Stacked multi‐layer security for Hadoop distributed file system using HSCT steganography

Summary Big data needs to have scalable storage platforms as well as parallel processing environments. Hadoop is preferable because it is an open‐source software which works in a distributed, parallel processing environment and no need of any special hardware. In recent developments of Hadoop, secur...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Concurrency and computation Ročník 35; číslo 21
Hlavní autori: Suganya, S., Selvamuthukumaran, S.
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Hoboken, USA John Wiley & Sons, Inc 25.09.2023
Wiley Subscription Services, Inc
Predmet:
ISSN:1532-0626, 1532-0634
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Summary Big data needs to have scalable storage platforms as well as parallel processing environments. Hadoop is preferable because it is an open‐source software which works in a distributed, parallel processing environment and no need of any special hardware. In recent developments of Hadoop, security was introduced as optional. A symmetric block cipher advanced encryption standard (AES) is used for encryption. A 128 MB block of data needs 8 million encryptions. A better way of hiding the data from unauthorized access is preferable. Steganography, a more contemporary security technology than cryptography, is the art and science of hiding subconscious information in hidden item while exposing opponents their existence. The cover is an image, and the secret information may be a photo, music, video, or text. A double layer hexcode substituted–color space transformed (HSCT) steganography with 3 band splitting of data ensures confidentiality of the data and one time pad key generated with client's ID provides authentication also. Considering the volume of data, steganography concept is much faster than AES or any other cipher. Hiding the data inside the random images will indulge in fast reconstruction of data when needed for processing using either MapReduce or tools like spark.
AbstractList Big data needs to have scalable storage platforms as well as parallel processing environments. Hadoop is preferable because it is an open‐source software which works in a distributed, parallel processing environment and no need of any special hardware. In recent developments of Hadoop, security was introduced as optional. A symmetric block cipher advanced encryption standard (AES) is used for encryption. A 128 MB block of data needs 8 million encryptions. A better way of hiding the data from unauthorized access is preferable. Steganography, a more contemporary security technology than cryptography, is the art and science of hiding subconscious information in hidden item while exposing opponents their existence. The cover is an image, and the secret information may be a photo, music, video, or text. A double layer hexcode substituted–color space transformed (HSCT) steganography with 3 band splitting of data ensures confidentiality of the data and one time pad key generated with client's ID provides authentication also. Considering the volume of data, steganography concept is much faster than AES or any other cipher. Hiding the data inside the random images will indulge in fast reconstruction of data when needed for processing using either MapReduce or tools like spark.
Summary Big data needs to have scalable storage platforms as well as parallel processing environments. Hadoop is preferable because it is an open‐source software which works in a distributed, parallel processing environment and no need of any special hardware. In recent developments of Hadoop, security was introduced as optional. A symmetric block cipher advanced encryption standard (AES) is used for encryption. A 128 MB block of data needs 8 million encryptions. A better way of hiding the data from unauthorized access is preferable. Steganography, a more contemporary security technology than cryptography, is the art and science of hiding subconscious information in hidden item while exposing opponents their existence. The cover is an image, and the secret information may be a photo, music, video, or text. A double layer hexcode substituted–color space transformed (HSCT) steganography with 3 band splitting of data ensures confidentiality of the data and one time pad key generated with client's ID provides authentication also. Considering the volume of data, steganography concept is much faster than AES or any other cipher. Hiding the data inside the random images will indulge in fast reconstruction of data when needed for processing using either MapReduce or tools like spark.
Author Suganya, S.
Selvamuthukumaran, S.
Author_xml – sequence: 1
  givenname: S.
  orcidid: 0009-0009-5534-7697
  surname: Suganya
  fullname: Suganya, S.
  email: suganyaavcp@gmail.com
  organization: Anna University
– sequence: 2
  givenname: S.
  orcidid: 0000-0002-4820-7006
  surname: Selvamuthukumaran
  fullname: Selvamuthukumaran, S.
  email: smksmk@gmail.com
  organization: A.V.C. College of Engineering
BookMark eNp10M1Kw0AQB_BFKthWwUdY8OIldT-y2eQooVqhoNB68bLsV2pqmo27CSU3H8Fn9ElMrXjzNDPwY4b5T8CodrUF4BKjGUaI3OjGzjjH-ASMMaMkQgmNR389Sc7AJIQtQhgjisfgZdVK_WYN3HVVW359fFaytx4Gqztftj0snIcLaZxroClD60vVtYMuysrC0IfW7mAXynoDF6t8DYd5I2u38bJ57c_BaSGrYC9-6xQ8383X-SJaPt4_5LfLSBMW48hgEiPGDLWJVJIarknKbZoZkmWKcY40i02BFE8VznDBlVEaxxmhGHFdpIpOwdVxb-Pde2dDK7au8_VwUpCUMU5JEpNBXR-V9i4EbwvR-HInfS8wEofkxJCcOCQ30OhI98OX_b9O5E_zH_8N0lNyJA
Cites_doi 10.1109/SPIN.2016.7566661
10.1109/ICIOTA.2017.8073624
10.1016/j.ijleo.2019.04.074
10.1109/TCSVT.2019.2896270
10.1109/ICPECA51329.2021.9362537
10.1109/ARTCom.2009.122
10.1109/TIFS.2006.890310
10.1504/IJESDF.2018.089214
10.1109/ICCTCT.2018.8550957
10.1109/INFCOM.1995.515956
10.1088/1742-6596/1362/1/012060
10.24423/cames.375
10.4018/IJORIS.20210701.oa4
10.1007/978-3-319-68505-2_11
10.1109/CCAA.2016.7813878
10.1088/1742-6596/2089/1/012031
10.5769/J201501001
ContentType Journal Article
Copyright 2023 John Wiley & Sons, Ltd.
Copyright_xml – notice: 2023 John Wiley & Sons, Ltd.
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1002/cpe.7711
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer and Information Systems Abstracts
CrossRef

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1532-0634
EndPage n/a
ExternalDocumentID 10_1002_cpe_7711
CPE7711
Genre article
GroupedDBID .3N
.DC
.GA
05W
0R~
10A
1L6
1OC
33P
3SF
3WU
4.4
50Y
50Z
51W
51X
52M
52N
52O
52P
52S
52T
52U
52W
52X
5GY
5VS
66C
702
7PT
8-0
8-1
8-3
8-4
8-5
8UM
930
A03
AAESR
AAEVG
AAHHS
AAHQN
AAMNL
AANLZ
AAONW
AAXRX
AAYCA
AAZKR
ABCQN
ABCUV
ABEML
ABIJN
ACAHQ
ACCFJ
ACCZN
ACPOU
ACSCC
ACXBN
ACXQS
ADBBV
ADEOM
ADIZJ
ADKYN
ADMGS
ADOZA
ADXAS
ADZMN
ADZOD
AEEZP
AEIGN
AEIMD
AEQDE
AEUQT
AEUYR
AFBPY
AFFPM
AFGKR
AFPWT
AFWVQ
AHBTC
AITYG
AIURR
AIWBW
AJBDE
AJXKR
ALMA_UNASSIGNED_HOLDINGS
ALUQN
ALVPJ
AMBMR
AMYDB
ATUGU
AUFTA
AZBYB
BAFTC
BDRZF
BFHJK
BHBCM
BMNLL
BROTX
BRXPI
BY8
CS3
D-E
D-F
DCZOG
DPXWK
DR2
DRFUL
DRSTM
EBS
F00
F01
F04
F5P
G-S
G.N
GNP
GODZA
HGLYW
HHY
HZ~
IX1
JPC
KQQ
LATKE
LAW
LC2
LC3
LEEKS
LH4
LITHE
LOXES
LP6
LP7
LUTES
LYRES
MEWTI
MK4
MRFUL
MRSTM
MSFUL
MSSTM
MXFUL
MXSTM
N04
N05
N9A
O66
O9-
OIG
P2W
P2X
P4D
PQQKQ
Q.N
Q11
QB0
QRW
R.K
ROL
RWI
RX1
SUPJJ
TN5
UB1
V2E
W8V
W99
WBKPD
WIH
WIK
WOHZO
WQJ
WRC
WXSBR
WYISQ
WZISG
XG1
XV2
~IA
~WT
AAYXX
ADMLS
AEYWJ
AGHNM
AGYGG
CITATION
O8X
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c2541-d124055d3e6aba3d7c287e89d299b5770c54df0b78b191f7bdbc14923107cf8b3
IEDL.DBID DRFUL
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000961603700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1532-0626
IngestDate Sun Nov 09 07:36:16 EST 2025
Sat Nov 29 03:49:54 EST 2025
Wed Jan 22 16:17:05 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 21
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2541-d124055d3e6aba3d7c287e89d299b5770c54df0b78b191f7bdbc14923107cf8b3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0009-0009-5534-7697
0000-0002-4820-7006
PQID 2855732642
PQPubID 2045170
PageCount 14
ParticipantIDs proquest_journals_2855732642
crossref_primary_10_1002_cpe_7711
wiley_primary_10_1002_cpe_7711_CPE7711
PublicationCentury 2000
PublicationDate 25 September 2023
PublicationDateYYYYMMDD 2023-09-25
PublicationDate_xml – month: 09
  year: 2023
  text: 25 September 2023
  day: 25
PublicationDecade 2020
PublicationPlace Hoboken, USA
PublicationPlace_xml – name: Hoboken, USA
– name: Hoboken
PublicationTitle Concurrency and computation
PublicationYear 2023
Publisher John Wiley & Sons, Inc
Wiley Subscription Services, Inc
Publisher_xml – name: John Wiley & Sons, Inc
– name: Wiley Subscription Services, Inc
References 2021; 2089
2017; 20
2019; 30
2015; 10
2009
1995
2019; 1362
2022; 29
2019; 187
2017; 95
2012; 3
2021; 12
2021; 33
2014; 2
2021
2020
2019; 45
2022; 13
2019
2018
2017
2016
2007; 2
2018; 10
2018; 13
Rajeh W (e_1_2_9_7_1) 2022; 13
Dwivedi N (e_1_2_9_29_1) 2019
e_1_2_9_11_1
e_1_2_9_10_1
e_1_2_9_12_1
e_1_2_9_15_1
e_1_2_9_19_1
e_1_2_9_18_1
Al‐Azzawi AF (e_1_2_9_25_1) 2018; 10
e_1_2_9_20_1
e_1_2_9_22_1
Singh A (e_1_2_9_31_1) 2014; 2
e_1_2_9_21_1
Baawi SS (e_1_2_9_14_1) 2017; 95
e_1_2_9_24_1
e_1_2_9_23_1
e_1_2_9_8_1
e_1_2_9_6_1
Khosravi B (e_1_2_9_16_1) 2019; 45
e_1_2_9_5_1
e_1_2_9_3_1
e_1_2_9_2_1
Hamzah AA (e_1_2_9_13_1) 2021; 33
e_1_2_9_9_1
Baawi SS (e_1_2_9_17_1) 2018; 13
e_1_2_9_26_1
e_1_2_9_28_1
Abusukhon A (e_1_2_9_30_1) 2012; 3
Gattoju S (e_1_2_9_4_1) 2021; 12
Malik A (e_1_2_9_27_1) 2017; 20
References_xml – volume: 12
  start-page: 1
  issue: 3
  year: 2021
  end-page: 7
  article-title: An enhanced security measure for multimedia images using Hadoop cluster
  publication-title: Int J Oper Res Inf Syst
– volume: 13
  start-page: 23
  year: 2022
  end-page: 42
  article-title: Hadoop distributed file system security challenges and examination of unauthorized access issue
  publication-title: J Inf Secur
– volume: 10
  start-page: 61
  year: 2018
  end-page: 78
  article-title: Information hiding: Arabic text steganography by using Unicode characters to hide secret data
  publication-title: Int J Electron Secur Digit Forensics
– start-page: 22
  year: 2021
  end-page: 23
– volume: 30
  start-page: 685
  issue: 3
  year: 2019
  end-page: 696
  article-title: A new payload partition strategy in color image steganography
  publication-title: IEEE Trans Circuits Syst Video Technol
– volume: 29
  start-page: 33
  year: 2022
  end-page: 48
  article-title: Hybrid encryption algorithm for big data security in the Hadoop distributed file system
  publication-title: Comput Assist Methods Eng Sci
– start-page: 1090
  year: 2016
  end-page: 1094
– year: 2018
– volume: 95
  start-page: 6247
  year: 2017
  end-page: 6255
  article-title: New text steganography technique based on a set of two‐letterwords
  publication-title: J Theor Appl Inf Technol
– start-page: 853
  year: 1995
  end-page: 80
– start-page: 158
  year: 2019
  end-page: 169
– volume: 12
  start-page: 1027
  issue: 4
  year: 2021
  end-page: 1037
  article-title: An efficient approach for bigdata security based on Hadoop system using cryptographic techniques
  publication-title: Indian J CSE
– volume: 20
  start-page: 72
  issue: 1
  year: 2017
  end-page: 79
  article-title: A high capacity text steganography scheme based on LZW compression and color coding
  publication-title: Eng Sci Technol Int J
– volume: 13
  start-page: 1854
  year: 2018
  end-page: 1863
  article-title: A comparative study on the advancement of text steganography techniques in digital media
  publication-title: J Eng Appl Sci
– start-page: 121
  year: 2017
  end-page: 132
– volume: 10
  start-page: 8
  issue: 1
  year: 2015
  end-page: 14
  article-title: An efficient text steganography scheme using unicode space characters
  publication-title: Int J Forensic Comput Sci
– volume: 3
  year: 2012
  article-title: Analyzing the efficiency of text‐to‐image encryption algorithm
  publication-title: Int J Adv Comput Sci Appl
– volume: 1362
  year: 2019
  article-title: Securing Hadoop distributed file system using intelligence based sensitivity bits
  publication-title: J Phys Conf Ser
– volume: 2089
  year: 2021
  article-title: A survey on security of Hadoop framework in the environment of Bigdata
  publication-title: J Phys Conf Ser
– year: 2020
– volume: 33
  start-page: 865
  issue: 7
  year: 2021
  end-page: 877
  article-title: A linguistic steganography framework using Arabic calligraphy
  publication-title: J King Saud Univ‐Comput Inform Sci
– start-page: 199
  year: 2009
  end-page: 202
– volume: 2
  start-page: 24
  issue: 1
  year: 2007
  end-page: 30
  article-title: A new steganographic method for data hiding in Microsoft word documents by a change tracking technique
  publication-title: IEEE Trans Inf Forensics Secur
– volume: 10
  start-page: 1
  year: 2018
  end-page: 12
  article-title: A multi‐layer hybrid text steganography for secret communication using word tagging and RGB color coding
  publication-title: Int J Netw Secur Appl
– start-page: 53
  year: 2016
  end-page: 56
– year: 2017
– volume: 187
  start-page: 205
  year: 2019
  end-page: 222
  article-title: A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map
  publication-title: Optik
– volume: 45
  start-page: 61
  year: 2019
  end-page: 70
  article-title: A new method for pdf steganography in justified texts
  publication-title: J Inf Secur Appl
– volume: 2
  start-page: 58
  year: 2014
  end-page: 67
  article-title: Data security using private key encryption system based on arithmetic coding
  publication-title: Int J Netw Secur Appl
– ident: e_1_2_9_26_1
  doi: 10.1109/SPIN.2016.7566661
– ident: e_1_2_9_5_1
  doi: 10.1109/ICIOTA.2017.8073624
– ident: e_1_2_9_19_1
  doi: 10.1016/j.ijleo.2019.04.074
– ident: e_1_2_9_18_1
  doi: 10.1109/TCSVT.2019.2896270
– ident: e_1_2_9_28_1
– ident: e_1_2_9_8_1
  doi: 10.1109/ICPECA51329.2021.9362537
– start-page: 158
  volume-title: Analysis of Novel Hybrid Encryption Algorithm for Providing Security in Big Data
  year: 2019
  ident: e_1_2_9_29_1
– volume: 13
  start-page: 1854
  year: 2018
  ident: e_1_2_9_17_1
  article-title: A comparative study on the advancement of text steganography techniques in digital media
  publication-title: J Eng Appl Sci
– ident: e_1_2_9_21_1
  doi: 10.1109/ARTCom.2009.122
– ident: e_1_2_9_23_1
  doi: 10.1109/TIFS.2006.890310
– volume: 12
  start-page: 1027
  issue: 4
  year: 2021
  ident: e_1_2_9_4_1
  article-title: An efficient approach for bigdata security based on Hadoop system using cryptographic techniques
  publication-title: Indian J CSE
– ident: e_1_2_9_12_1
  doi: 10.1504/IJESDF.2018.089214
– volume: 33
  start-page: 865
  issue: 7
  year: 2021
  ident: e_1_2_9_13_1
  article-title: A linguistic steganography framework using Arabic calligraphy
  publication-title: J King Saud Univ‐Comput Inform Sci
– ident: e_1_2_9_2_1
  doi: 10.1109/ICCTCT.2018.8550957
– ident: e_1_2_9_20_1
  doi: 10.1109/INFCOM.1995.515956
– ident: e_1_2_9_3_1
  doi: 10.1088/1742-6596/1362/1/012060
– volume: 13
  start-page: 23
  year: 2022
  ident: e_1_2_9_7_1
  article-title: Hadoop distributed file system security challenges and examination of unauthorized access issue
  publication-title: J Inf Secur
– ident: e_1_2_9_24_1
– volume: 20
  start-page: 72
  issue: 1
  year: 2017
  ident: e_1_2_9_27_1
  article-title: A high capacity text steganography scheme based on LZW compression and color coding
  publication-title: Eng Sci Technol Int J
– ident: e_1_2_9_6_1
  doi: 10.24423/cames.375
– volume: 3
  year: 2012
  ident: e_1_2_9_30_1
  article-title: Analyzing the efficiency of text‐to‐image encryption algorithm
  publication-title: Int J Adv Comput Sci Appl
– ident: e_1_2_9_10_1
  doi: 10.4018/IJORIS.20210701.oa4
– volume: 95
  start-page: 6247
  year: 2017
  ident: e_1_2_9_14_1
  article-title: New text steganography technique based on a set of two‐letterwords
  publication-title: J Theor Appl Inf Technol
– volume: 45
  start-page: 61
  year: 2019
  ident: e_1_2_9_16_1
  article-title: A new method for pdf steganography in justified texts
  publication-title: J Inf Secur Appl
– ident: e_1_2_9_11_1
  doi: 10.1007/978-3-319-68505-2_11
– ident: e_1_2_9_22_1
  doi: 10.1109/CCAA.2016.7813878
– ident: e_1_2_9_9_1
  doi: 10.1088/1742-6596/2089/1/012031
– volume: 10
  start-page: 1
  year: 2018
  ident: e_1_2_9_25_1
  article-title: A multi‐layer hybrid text steganography for secret communication using word tagging and RGB color coding
  publication-title: Int J Netw Secur Appl
– volume: 2
  start-page: 58
  year: 2014
  ident: e_1_2_9_31_1
  article-title: Data security using private key encryption system based on arithmetic coding
  publication-title: Int J Netw Secur Appl
– ident: e_1_2_9_15_1
  doi: 10.5769/J201501001
SSID ssj0011031
Score 2.3416035
Snippet Summary Big data needs to have scalable storage platforms as well as parallel processing environments. Hadoop is preferable because it is an open‐source...
Big data needs to have scalable storage platforms as well as parallel processing environments. Hadoop is preferable because it is an open‐source software which...
SourceID proquest
crossref
wiley
SourceType Aggregation Database
Index Database
Publisher
SubjectTerms AES
Algorithms
Big Data
Cryptography
Encryption
HDFS
hex code
one time pad
Parallel processing
RGB
Security
Steganography
trusted platform module
YCbCr
Title Stacked multi‐layer security for Hadoop distributed file system using HSCT steganography
URI https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fcpe.7711
https://www.proquest.com/docview/2855732642
Volume 35
WOSCitedRecordID wos000961603700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVWIB
  databaseName: Wiley Online Library Full Collection 2020
  customDbUrl:
  eissn: 1532-0634
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0011031
  issn: 1532-0626
  databaseCode: DRFUL
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://onlinelibrary.wiley.com
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1NS8NAEF2k9eDF-onVKiuIt9htks0mR6ktPZRStJXiJexnESQtbfXsT_A3-kucTTatHgTBUwjswjK7M_MmmX0PoSsSiVCGmnvap9oLYxN4PGCJRyE3Ki4SEeXN4499NhjEk0kydF2V9i5MwQ-x_uBmPSOP19bBuVg2N6Shcq5vGLPXeqv2ThUUXtW7--64v_6HYAUMCrZU3yOA20vqWeI3y7k_k9EGYX7HqXmi6db-s8Q9tOvgJb4tzsM-2tLZAaqV0g3YefIhegKQCf6rcN5Q-Pn-8cIBe-OlU7PDAGUxBKXZbI6Vpda1qlgw2rI44YL8GduO-SnuPbRHGN6nPHPk10do3O2M2j3PySx4EqrDlqcgxRNKVaAjLnigmIQqSseJgkwlKGNE0lAZIlgsoLgzTCghWzmvG2HSxCI4RpVslukThAPOEqoSk4SJhuCgYKuNr1vEmIjzOBB1dFnaO50XbBppwZvsp2Cs1BqrjhrlRqTOn5apH1PKAGmGfh1d5yb_dX7aHnbs8_SvA8_QjtWQt00gPm2gymrxqs_RtnxbPS8XF-5UfQFcQtI0
linkProvider Wiley-Blackwell
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1NS8NAEB1KK-jF-onVqiuIt2iaZLMJnqS2VIylaCvFS9jNboogaWmrZ3-Cv9Ff4mw-Wj0IgqcQ2IUwuzPzZjP7HsCp6QonchQ3lEWV4XixbXCb-QbF3Ci58IWbNo8_Bqzb9YZDv1eCy-IuTMYPsThw056Rxmvt4PpA-mLJGhpN1Dlj-l5vxXFt5pWhcn3fHgSLnwhawSCjS7UME4F7wT1rWhfF3J_ZaAkxvwPVNNO0q__6xg1YzwEmucp2xCaUVLIF1UK8geS-vA1PCDPRgyVJWwo_3z9eOKJvMsv17AiCWYJhaTyeEKnJdbUuFo7WPE4ko38mumd-RDoPzT7B9xFPcvrrHRi0W_1mx8iFFowI68OGITHJm5RKW7lccFuyCOso5fkSc5WgjJkRdWRsCuYJLO9iJqSIGimzm8mi2BP2LpSTcaL2gNic-VT6se_4CsODxMWOLdUw49jl3LNFDU4Kg4eTjE8jzJiTrRCNFWpj1aBerESYe9QstDxKGWJNx6rBWWrzX-eHzV5LP_f_OvAYVjv9uyAMbrq3B7CmFeV1S4hF61CeT1_VIaxEb_Pn2fQo32Jf897WJA
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1NSwMxEB1KK-LF-onVqhHE2-p2d9Ns8CStpWIpRa0UL0uySYogbWmrZ3-Cv9Ff4mQ_Wj0IgqdlIYEwycy82Z28B3Dq1mUQB1o42qPaCULjO8Jn3KGYG5WQXNaT5vHHDut2w8GA9wpwmd-FSfkhFh_crGck8do6uJ4oc7FkDY0n-pwxe6-3FFBOgyKUmnetfmfxE8EqGKR0qZ7jInDPuWdd7yKf-zMbLSHmd6CaZJpW-V9r3ID1DGCSq_REbEJBj7agnIs3kMyXt-EJYSZ6sCJJS-Hn-8eLQPRNZpmeHUEwSzAsjccToiy5rtXFwtGWx4mk9M_E9swPSfu-8UDwfShGGf31DvRb1w-NtpMJLTgx1oc1R2GSdylVvq4LKXzFYqyjdMgV5ipJGXNjGijjShZKLO8Mk0rGtYTZzWWxCaW_C8XReKT3gPiCcaq44QHXGB4UbrbxdM01pi5E6MsKnOQGjyYpn0aUMid7ERorssaqQDXfiSjzqFnkhZQyxJqBV4GzxOa_zo8avWv73P_rwGNY7TVbUeeme3sAa1ZQ3naEeLQKxfn0VR_CSvw2f55Nj7IT9gW9s9Wf
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Stacked+multi%E2%80%90layer+security+for+Hadoop+distributed+file+system+using+HSCT+steganography&rft.jtitle=Concurrency+and+computation&rft.au=Suganya%2C+S.&rft.au=Selvamuthukumaran%2C+S.&rft.date=2023-09-25&rft.pub=John+Wiley+%26+Sons%2C+Inc&rft.issn=1532-0626&rft.eissn=1532-0634&rft.volume=35&rft.issue=21&rft.epage=n%2Fa&rft_id=info:doi/10.1002%2Fcpe.7711&rft.externalDBID=10.1002%252Fcpe.7711&rft.externalDocID=CPE7711
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1532-0626&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1532-0626&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1532-0626&client=summon