2015 IEEE International Conference on Intelligence and Security Informatics (ISI) 2015
DOI: 10.1109/isi.2015.7165951
|View full text |Cite
|
Sign up to set email alerts
|

Honeypot based unauthorized data access detection in MapReduce systems

Abstract: The data processing capabilities of MapReduce systems pioneered with the on-demand scalability of cloud computing have enabled the Big Data revolution. However, the data controllers/owners worried about the privacy and accountability impact of storing their data in the cloud infrastructures as the existing cloud computing solutions provide very limited control on the underlying systems. The intuitive approach-encrypting data before uploading to the cloud-is not applicable to MapReduce computation as the data a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…Further to log-based anomaly detection approaches, there are other research efforts share the same goal for improving the security of big data systems. These approaches span different research directions, ranging from differential privacy [36], integrity verification [37]- [40], policy enforcement [41]- [44], data provenance [45]- [48], honeypot-based [49], to encryptionbased [50] mechanisms, Security Monitoring [51], among others.…”
Section: Graph Neural Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…Further to log-based anomaly detection approaches, there are other research efforts share the same goal for improving the security of big data systems. These approaches span different research directions, ranging from differential privacy [36], integrity verification [37]- [40], policy enforcement [41]- [44], data provenance [45]- [48], honeypot-based [49], to encryptionbased [50] mechanisms, Security Monitoring [51], among others.…”
Section: Graph Neural Networkmentioning
confidence: 99%
“…They face several challenges that may hinder its practicability such as the volume of captured provenance data, the storage and integration required to effectively analyze these data, and the most important factor is the overhead incurred from collecting these data during the execution of distributed analytic applications. Other approach [49] takes on honeypot-based mechanism to detect unauthorized access in MapReduce. A different approach [50] leverages encryption to protect data at the cost of imposing performance burden and reduction of system operations.…”
Section: Graph Neural Networkmentioning
confidence: 99%
“…MapReduce programs consist of map processes that perform filtering and sorting, and reduce processes that perform summary operations. MapReduce combines the distributed serves, runs the different tasks in parallel, manages all communication and data transmission in a different system, and provides redundancy and fault tolerance [ 21 , 22 ]. MapReduce processes K-V data.…”
Section: Related Workmentioning
confidence: 99%
“…A slave token (contains identity of the CA server and the public key of the corresponding slave node) is used by the master process for authenticating a slave node. In [111], the authors suggested a honey-pot-based mechanism for detecting an unauthorized data access. Honey data is deliberately produced and mixed in the original data.…”
Section: Authentication Authorization and Access Control Based Apprmentioning
confidence: 99%
“…All the approaches suggested in Section 4.4.3 are based on encryption-decryption, which comes at a price of computation and limited operations [111]. In [40], a Shamir's secret-sharing [95] based solution for five types of MapReduce computations such as count, search, fetch, equijoin, and range selection is provided.…”
Section: Data Privacy In Adversarial Clouds Using Secret-sharingmentioning
confidence: 99%