2009 Annual Computer Security Applications Conference 2009
DOI: 10.1109/acsac.2009.17
|View full text |Cite
|
Sign up to set email alerts
|

SecureMR: A Service Integrity Assurance Framework for MapReduce

Abstract: Abstract-MapReduce has become increasingly popular as a powerful parallel data processing model. To deploy MapReduce as a data processing service over open systems such as service oriented architecture, cloud computing, and volunteer computing, we must provide necessary security mechanisms to protect the integrity of MapReduce data processing services. In this paper, we present SecureMR, a practical service integrity assurance framework for MapReduce. SecureMR consists of five security components, which provid… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
88
0
1

Year Published

2011
2011
2015
2015

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 107 publications
(89 citation statements)
references
References 19 publications
0
88
0
1
Order By: Relevance
“…Considering the untrustable SPs, Chu Huang et al proposed a watermark injection method to verify if the computation is completed correctly [19]. For the untrustable participating nodes in an open MapReduce environment, Wei Wei et al proposed an integrity protection mechanism called SecureMR, which uses two-copy replication to verify the result in the map phase [9]. Yongzhi Wang and his colleagues introduced the verifier role in the MapReduce computing model [10], which samples and re-computes the results passed the replication verification, to defend collusion attack.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Considering the untrustable SPs, Chu Huang et al proposed a watermark injection method to verify if the computation is completed correctly [19]. For the untrustable participating nodes in an open MapReduce environment, Wei Wei et al proposed an integrity protection mechanism called SecureMR, which uses two-copy replication to verify the result in the map phase [9]. Yongzhi Wang and his colleagues introduced the verifier role in the MapReduce computing model [10], which samples and re-computes the results passed the replication verification, to defend collusion attack.…”
Section: Related Workmentioning
confidence: 99%
“…Current studies in this area are mainly based on the redundant computing principal, that is to dispatch task to multiple replicas, and vote on results to obtain correct ones [9]. Such scheme, however, is insufficient to effectively prevent collusive attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Their work focuses on protecting privacy issues of untrusted code of data-mining and data-analysis algorithms executed on MapReduce. Wei et al [6] proposed a secure scheme called SecureMR which aims at protecting the computation integrity issue of MapReduce. SecureMR detects misbehavior of mappers by sending same tasks to multiple mappers, and check consistency of results.…”
Section: Related Workmentioning
confidence: 99%
“…Integrity verification: In other directions, [23] replicates some map/reduce tasks and assign them to different mappers/reducers to validate the integrity of map/reduce tasks. Any inconsistent intermediate results from those mappers/reducers reveal attacks.…”
Section: Security In Mapreducementioning
confidence: 99%