2015 IEEE International Conference on Big Data (Big Data) 2015
DOI: 10.1109/bigdata.2015.7363785
|View full text |Cite
|
Sign up to set email alerts
|

TrustMR: Computation integrity assurance system for MapReduce

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…Therefore, cloud-based query evaluation raises two main challenge: (1) how to authenticate the query results in the format of key-value pairs; and (2) how to authenticate both the intermediate and final results for MapReduce execution. A few papers have considered integrity verification of MapReduce execution [34], [71], [74]. Intuitively, the intermediate results can be authenticated by applying the existing solutions on each mapper.…”
Section: Authentication Of Query Evaluation On Big Datamentioning
confidence: 99%
“…Therefore, cloud-based query evaluation raises two main challenge: (1) how to authenticate the query results in the format of key-value pairs; and (2) how to authenticate both the intermediate and final results for MapReduce execution. A few papers have considered integrity verification of MapReduce execution [34], [71], [74]. Intuitively, the intermediate results can be authenticated by applying the existing solutions on each mapper.…”
Section: Authentication Of Query Evaluation On Big Datamentioning
confidence: 99%
“…In this group of malicious worker(s) detection approaches, a task is replicated or decomposed into pieces and the pieces are replicated [ 24 ]. Whenever the task queue is not empty, the master will pick one task and send it to any two workers.…”
Section: Background and Related Workmentioning
confidence: 99%
“…For detecting collusive workers, they improved the replicated task so that it is a credit-based replicated task, and they added a ` (trusted worker) to verify the intermediate results. In replication-based techniques, due to the task performed by multiple workers, system performance decreases [ 24 , 25 ].…”
Section: Background and Related Workmentioning
confidence: 99%
“…In addition, the approach also depletes scalability. To lower the resource requirements, TrustMR [52], Trusted Samplingbased Third-party Result Verification (TS-TRV) [53], and Accountable MR [54] [55] are proposed. These schemes replicate only a subset of the tasks, thus reducing the resource consumption.…”
Section: B Mr Specific Solutionsmentioning
confidence: 99%