Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
An Identity Based Encryption Scheme Based on Quadratic Residues
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Fuzzy keyword search over encrypted data in cloud computing
INFOCOM'10 Proceedings of the 29th conference on Information communications
Security and Privacy Challenges in Cloud Computing Environments
IEEE Security and Privacy
CLOUDCOM '10 Proceedings of the 2010 IEEE Second International Conference on Cloud Computing Technology and Science
Access Security on Cloud Computing Implemented in Hadoop System
ICGEC '11 Proceedings of the 2011 Fifth International Conference on Genetic and Evolutionary Computing
Generic security-amplifying methods of ordinary digital signatures
Information Sciences: an International Journal
Hatman: Intra-cloud Trust Management for Hadoop
CLOUD '12 Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing
Hi-index | 0.00 |
Hadoop is a distributed big data storage and processing framework hugely adopted in different sectors from online media, education, government and social media to handle the enormous growth of information in their respective domains. However, the core architecture of the solution is based on a trusted cluster. It lacks native methods for protecting sensitive data that cross over enterprises and are exposed or accessed illegally. In the paper, this work aims to construct a secure and trusted scheme for Hadoop cluster STSHC. Firstly, we review the architecture of Hadoop cluster, and discuss the security risks and security requirements. And then we propose a secure and trusted architecture framework for Hadoop cluster with trusted computing base TCB. Moreover, some protocols, which are the key management, the node trusted management protocol, the client access management protocol, the node access management protocol and job executing management protocol, are designed in detail. Finally, the security analysis shows that the scheme can efficiently meet the security requirement of Hadoop cluster.