2015 IEEE Symposium on Security and Privacy 2015
DOI: 10.1109/sp.2015.10
|View full text |Cite
|
Sign up to set email alerts
|

VC3: Trustworthy Data Analytics in the Cloud Using SGX

Abstract: We present VC3, the first system that allows users to run distributed MapReduce computations in the cloud while keeping their code and data secret, and ensuring the correctness and completeness of their results. VC3 runs on unmodified Hadoop, but crucially keeps Hadoop, the operating system and the hypervisor out of the TCB; thus, confidentiality and integrity are preserved even if these large components are compromised. VC3 relies on SGX processors to isolate memory regions on individual computers, and to dep… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
332
0
3

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 485 publications
(345 citation statements)
references
References 50 publications
0
332
0
3
Order By: Relevance
“…A malicious adversary, in contrast, can modify data in the storage and deviate the worker from its execution path. Such adversaries are considered by other works [20,44]. Although our security model considers only honest-but-curious adversary, we believe that our approach remains applicable against malicious adversary.…”
Section: Computation and Adversary Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…A malicious adversary, in contrast, can modify data in the storage and deviate the worker from its execution path. Such adversaries are considered by other works [20,44]. Although our security model considers only honest-but-curious adversary, we believe that our approach remains applicable against malicious adversary.…”
Section: Computation and Adversary Modelmentioning
confidence: 99%
“…Cipherbase [8] extends TrustedDB's idea to offer a fullfledged SQL database system with data confidentiality. V C3 [44] employs Intel SGX processors to build a general-purposed data analytics system. In particular, it supports MapReduce computations, and protects both data and the code inside SGX's enclaves.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Different forms of memory-based array were deployed for this purpose using external interface of input-output. Schuster et al [32] have presented a technique that secured analytical framework that uses MapReduce framework. Yang et al [33] have introduced the mechanism of attribute-based encryption for addressing the problem of secured access control.…”
Section: Researches Performed On Big Data Securitymentioning
confidence: 99%
“…Estes são implementados para garantir a integridade e privacidade das informações durante todo o processamento, até mesmo em eventuais comprometimentos do sistema operacional ou do hipervisor. A proposta traz implicações diretas ao paradigma de computação nas nuvens (i.e., cloud computing), possibilitando ofertar garantias de integridade e privacidadeàs aplicações em níveis não atingíveis até o momento [2].Enquanto o SGX não estiver amplamente disponível, podese empregar um emulador como o OpenSGX [3] para reproduzir as diversas funcionalidades do SGX. Os recursos oferecidos pelo OpenSGX propiciam, além de uma prévia experiência com um sistema de enclaves, a possibilidade de uma avaliação a priori sobre o custo adicional em processamento imposto pelo SGX.…”
unclassified