Research Article | Open Access | Download PDF
Volume 4 | Issue 5 | Year 2013 | Article Id. IJCTT-V4I5P71 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I5P71
Securing User’s Data in HDFS
Hetalben Gajjar
Citation :
Hetalben Gajjar, "Securing User’s Data in HDFS," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 5, pp. 1327-1335, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I5P71
Abstract
With the advent of Technology and increasing growth in volume of data the business are finding the cloud as suitable option to host their data. However, putting the sensitive data on third-party infrastructure poses several security risks to their data utilizing the advantages of the Clouds. Though there are many risks and concerns are involved in cloud computing according many surveys conducted by different organizations the prime concern of clients when opting for cloud solution is the security of their data. Key issue is to protect important data from unauthorized access by adversaries in case the confidentiality of data is broken by internal or external attacks on the cloud hosting those data. HDFS is the file system suitable for storing and processing large volume of data using MapReduce model. When public cloud is based on the Hadoop which uses HDFS to store data, the data are stored in plain text and by default the transport of data is also insecure when client submit the data to storage servers on cloud. Requirement here is design and implement a prototype to secure the HDFS to harness is with security features so that it can be deployed in public cloud to provide storage and computing services. We have proposed and implemented secure HDFS by incorporating Elliptic Curve Integrated Encryption which provides data confidentiality as well as integrity in Hadoop. Experiments were carried out to analyze the performance with respect to other hybrid encryption schemes.
Keywords
HDFS, Cloud, Security, ECIES.
References
[1] Amit Sangroya, Saurabh Kumar, Jaideep Dhok, and Vasudeva Varma, “Towards Analyzing Data Security Risks in Cloud Computing Environments “
[2] Kevin Fogarty,”The Biggest Cloud Computing Security Risk Is Impossible to Eliminate”, http://www.networkcomputing.com/security/the-biggest-cloud-computing-security-ris/240005337?pgno=2
[3] Tim Mather, Subra Kumaraswamy, Shahed Latif, “Cloud Security and Privacy”-O’Reilly
[4] Sashank Dara, “Confidentiality without Encryption For Cloud Computational Privacy Chaffing and Winnowing in Computational-Infrastructure-as-Service”
[5] K.Mukherjee and G.Sahoo “A Secure Cloud Computing”, Recent Trends in Information, Telecommunication and Computing (ITC),International Conference on12-13,March 2010, Page(s): 369 - 371
[6] Stephen S. Yau and Ho G. An “Protection of Users’ Data Confidentiality in Cloud Computing”,2010 International Conference on Recent Trends in Information, Telecommunication and Computing,ISBN: 978-1-4503-0694-2
[7] Sushil Jajodia, Witold Litwin and Thomas Schwarz,”Privacy of Data Outsourced to a Cloud for Selected Readers through Client-Side Encryption”,WPES’11, October 17, 2011, Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, pp 171-176, ISBN: 978-1-4503-1002-4
[8] Krishna P. N. Puttaswamy, Christopher Kruegel, Ben Y. Zhao, “Silverline: Toward Data Confidentiality in Storage-Intensive Cloud Applications”-SOCC’11, October 27–28, 2011 .
[9] Dai Yuefa, Wu Bo, Gu Yaqiang, Zhang Quan, Tang Chaojing, “Data Security Model for Cloud Computing”, ISBN 978-9525726-06-0 Proceedings of the 2009 International Workshop on Information Security and Application (IWISA 2009) Qingdao, China, November 21-22, 2009
[10] Ethan Miller Darrell Long William Freeman and Benjamin Reed,”Strong Security for Distributed File Systems”, 34 – 40, Performance, Computing, and Communications, 2001. IEEE International Conference Date of Conference: Apr 2001
[11] Fangyong Hou1, Dawu Gu2, Nong Xiao1, Yuhua Tang1, “Secure Remote Storage through Authenticated Encryption, International Conference on Networking, Architecture, and Storage”, IEEE International Conference on Networking, Architecture, and Storage, ISBN-978-0-7695-3187-8,2008 IEEE
[12] Konstantin Shvachko, Hairong Kuang, Sanjay Radia and Robert Chansler,”The Hadoop Distributed File System”, Proceedings of the 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), p.1-10, May 03-07, 2010
[13] Qingi Shen,Dandan Wang and Min Long,”SAPSC: Security Architecture of Private Storage Cloud Based on HDFS”, waina, pp.1292-1297, 2012 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
[14] Joppe W. Bos, Marcelo E. Kaihara and Thorsten Kleinjung, “On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography”, IACR Cryptology ePrint Archive 2009: 389, 2009
[15] Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, Sheueling Chang Shantz “Comparing Elliptic Curve ryptography and RSA on 8-bit CPUs”, 6th International Workshop Cambridge on Cryptographic Hardware and Embedded Systems, ISBN 3-540-22666-4, Aug 2004.
[16] Pavel Bzoch and Jiri Safarik “Security and Relaibility of Distributed File Systems”, Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), 2011 IEEE 6th International Conference,15-17 Sept.2011,Volume: 2 pp 764 - 769
[17] http://hadoop.apache.org/core/docs/current/hdfs_design.html
[18] Owen O’Malley, Kan Zhang, Sanjay Radia, Ram Marti,and Christopher Harrell. “Hadoop security design”. https://issues.apache.org/jira/secure/attachment/12428537/ securitydesign.pdf, October 2009.
[19] Hsiao-Ying Lin, Shiuan-Tzuo Shen, Wen-Guey Tzeng, Bao-Shuh P. Lin, “Towards Data Confidentiality via Integrating Hybrid Encryption Schemes and Hadoop Distributed File System”,March 2012 26th IEEE International Conference on Advanced Information Networking and Applications, 978-1-4673-0714-7,p 740-741
[20] V. Gayoso Martínez, L. Hernández Encinas, C. Sánchez Ávila, “A Survey of Elliptic Curve Integrated Encryption System”, Journal Of Computer Science And Engineering, Volume 2, Issue 2, AUGUST 2010
[21] Brian Warner,Zooko Wilcox-O'Hearn and Rob Kinninmont,”Tahoe: A Secure Distributed Filesystem”,Mar 2008, https://tahoe-lafs.org/~warner/pycon-tahoe.html
[22] http://bigdata.wordpress.com/2010/03/22/security-in-hadooppart-1/
[23] Samuel Sheinin,”NFS Security”,Global Information Assurance Certification Paper, SANS Institute 2000 – 2002
[24] http://www.coda.cs.cmu.edu/doc/html/sec-1.html
[25] John.H.Howard,”An overview of the Andrew File System”,CMTITC-88-062
[26] Tran Doan Thanh1, Subaji Mohan1, Eunmi Choi, SangBum Kim2 and Pilsung Kim,”A Taxonomy and Survey on Distributed File Systems”, Fourth International Conference on Networked Computing and Advanced Information Management, 2008, 9780-7695-3322-3/08