A Security Protection Framework for Cloud Computing

被引:15
|
作者
Zhu, Wenzheng [1 ]
Lee, Changhoon [1 ]
机构
[1] Konkuk Univ, Dept Comp Sci & Engn, Seoul, South Korea
来源
关键词
Cloud Computing; Collusive Worker; Malicious Worker; MapReduce; Non-collusive Worker;
D O I
10.3745/JIPS.03.0053
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a new style of computing in which dynamically scalable and reconfigurable resources are provided as a service over the internet. The MapReduce framework is currently the most dominant programming model in cloud computing. It is necessary to protect the integrity of MapReduce data processing services. Malicious workers, who can be divided into collusive workers and non-collusive workers, try to generate bad results in order to attack the cloud computing. So, figuring out how to efficiently detect the malicious workers has been very important, as existing solutions are not effective enough in defeating malicious behavior. In this paper, we propose a security protection framework to detect the malicious workers and ensure computation integrity in the map phase of MapReduce. Our simulation results show that our proposed security protection framework can efficiently detect both collusive and non-collusive workers and guarantee high computation accuracy.
引用
收藏
页码:538 / 547
页数:10
相关论文
共 50 条
  • [1] A Framework for Security Transparency in Cloud Computing
    Ismail, Umar Mukhtar
    Islam, Shareeful
    Ouedraogo, Moussa
    Weippl, Edgar
    [J]. FUTURE INTERNET, 2016, 8 (01)
  • [2] A Framework for Storage Security in Cloud Computing
    Chen, Guoyou
    Miao, Jiajia
    Xie, Feng
    Mao, Handong
    [J]. ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING, PTS 1-3, 2013, 278-280 : 1767 - +
  • [3] A Framework for Improving Security in Cloud Computing
    Surbiryala, Jayachander
    Li, Chunlei
    Rong, Chunming
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2017), 2017, : 260 - 264
  • [4] A Cloud Computing Security Framework Based on Cloud Security Trusted Authority
    Dawoud, Mohammed M.
    Ebrahim, Gamal A.
    Youssef, Sameh A.
    [J]. INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016), 2016, : 133 - 138
  • [5] Security Techniques for Data Protection in Cloud Computing
    Jakimoski, Kire
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (01): : 49 - 56
  • [6] Data Security and Privacy Protection of Cloud Computing
    Dai Xuebing
    Wang Zhaojing
    Zhang Yan
    [J]. ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1570 - +
  • [7] A Data Security Framework for Cloud Computing Adoption: Mozambican Government Cloud Computing
    Vumo, Ambrosio Patricia
    Spillner, Josef
    Koepsell, Stefan
    [J]. PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 720 - 729
  • [8] A Conceptual Security Framework for Cloud Computing Issues
    Aljawarneh, Shadi A.
    Yassein, Muneer Bani
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT INFORMATION TECHNOLOGIES, 2016, 12 (02) : 12 - 24
  • [9] A Framework for Realizing Security on Demand in Cloud Computing
    Jamkhedkar, Pramod
    Szefer, Jakub
    Perez-Botero, Diego
    Zhang, Tianwei
    Triolo, Gina
    Lee, Ruby B.
    [J]. 2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 371 - 378
  • [10] ISGcloud: a Security Governance Framework for Cloud Computing
    Rebollo, Oscar
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    [J]. COMPUTER JOURNAL, 2015, 58 (10): : 2233 - 2254