SHIYF: A Secured and High-Integrity YARN Framework

被引:0
|
作者
Deng, Junyi [1 ]
Liu, Yanheng [1 ,2 ]
Wang, Jian [1 ,2 ]
Li, Shujing [1 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun 130012, Jilin, Peoples R China
[2] Jilin Univ, Minist Educ, Key Lab Symbol Computat & Knowledge Engn, Changchun 130012, Jilin, Peoples R China
关键词
cloud computing; Hadoop; MapReduce; YARN; speculative execution; security; integrity; MAPREDUCE;
D O I
10.3390/electronics8050548
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is becoming a powerful parallel data processing method, and it can be adopted by many network service providers to build a service framework. Although cloud computing is able to efficiently process a large amount of data, it can be attacked easily due to its massively distributed cluster nodes. In this paper, we propose a secure and high-integrity YARN framework (SHIYF), which establishes a close relationship between speculative execution and the security of Yet Another Resource Negotiator (YARN, MapReduce 2.0). SHIYF computes and compares the MD5 hashes of the intermediate and final results in the MapReduce process by launching the speculative executions in a certain ratio, which is able to find actual and potentially malicious nodes in the Hadoop cluster. The prototype of SHIYF is implemented based on Hadoop 2.8.0. In this paper, theoretical derivations and experiments show that SHIYF not only guarantees the security and high integrity of the MapReduce process but also successfully locates the malicious nodes and the potential malicious ones in Hadoop, while increasing overhead slightly. Furthermore, the malicious node detection ratio is more than 87%.
引用
收藏
页数:29
相关论文
共 50 条
  • [1] Generic Process Framework for Developing High-Integrity Software
    Biglari, Binazir
    Ramsin, Raman
    [J]. NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2012, 246 : 73 - 88
  • [2] High-integrity seal
    Ashley, S
    [J]. MECHANICAL ENGINEERING, 1995, 117 (11): : 40 - 40
  • [3] Affordable High-Integrity Controls
    Lenz, J.
    Greer, A.
    Fritz, N.
    Schick, T.
    Bak, S.
    [J]. CONFERENCE: AGRICULTURAL ENGINEERING: LAND-TECHNIK 2010 - PARTNERSCHAFTEN FUR NEUR INNOVATIONSPOTENZIALE, 2010, : 219 - 229
  • [4] Cognitive Design Framework for Multidisciplinary Development of High-Integrity Avionics Systems
    Insaurralde, Carlos C.
    [J]. 2018 IEEE AEROSPACE CONFERENCE, 2018,
  • [5] ANALYZING HIGH-INTEGRITY SYSTEMS
    CLARK, JA
    MCDERMID, JA
    BURNS, A
    [J]. COMPUTING & CONTROL ENGINEERING JOURNAL, 1994, 5 (01): : 18 - 23
  • [6] High-Integrity Wellbore Surveying
    Ekseth, Roger
    Torkildsen, Torgeir
    Brooks, Andrew
    Weston, John
    Nyrnes, Erik
    Wilson, Harry
    Kovalenko, Kazimir
    [J]. SPE DRILLING & COMPLETION, 2010, 25 (04) : 438 - 447
  • [7] High-integrity, metallic seal
    不详
    [J]. AIRCRAFT ENGINEERING AND AEROSPACE TECHNOLOGY, 2002, 74 (06): : 583 - 583
  • [8] High-Integrity Runtime Verification
    Goodloe, Alwyn E.
    Havelund, Klaus
    [J]. COMPUTER, 2024, 57 (04) : 37 - 45
  • [9] STANDARDS FOR HIGH-INTEGRITY SOFTWARE
    WALLACE, DR
    KUHN, DR
    IPPOLITO, LM
    BELTRACCHI, L
    [J]. NUCLEAR SAFETY, 1994, 35 (01): : 86 - 97
  • [10] ADA tasking for high-integrity systems
    Humphris, D
    Dobbing, B
    [J]. LESSONS IN SYSTEM SAFETY, 2000, : 113 - 133