skip to main content
10.1145/2600176.2600202acmotherconferencesArticle/Chapter ViewAbstractPublication PageshotsosConference Proceedingsconference-collections
research-article

Securing Hadoop in cloud

Authors Info & Claims
Published:08 April 2014Publication History

ABSTRACT

Hadoop is a map-reduce implementation that rapidly processes data in parallel. Cloud provides reliability, flexibility, scalability, elasticity and cost saving to customers. Moving Hadoop into Cloud can be beneficial to Hadoop users. However, Hadoop has two vulnerabilities that can dramatically impact its security in a Cloud. The vulnerabilities are its overloaded authentication key, and the lack of fine-grained access control at the data access level. We propose and develop a security enhancement for Cloud-based Hadoop.

References

  1. S. Advisory. Xen pv kernel decompression multiple vulnerabilities. http://secunia.com/advisories/44502/. accessed in November 2013.Google ScholarGoogle Scholar
  2. K. Kortchinsky. Cloudburst: A vmware guest to host escape story. http://www.blackhat.com/presentations/bh-usa-09/KORTCHINSKY/BHUSA09-Kortchinsky-Cloudburst-PAPER.pdf. accessed in November 2013.Google ScholarGoogle Scholar
  3. J. R. R. Wojtczuk. Xen 0wning trilogy. In Block Hat conference, 2008.Google ScholarGoogle Scholar
  4. Secunia. Vulnerability report: Vmware esx server 3.x. http://secunia.com/advisories/product/10757/. accessed in November 2013.Google ScholarGoogle Scholar
  5. S. Subashini and V. Kavitha. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1):1--11, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Zissis and D. Lekkas. Addressing cloud computing security issues. Future Generation Computer Systems, 28(3):583--592, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Securing Hadoop in cloud

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          HotSoS '14: Proceedings of the 2014 Symposium and Bootcamp on the Science of Security
          April 2014
          184 pages
          ISBN:9781450329071
          DOI:10.1145/2600176

          Copyright © 2014 Owner/Author

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 8 April 2014

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          HotSoS '14 Paper Acceptance Rate12of21submissions,57%Overall Acceptance Rate34of60submissions,57%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader