2014
DOI: 10.1145/2627534.2627556
|View full text |Cite
|
Sign up to set email alerts
|

Attack tolerant architecture for big data file systems

Abstract: Data driven decisions derived from big data have become critical in many application domains, fueling the demand for collection, transportation, storage and processing of massive volumes of data. Such applications have made data a valuable resource that needs to be provided appropriate security. High value associated with big data sets has rendered big data storage systems attractive targets for cyber attackers, whose goal is to compromise the Confidentiality, Integrity and Availability of data and information… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Reference [20] introduces the use of survivable routing and Redundant Array of Inexpensive Disks (RAID) for providing integrity and confidential Big Data storage in network file systems (when combined with broader schemes such as Hadoop). The authors argue that the common security tactics of preventative measures, attack detection, and then recovery are inadequate to secure such large cyber assets.…”
Section: Related Workmentioning
confidence: 99%
“…Reference [20] introduces the use of survivable routing and Redundant Array of Inexpensive Disks (RAID) for providing integrity and confidential Big Data storage in network file systems (when combined with broader schemes such as Hadoop). The authors argue that the common security tactics of preventative measures, attack detection, and then recovery are inadequate to secure such large cyber assets.…”
Section: Related Workmentioning
confidence: 99%
“…The simple redundancy used in SITAR, 75 MAFTIA 76 and SCIT 77 in fact increases the probability of confidentiality and integrity compromises. 80…”
Section: Defending Against Cyber Threatsto Unmanned Autonomous Sysmentioning
confidence: 99%
“…The architecture proposed by Madan and Banik 80 is based on data Fragmentation, Coding, Dispersal and Reassembly (FCDR) of coded fragments across multiple, diverse and non-overlapping systems, and has been shown to be capable of surviving all such intrusions. In this architecture, each word (of word-length w = 8, 16, 32 or 64 bits) of a data block or a packet is fragmented into n fragments, such that each fragment is v -bits long, where v = w / n .…”
Section: Defending Against Cyber Threatsto Unmanned Autonomous Sysmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to large sets of data transferred from one node to the other, data detection is needed to check if there have been modifications to the data being imperative to ensure data integrity. There are two ways in which data might be altered: firstly accidentally, through hardware and transmission errors, and secondly because of a cyber-attack [4]. The aim of the data integrity service is to detect whether data has been altered or not, however it does not consider data restoration to its original state.…”
Section: Introductionmentioning
confidence: 99%