skip to main content
10.1145/2600176.2600202acmotherconferencesArticle/Chapter ViewAbstractPublication PageshotsosConference Proceedingsconference-collections
research-article

Securing Hadoop in cloud

Published: 08 April 2014 Publication History

Abstract

Hadoop is a map-reduce implementation that rapidly processes data in parallel. Cloud provides reliability, flexibility, scalability, elasticity and cost saving to customers. Moving Hadoop into Cloud can be beneficial to Hadoop users. However, Hadoop has two vulnerabilities that can dramatically impact its security in a Cloud. The vulnerabilities are its overloaded authentication key, and the lack of fine-grained access control at the data access level. We propose and develop a security enhancement for Cloud-based Hadoop.

References

[1]
S. Advisory. Xen pv kernel decompression multiple vulnerabilities. http://secunia.com/advisories/44502/. accessed in November 2013.
[2]
K. Kortchinsky. Cloudburst: A vmware guest to host escape story. http://www.blackhat.com/presentations/bh-usa-09/KORTCHINSKY/BHUSA09-Kortchinsky-Cloudburst-PAPER.pdf. accessed in November 2013.
[3]
J. R. R. Wojtczuk. Xen 0wning trilogy. In Block Hat conference, 2008.
[4]
Secunia. Vulnerability report: Vmware esx server 3.x. http://secunia.com/advisories/product/10757/. accessed in November 2013.
[5]
S. Subashini and V. Kavitha. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1):1--11, 2011.
[6]
D. Zissis and D. Lekkas. Addressing cloud computing security issues. Future Generation Computer Systems, 28(3):583--592, 2012.

Cited By

View all
  • (2022)Design of ChaApache framework for securing Hadoop application in big dataMultimedia Tools and Applications10.1007/s11042-022-13944-382:10(15247-15269)Online publication date: 1-Oct-2022
  • (2015)Security maturity in NoSQL databases - are they secure enough to haul the modern IT applications?2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)10.1109/ICACCI.2015.7275699(739-744)Online publication date: Aug-2015

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
HotSoS '14: Proceedings of the 2014 Symposium and Bootcamp on the Science of Security
April 2014
184 pages
ISBN:9781450329071
DOI:10.1145/2600176
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

  • No. Carolina State Univeresity: North Carolina State University

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 April 2014

Check for updates

Author Tags

  1. Hadoop
  2. cloud
  3. lack of fine-grained access control
  4. overloaded authentication key
  5. security

Qualifiers

  • Research-article

Funding Sources

Conference

HotSoS '14
Sponsor:
  • No. Carolina State Univeresity
HotSoS '14: Symposium and Bootcamp on the Science of Security
April 8 - 9, 2014
North Carolina, Raleigh, USA

Acceptance Rates

HotSoS '14 Paper Acceptance Rate 12 of 21 submissions, 57%;
Overall Acceptance Rate 34 of 60 submissions, 57%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Design of ChaApache framework for securing Hadoop application in big dataMultimedia Tools and Applications10.1007/s11042-022-13944-382:10(15247-15269)Online publication date: 1-Oct-2022
  • (2015)Security maturity in NoSQL databases - are they secure enough to haul the modern IT applications?2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)10.1109/ICACCI.2015.7275699(739-744)Online publication date: Aug-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media