication-title: J Eng Appl Sci – start-page: 121 year: 2017 end-page: 132 – volume: 10 start-page: 8 issue: 1 year: 2015 end-page: 14 article-title: An efficient text steganography scheme using unicode space characters publication-title: Int J Forensic Comput Sci – volume: 3 year: 2012 article-title: Analyzing the efficiency of text‐to‐image encryption algorithm publication-title: Int J Adv Comput Sci Appl – volume: 1362 year: 2019 article-title: Securing Hadoop distributed file system using intelligence based sensitivity bits publication-title: J Phys Conf Ser – volume: 2089 year: 2021 article-title: A survey on security of Hadoop framework in the environment of Bigdata publication-title: J Phys Conf Ser – year: 2020 – volume: 33 start-page: 865 issue: 7 year: 2021 end-page: 877 article-title: A linguistic steganography framework using Arabic calligraphy publication-title: J King Saud Univ‐Comput Inform Sci – start-page: 199 year: 2009 end-page: 202 – volume: 2 start-page: 24 issue: 1 year: 2007 end-page: 30 article-title: A new steganographic method for data hiding in Microsoft word documents by a change tracking technique publication-title: IEEE Trans Inf Forensics Secur – volume: 10 start-page: 1 year: 2018 end-page: 12 article-title: A multi‐layer hybrid text steganography for secret communication using word tagging and RGB color coding publication-title: Int J Netw Secur Appl – start-page: 53 year: 2016 end-page: 56 – year: 2017 – volume: 187 start-page: 205 year: 2019 end-page: 222 article-title: A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map publication-title: Optik – volume: 45 start-page: 61 year: 2019 end-page: 70 article-title: A new method for pdf steganography in justified texts publication-title: J Inf Secur Appl – volume: 2 start-page: 58 year: 2014 end-page: 67 article-title: Data security using private key encryption system based on arithmetic coding publication-title: Int J Netw Secur Appl – ident: e_1_2_9_26_1 doi: 10.1109/SPIN.2016.7566661 – ident: e_1_2_9_5_1 doi: 10.1109/ICIOTA.2017.8073624 – ident: e_1_2_9_19_1 doi: 10.1016/j.ijleo.2019.04.074 – ident: e_1_2_9_18_1 doi: 10.1109/TCSVT.2019.2896270 – ident: e_1_2_9_28_1 – ident: e_1_2_9_8_1 doi: 10.1109/ICPECA51329.2021.9362537 – start-page: 158 volume-title: Analysis of Novel Hybrid Encryption Algorithm for Providing Security in Big Data year: 2019 ident: e_1_2_9_29_1 – volume: 13 start-page: 1854 year: 2018 ident: e_1_2_9_17_1 article-title: A comparative study on the advancement of text steganography techniques in digital media publication-title: J Eng Appl Sci – ident: e_1_2_9_21_1 doi: 10.1109/ARTCom.2009.122 – ident: e_1_2_9_23_1 doi: 10.1109/TIFS.2006.890310 – volume: 12 start-page: 1027 issue: 4 year: 2021 ident: e_1_2_9_4_1 article-title: An efficient approach for bigdata security based on Hadoop system using cryptographic techniques publication-title: Indian J CSE – ident: e_1_2_9_12_1 doi: 10.1504/IJESDF.2018.089214 – volume: 33 start-page: 865 issue: 7 year: 2021 ident: e_1_2_9_13_1 article-title: A linguistic steganography framework using Arabic calligraphy publication-title: J King Saud Univ‐Comput Inform Sci – ident: e_1_2_9_2_1 doi: 10.1109/ICCTCT.2018.8550957 – ident: e_1_2_9_20_1 doi: 10.1109/INFCOM.1995.515956 – ident: e_1_2_9_3_1 doi: 10.1088/1742-6596/1362/1/012060 – volume: 13 start-page: 23 year: 2022 ident: e_1_2_9_7_1 article-title: Hadoop distributed file system security challenges and examination of unauthorized access issue publication-title: J Inf Secur – ident: e_1_2_9_24_1 – volume: 20 start-page: 72 issue: 1 year: 2017 ident: e_1_2_9_27_1 article-title: A high capacity text steganography scheme based on LZW compression and color coding publication-title: Eng Sci Technol Int J – ident: e_1_2_9_6_1 doi: 10.24423/cames.375 – volume: 3 year: 2012 ident: e_1_2_9_30_1 article-title: Analyzing the efficiency of text‐to‐image encryption algorithm publication-title: Int J Adv Comput Sci Appl – ident: e_1_2_9_10_1 doi: 10.4018/IJORIS.20210701.oa4 – volume: 95 start-page: 6247 year: 2017 ident: e_1_2_9_14_1 article-title: New text steganography technique based on a set of two‐letterwords publication-title: J Theor Appl Inf Technol – volume: 45 start-page: 61 year: 2019 ident: e_1_2_9_16_1 article-title: A new method for pdf steganography in justified texts publication-title: J Inf Secur Appl – ident: e_1_2_9_11_1 doi: 10.1007/978-3-319-68505-2_11 – ident: e_1_2_9_22_1 doi: 10.1109/CCAA.2016.7813878 – ident: e_1_2_9_9_1 doi: 10.1088/1742-6596/2089/1/012031 – volume: 10 start-page: 1 year: 2018 ident: e_1_2_9_25_1 article-title: A multi‐layer hybrid text steganography for secret communication using word tagging and RGB color coding publication-title: Int J Netw Secur Appl – volume: 2 start-page: 58 year: 2014 ident: e_1_2_9_31_1 article-title: Data security using private key encryption system based on arithmetic coding publication-title: Int J Netw Secur Appl – ident: e_1_2_9_15_1 doi: 10.5769/J201501001 |
| SSID | ssj0011031 |
| Score | 2.3416035 |
| Snippet | Summary
Big data needs to have scalable storage platforms as well as parallel processing environments. Hadoop is preferable because it is an open‐source... Big data needs to have scalable storage platforms as well as parallel processing environments. Hadoop is preferable because it is an open‐source software which... |
| SourceID | proquest crossref wiley |
| SourceType | Aggregation Database Index Database Publisher |
| SubjectTerms | AES Algorithms Big Data Cryptography Encryption HDFS hex code one time pad Parallel processing RGB Security Steganography trusted platform module YCbCr |
| Title | Stacked multi‐layer security for Hadoop distributed file system using HSCT steganography |
| URI | https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fcpe.7711 https://www.proquest.com/docview/2855732642 |
| Volume | 35 |
| WOSCitedRecordID | wos000961603700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVWIB databaseName: Wiley Online Library Full Collection 2020 customDbUrl: eissn: 1532-0634 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0011031 issn: 1532-0626 databaseCode: DRFUL dateStart: 20010101 isFulltext: true titleUrlDefault: https://onlinelibrary.wiley.com providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1NS8NAEF2k9eDF-onVKiuIt9htks0mR6ktPZRStJXiJexnESQtbfXsT_A3-kucTTatHgTBUwjswjK7M_MmmX0PoSsSiVCGmnvap9oLYxN4PGCJRyE3Ki4SEeXN4499NhjEk0kydF2V9i5MwQ-x_uBmPSOP19bBuVg2N6Shcq5vGLPXeqv2ThUUXtW7--64v_6HYAUMCrZU3yOA20vqWeI3y7k_k9EGYX7HqXmi6db-s8Q9tOvgJb4tzsM-2tLZAaqV0g3YefIhegKQCf6rcN5Q-Pn-8cIBe-OlU7PDAGUxBKXZbI6Vpda1qlgw2rI44YL8GduO-SnuPbRHGN6nPHPk10do3O2M2j3PySx4EqrDlqcgxRNKVaAjLnigmIQqSseJgkwlKGNE0lAZIlgsoLgzTCghWzmvG2HSxCI4RpVslukThAPOEqoSk4SJhuCgYKuNr1vEmIjzOBB1dFnaO50XbBppwZvsp2Cs1BqrjhrlRqTOn5apH1PKAGmGfh1d5yb_dX7aHnbs8_SvA8_QjtWQt00gPm2gymrxqs_RtnxbPS8XF-5UfQFcQtI0 |
| linkProvider | Wiley-Blackwell |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1NS8NAEB1KK-jF-onVqiuIt2iaZLMJnqS2VIylaCvFS9jNboogaWmrZ3-Cv9Ff4mw-Wj0IgqcQ2IUwuzPzZjP7HsCp6QonchQ3lEWV4XixbXCb-QbF3Ci58IWbNo8_Bqzb9YZDv1eCy-IuTMYPsThw056Rxmvt4PpA-mLJGhpN1Dlj-l5vxXFt5pWhcn3fHgSLnwhawSCjS7UME4F7wT1rWhfF3J_ZaAkxvwPVNNO0q__6xg1YzwEmucp2xCaUVLIF1UK8geS-vA1PCDPRgyVJWwo_3z9eOKJvMsv17AiCWYJhaTyeEKnJdbUuFo7WPE4ko38mumd-RDoPzT7B9xFPcvrrHRi0W_1mx8iFFowI68OGITHJm5RKW7lccFuyCOso5fkSc5WgjJkRdWRsCuYJLO9iJqSIGimzm8mi2BP2LpSTcaL2gNic-VT6se_4CsODxMWOLdUw49jl3LNFDU4Kg4eTjE8jzJiTrRCNFWpj1aBerESYe9QstDxKGWJNx6rBWWrzX-eHzV5LP_f_OvAYVjv9uyAMbrq3B7CmFeV1S4hF61CeT1_VIaxEb_Pn2fQo32Jf897WJA |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1NSwMxEB1KK-LF-onVqhHE2-p2d9Ns8CStpWIpRa0UL0uySYogbWmrZ3-Cv9Ff4mQ_Wj0IgqdlIYEwycy82Z28B3Dq1mUQB1o42qPaCULjO8Jn3KGYG5WQXNaT5vHHDut2w8GA9wpwmd-FSfkhFh_crGck8do6uJ4oc7FkDY0n-pwxe6-3FFBOgyKUmnetfmfxE8EqGKR0qZ7jInDPuWdd7yKf-zMbLSHmd6CaZJpW-V9r3ID1DGCSq_REbEJBj7agnIs3kMyXt-EJYSZ6sCJJS-Hn-8eLQPRNZpmeHUEwSzAsjccToiy5rtXFwtGWx4mk9M_E9swPSfu-8UDwfShGGf31DvRb1w-NtpMJLTgx1oc1R2GSdylVvq4LKXzFYqyjdMgV5ipJGXNjGijjShZKLO8Mk0rGtYTZzWWxCaW_C8XReKT3gPiCcaq44QHXGB4UbrbxdM01pi5E6MsKnOQGjyYpn0aUMid7ERorssaqQDXfiSjzqFnkhZQyxJqBV4GzxOa_zo8avWv73P_rwGNY7TVbUeeme3sAa1ZQ3naEeLQKxfn0VR_CSvw2f55Nj7IT9gW9s9Wf |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Stacked+multi%E2%80%90layer+security+for+Hadoop+distributed+file+system+using+HSCT+steganography&rft.jtitle=Concurrency+and+computation&rft.au=Suganya%2C+S.&rft.au=Selvamuthukumaran%2C+S.&rft.date=2023-09-25&rft.pub=John+Wiley+%26+Sons%2C+Inc&rft.issn=1532-0626&rft.eissn=1532-0634&rft.volume=35&rft.issue=21&rft.epage=n%2Fa&rft_id=info:doi/10.1002%2Fcpe.7711&rft.externalDBID=10.1002%252Fcpe.7711&rft.externalDocID=CPE7711 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1532-0626&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1532-0626&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1532-0626&client=summon |