Practical Verifiable Computation-A MapReduce Case Study

被引:6
|
作者
Wang, Yongzhi [1 ,2 ]
Shen, Yulong [1 ]
Jiang, Xiaohong [1 ,3 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Shaanxi, Peoples R China
[2] Henan Univ Technol, Minist Educ, Key Lab Grain Informat Proc & Control, Zhengzhou 450066, Henan, Peoples R China
[3] Future Univ Hakodate, Sch Syst Informat Sci, Hakodate, Hokkaido 0418655, Japan
基金
中国国家自然科学基金;
关键词
Runtime integrity; remote verification; cloud computing; mapreduce;
D O I
10.1109/TIFS.2017.2787993
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Public cloud vendors have been offering a variety of big data computing services on their clouds. However, runtime integrity is one of the major security concerns that hinder the wide adoption of those services. In this paper, we focus on MapReduce, a popular big data computing framework, and propose the runtime integrity audition (RIA), a solution that remotely verifies the runtime integrity of MapReduce applications. RIA records the runtime variable values of the MapReduce application on the public cloud and checks those values against the application's code on the private cloud. By doing so, RIA protects the runtime integrity of MapReduce applications. Based on the idea of RIA, we developed a prototype system, called MR Auditor, and tested its applicability and performance with several Hadoop applications. Our experimental results showed that MR Auditor is a general tool that can efficiently audit the runtime integrity of all the MapReduce applications that we tested. In addition, MR Auditor incurs a moderate performance overhead. For example, when verifying the Word Count application, a proper parameter setting of MR Auditor incurs 1% of extra execution time on the public cloud and 14% of extra execution time on the private cloud.
引用
收藏
页码:1376 / 1391
页数:16
相关论文
共 50 条
  • [21] Efficiently Verifiable Computation on Encrypted Data
    Fiore, Dario
    Gennaro, Rosario
    Pastro, Valerio
    [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 844 - 855
  • [22] Multi-matrix verifiable computation
    Yan He
    Liang Feng Zhang
    [J]. Cluster Computing, 2021, 24 : 475 - 488
  • [23] Verifiable Local Computation on Distributed Data
    Zhang, Liang Feng
    Safavi-Naini, Reihaneh
    Liu, Xiao Wei
    [J]. SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 3 - 10
  • [24] Batch verifiable computation of outsourced functions
    Zhang, Liang Feng
    Safavi-Naini, Reihaneh
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2015, 77 (2-3) : 563 - 585
  • [25] Multi-matrix verifiable computation
    He, Yan
    Zhang, Liang Feng
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (01): : 475 - 488
  • [26] Verifiable Computation on Outsourced Encrypted Data
    Lai, Junzuo
    Deng, Robert H.
    Pang, Hweehwa
    Weng, Jian
    [J]. COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 273 - 291
  • [27] Efficient Proof Composition for Verifiable Computation
    Keuffer, Julien
    Molva, Refik
    Chabanne, Herve
    [J]. COMPUTER SECURITY (ESORICS 2018), PT I, 2018, 11098 : 152 - 171
  • [28] Verifiable Coded Computation of Multiple Functions
    Kim, Wilton
    Kruglik, Stanislav
    Kiah, Han Mao
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8009 - 8022
  • [29] Verifiable Outsourced Computation with Full Delegation
    Wang, Qiang
    Zhou, Fucai
    Peng, Su
    Xu, Zifeng
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 270 - 287
  • [30] Revocation in Publicly Verifiable Outsourced Computation
    Alderman, James
    Janson, Christian
    Cid, Carlos
    Crampton, Jason
    [J]. INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 51 - 71