Browse > Article
http://dx.doi.org/10.7472/jksii.2012.13.5.55

A Secure Model for Reading and Writing in Hadoop Distributed File System and its Evaluation  

Pang, Sechung (KCC시큐리티 정보보호연구소)
Ra, Ilkyeun (미국 콜로라도 주립대학교 (덴버 캠퍼스) 컴퓨터공학과)
Kim, Yangwoo (동국대학교 정보통신공학과)
Publication Information
Journal of Internet Computing and Services / v.13, no.5, 2012 , pp. 55-64 More about this Journal
Abstract
Nowadays, as Cloud computing becomes popular, a need for a DFS(distributed file system) is increased. But, in the current Cloud computing environments, there is no DFS framework that is sufficient to protect sensitive private information from attackers. Therefore, we designed and proposed a secure scheme for distributed file systems. The scheme provides confidentiality and availability for a distributed file system using a secret sharing method. In this paper, we measured the speed of encryption and decryption for our proposed method, and compared them with that of SEED algorithm which is the most popular algorithm in this field. This comparison showed the computational efficiency of our method. Moreover, the proposed secure read/write model is independent of Hadoop DFS structure so that our modified algorithm can be easily adapted for use in the HDFS. Finally, the proposed model is evaluated theoretically using performance measurement method for distributed secret sharing model.
Keywords
Secret Sharing; Privacy Information; Cloud Computing; Hadoop;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Oriol Farras, Jaume Marti-Farre, Carles Padro, "Ideal Multipartite Secret Sharing Schemes", Advances in Cryptology, Eurocrypt 2007, Lecture Notes in Computer Science, Vol.4515, pp. 448-465, 2007.
2 Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima and Toshiaki Tanaka, "A New (k, n)-Threshold Secret Sharing Scheme and Its Extension", Lecture Notes in Computer Science, Vol. 5222, pp.455-470, 2008.
3 송유진, 이동혁, "New Secret Sharing Scheme for Privacy Data Management", 한국정보보호학회 2006년도 하계학술대회, Vol.16, No.1, pp.765-773, 2006.
4 Telecommunications Technology Association, Modes of Operation for the Block Cipher SEED (TTAS. KO-12.0025), 2003.
5 Hadoop Official Site, http://hadoop.apache.org
6 HDFS Architecture, Hadoop 0.20 Documentation, http://hadoop.apache.org/common/docs/r0.20.2/hdfs_design.html
7 Tom White, Hadoop, The Definitive Guide, 3. The Hadoop Distributed Filesystem, Data Flow, Ch.3, O'REILLY, 2009.
8 방세중, 조성환, 이승하, 김양우, "클라우드 컴퓨팅 환경에서 안전한 개인정보 분산저장 모델 및 평가", 한국인터넷정보학회 10주년 기념학회, Vol.11 No.1, pp.169-170, 2010.
9 Java 공식 사이트, http://www.java.com
10 Java.math Class BigInteger 공식 사이트, http://download.oracle.com/javase/1.4.2/docs/api/java/math/BigInteger.html
11 한국인터넷진흥원 개인정보보호, http://privacy.kisa.or.kr
12 SEED 공식 사이트, http://seed.kisa.or.kr/seed/jsp/seed.jsp
13 L. Sweeney, "k-anonymity: a model for protection privacy", International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10(5), 2002. pp.557-570.   DOI
14 Eclipse 공식 사이트, http://www.eclipse.org
15 A. Machanavajjhala, J. Gehrke, and D. Kifer, "l-Diversity: Privacy beyond k-anonymity". In International Conference on Data Engineering (ICDE), 2006. pp.24-35.
16 DES(Data Encryption Standard), http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf
17 AES(Advanced Encryption Standard), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
18 Telecommunications Technology Association, 128-bit Block Cipher SEED (TTA.KO-12.0004/R1), 1999.
19 Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of ACM, Vol. 21, pp. 120-126, 1978.   DOI   ScienceOn
20 A. Shamir, "How to share a secret", Communications of the ACM, vol.22, 1979. pp.612-613.   DOI   ScienceOn
21 Blakley, G. R. "Safeguarding cryptographic keys", Proceedings of the National Computer Conference 48, pp.313-317, 1979.
22 J. Benaloh, J. Leichter, "Generalized Secret Sharing and Monotone Functions", In Advances in Cryptology-CRYPTO '88, Lecture Notes in Computer Science, vol. 403, pp. 27-35, 1990.
23 C. Blundo, A, De Santis, L. Gargano, and U. Vaccaro, "On the Information Rate of Secret Sharing Schemes", Theoretical Computer Science, vol. 154(2), pp. 283-306, 1996.   DOI
24 E. F. Brickell and D. M. Davenport, "On the Classification of Ideal Secret Sharing Scheme", Journal of Cryptology, vol. 4, pp. 123-134, 1991.
25 박소영, 이상호, 권대성, "가중치를 갖는 비밀분산법", 정보과학회논문지: 시스템 및 이론 제29권 제4호, 2002.4.