Securing User’s Data in HDFS
| ||International Journal of Computer Trends and Technology (IJCTT)|| |
|© - May Issue 2013 by IJCTT Journal|
|Volume-4 Issue-5 |
|Year of Publication : 2013|
|Authors :Hetalben Gajjar|
Hetalben Gajjar "Securing User’s Data in HDFS"International Journal of Computer Trends and Technology (IJCTT),V4(5):1327-1335 May Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: - — With the advent of Technology and increasing growth in volume of data the business are finding the cloud as suitable option to host their data. However, putting the sensitive data on third-party infrastructure poses several security risks to their data utilizing the advantages of the Clouds. Though there are many risks and concerns are involved in cloud computing according many surveys conducted by different organizations the prime concern of clients when opting for cloud solution is the security of their data. Key issue is to protect important data from unauthorized access by adversaries in case the confidentiality of data is broken by internal or external attacks on the cloud hosting those data. HDFS is the file system suitable for storing and processing large volume of data using MapReduce model. When public cloud is based on the Hadoop which uses HDFS to store data, the data are stored in plain text and by default the transport of data is also insecure when client submit the data to storage servers on cloud. Requirement here is design and implement a prototype to secure the HDFS to harness is with security features so that it can be deployed in public cloud to provide storage and computing services. We have proposed and implemented secure HDFS by incorporating Elliptic Curve Integrated Encryption which provides data confidentiality as well as integrity in Hadoop. Experiments were carried out to analyze the performance with respect to other hybrid encryption schemes.
 Amit Sangroya, Saurabh Kumar, Jaideep Dhok, and Vasudeva Varma, “Towards Analyzing Data Security Risks in Cloud Computing Environments “
 Kevin Fogarty,”The Biggest Cloud Computing Security Risk Is Impossible to Eliminate”, http://www.networkcomputing.com/security/the-biggest-cloud-computing-security-ris/240005337?pgno=2
 Tim Mather, Subra Kumaraswamy, Shahed Latif, “Cloud Security and Privacy”-O’Reilly
 Sashank Dara, “Confidentiality without Encryption For Cloud Computational Privacy Chaffing and Winnowing in Computational-Infrastructure-as-Service”
 K.Mukherjee and G.Sahoo “A Secure Cloud Computing”, Recent Trends in Information, Telecommunication and Computing (ITC),International Conference on12-13,March 2010, Page(s): 369 - 371
 Stephen S. Yau and Ho G. An “Protection of Users’ Data Confidentiality in Cloud Computing”,2010 International Conference on Recent Trends in Information, Telecommunication and Computing,ISBN: 978-1-4503-0694-2
 Sushil Jajodia, Witold Litwin and Thomas Schwarz,”Privacy of Data Outsourced to a Cloud for Selected Readers through Client-Side Encryption”,WPES’11, October 17, 2011, Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, pp 171-176, ISBN: 978-1-4503-1002-4
 Krishna P. N. Puttaswamy, Christopher Kruegel, Ben Y. Zhao, “Silverline: Toward Data Confidentiality in Storage-Intensive Cloud Applications”-SOCC’11, October 27–28, 2011 .
Keywords — HDFS, Cloud, Security, ECIES