DOI QR코드

DOI QR Code

A Security Protection Framework for Cloud Computing

  • Zhu, Wenzheng (Dept. of Computer Science and Engineering, Konkuk University) ;
  • Lee, Changhoon (Dept. of Computer Science and Engineering, Konkuk University)
  • Received : 2015.05.26
  • Accepted : 2015.10.15
  • Published : 2016.09.30

Abstract

Cloud computing is a new style of computing in which dynamically scalable and reconfigurable resources are provided as a service over the internet. The MapReduce framework is currently the most dominant programming model in cloud computing. It is necessary to protect the integrity of MapReduce data processing services. Malicious workers, who can be divided into collusive workers and non-collusive workers, try to generate bad results in order to attack the cloud computing. So, figuring out how to efficiently detect the malicious workers has been very important, as existing solutions are not effective enough in defeating malicious behavior. In this paper, we propose a security protection framework to detect the malicious workers and ensure computation integrity in the map phase of MapReduce. Our simulation results show that our proposed security protection framework can efficiently detect both collusive and non-collusive workers and guarantee high computation accuracy.

Keywords

References

  1. R. Lammel, "Google's MapReduce programming model-revisited," Science of Computer Programming, vol. 70, no. 1, pp. 1-30, 2008. https://doi.org/10.1016/j.scico.2007.07.001
  2. S. N. Srirama, P. Jakovits, and E. Vainikko, "Adapting scientific computing problems to clouds using MapReduce," Future Generation Computer Systems, vol. 28, no. 1, pp. 184-192, 2012. https://doi.org/10.1016/j.future.2011.05.025
  3. F. Costa, L. Silva, and M. Dahlin, "Volunteer cloud computing: MapReduce over the Internet," in Proceedings of 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), Shanghai, China, 2011, pp. 1855-1862.
  4. S. Ghemawat, H. Gobioff, and S. T. Leung, "The Google file system," ACM SIGOPS Operating Systems Review, vol. 37, no. 5, pp. 29-43, 2003. https://doi.org/10.1145/1165389.945450
  5. J. Dean and S. Ghemawat, "MapReduce: simplified data processing on large clusters," Communications of the ACM, vol. 51, no. 1, pp. 107-113, 2008. https://doi.org/10.1145/1327452.1327492
  6. Apache [Online]. Available: http://hadoop.apache.org.
  7. Hadoop [Online]. Available: http://hadoop.apache.org/releases.
  8. W. Wei, J. Du, T. Yu, and X. Gu, "SecureMR: a service integrity assurance framework for MapReduce," in Proceedings of Annual Computer Security Applications Conference (ACSAC'09), Honolulu, HI, 2009, pp. 73-82.

Cited by

  1. A Study on a JWT-Based User Authentication and API Assessment Scheme Using IMEI in a Smart Home Environment vol.9, pp.7, 2017, https://doi.org/10.3390/su9071099
  2. 3D Reconstruction Framework for Multiple Remote Robots on Cloud System vol.9, pp.4, 2017, https://doi.org/10.3390/sym9040055