Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering 2014
DOI: 10.1145/2642937.2643006
|View full text |Cite
|
Sign up to set email alerts
|

Program analysis for secure big data processing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…Stephen et al [16] proposed a method with program analysis to find security threats in MapReduce code. Geyer et al [17] on the other hand proposed a security framework for processing big data in distributed environment.…”
Section: Enhancing Mapreduce Layer For Big Data Privacymentioning
confidence: 99%
“…Stephen et al [16] proposed a method with program analysis to find security threats in MapReduce code. Geyer et al [17] on the other hand proposed a security framework for processing big data in distributed environment.…”
Section: Enhancing Mapreduce Layer For Big Data Privacymentioning
confidence: 99%
“…Other authors' research is focused on how to process data that is already encrypted. One paper, for example, explains a technique with which to analyse and programme transformations with PigLatin in the case of encrypted data [38].…”
Section: Cryptographymentioning
confidence: 99%
“…STYX derives this from program annotations in each vertex class in the graph. Once STYX derives the distinct streams and operations to be performed on those streams, we can proceed similarly as in our prior work [34] to infer the crypto systems required to execute the graph.…”
Section: Processing Secure Streamsmentioning
confidence: 99%
“…There can also be a mismatch between parent and child operator nodes if they do not belong to the same crypto system. In this case (unlike in [34]) a reencryption operator is inserted in between, which converts the stream from one crypto system to the other. These reencryption nodes are marked to be executed on the trusted tier so that the scheduler can place the tasks correctly.…”
Section: Processing Secure Streamsmentioning
confidence: 99%