全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Trusted Heartbeat Framework for Cloud Computing

DOI: 10.4236/jis.2016.73007, PP. 103-111

Keywords: Trusted Heartbeat, Cloud Computing, Hadoop Framework, Reputation, Attestation

Full-Text   Cite this paper   Add to My Lib

Abstract:

In cloud computing environment, as the infrastructure not owned by users, it is desirable that its security and integrity must be protected and verified time to time. In Hadoop based scalable computing setup, malfunctioning nodes generate wrong output during the run time. To detect such nodes, we create collaborative network between worker node (i.e. data node of Hadoop) and Master node (i.e. name node of Hadoop) with the help of trusted heartbeat framework (THF). We propose procedures to register node and to alter status of node based on reputation provided by other co-worker nodes.

References

[1]  (2012) What’s Holding Back the Cloud.
http://www.intel.in/content/dam/www/public/us/en/documents/reports/whats-holding-back-the-cloud-peer-research-report2.pdf
[2]  Khan, S.M. and Hamlen, K.W. (2012) Hatman: Intra-Cloud Trust Management for Hadoop. CLOUD’12: Proceedings of 5th International Conference on Cloud Computing, Honolulu, 24-29 June 2012, 494-501.
http://dx.doi.org/10.1109/cloud.2012.64
[3]  Feng, J., Chen, Y., Ku, W. and Liu, P. (2010) Analysis of Integrity Vulnerabilities and a Non-Repudiation Protocol for Cloud Data Storage Platforms. ICPPW’10: Proceedings of 39th International Conference on Parallel Processing Workshops, San Diego, 13-16 September 2010, 1-8.
http://dx.doi.org/10.1109/icppw.2010.42
[4]  Sujitha, G., Varadharajan, M., Rao, Y.V., Sridev, R., Gauthaum, M.K.S., Narayanan, S., Raja, R.S. and Shalinie, S.M. (2013) Improving Security of Parallel Algorithm Using Key Encryption Technique. Information Technology Journal, 12, 2398.
http://dx.doi.org/10.3923/itj.2013.2398.2404
[5]  Contractor, D. and Patel, D. (2012) Trust Management Framework for Attenuation of Application Layer DDoS Attack in Cloud Computing. IFIPTM 2012: 6th IFIP WG 11.11 International Conference on Trust Management, 374, 201-208.
http://dx.doi.org/10.1007/978-3-642-29852-3_14
[6]  Futral, W. and Greene, J. (2013) Introduction to Trust and Intel Trusted Execution Technology. Intel Trusted Execution Technology for Server Platforms, 1-14.
[7]  TPM Software Stack (TSS) Specification, Version 1.2.
http://www.trustedcomputinggroup.org/resources/tcg_software_stack_specification_tss_12_faq
[8]  White, T. (2012) Hadoop: The Definitive Guide. O’Reilly.
[9]  Dean, J. and Ghemawat, S. (2008) MapReduce: Simplified Data Processing on Large Clusters. Communications of the ACM, 51, 107-113.
http://dx.doi.org/10.1145/1327452.1327492
[10]  Borthakur, D. (2007) The Hadoop Distributed File System: Architecture and Design. In hadoop.apache.org, 2007.
http://hadoop.apache.org/docs/r0.18.0/hdfs_design.pdf
[11]  Hoffmann, H., Eastep, J., Santambrogio, M.D., Miller, J.E. and Agarwal, A. (2010) Application Heartbeats for Software Performance and Health. ACM Sigplan Notices, 45, 347-348.
http://dx.doi.org/10.1145/1837853.1693507
[12]  Hanson, J. (2011) Hadoop Heartbeat.
http://www.ibm.com/developerworks/library/wa-introhdfs/
[13]  Krautheim, F.J., Phatak, D.S. and Sherman, A.T. (2010) Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing. TRUST ’10: Proceedings of 3rd International Conference on Trust and Trustworthy Computing, Berlin, 21-23 June 2010, 211-227.
http://dx.doi.org/10.1007/978-3-642-13869-0_14
[14]  Scales, D.J., Nelson, M. and Venkitachalam, G. (2010) The Design of a Practical System for Fault-Tolerant Virtual Machines. ACM SIGOPS Operating Systems Review, 44, 30-39.
http://dx.doi.org/10.1145/1899928.1899932
[15]  Roy, I., Setty, S.T.V., Kilzer, A., Shmatikov, V. and Witchel, E. (2010) Airavat: Security and Privacy for MapReduce. Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI), 10, 297-312.
[16]  Wang, Y. and Wei, J. (2011) VIAF: Verification-Based Integrity Assurance Framework for MapReduce. CLOUD’11: Proceedings of IEEE International Conference on Cloud Computing, Washington DC, 4-9 July 2011, 300-307.
http://dx.doi.org/10.1109/cloud.2011.33
[17]  Zaharia, M., Konwinski, A., Joseph, A.D., Katz, R.H. and Stoica, I. (2008) Improving MapReduce Performance in Heterogeneous Environments. OSDI, 8, 7.
[18]  Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M. and Boneh, D. (2003) Terra: A Virtual Machine-Based Platform for Trusted Computing. SIGOPS Operating System Review, 37, 193-206.
http://dx.doi.org/10.1145/1165389.945464
[19]  Becherer, A. (2010) Hadoop Security Design Just Add Kerberos? Really. iSEC PARTNER, 1-10.
[20]  Devi, S. and Kamaraj, K. (2014) Architecture for Hadoop Distributed File Systems. International Journal of Enhanced Research in Management & Computer Applications, 3, 13-19.
[21]  Ko, S.Y., Hoque, I., Cho, B. and Gupta, I. (2010) Making Cloud Intermediate Data Fault-Tolerant. Proceedings of the 1st ACM Symposium on Cloud Computing, Indianapolis, 2010, 181-192.
http://dx.doi.org/10.1145/1807128.1807160
[22]  Schiffman, J., Moyer, T., Vijayakumar, H., Jaeger, T. and McDaniel, P. (2010) Seeding Clouds with Trust Anchors. Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, Chicago, 2010, 43-46.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133