Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security 2015
DOI: 10.1145/2810103.2813695
|View full text |Cite
|
Sign up to set email alerts
|

Observing and Preventing Leakage in MapReduce

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
51
0
1

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 57 publications
(53 citation statements)
references
References 20 publications
1
51
0
1
Order By: Relevance
“…In particular, for the types of data center analytics that would be performed by the ESA analyzer, there have been several proposals in the recent literature [20,57,67]. There has been relatively less proposed for protecting the client side, e.g., the encoders for ESA.…”
Section: Higher Assurance By Using Trustworthy Hardwarementioning
confidence: 99%
“…In particular, for the types of data center analytics that would be performed by the ESA analyzer, there have been several proposals in the recent literature [20,57,67]. There has been relatively less proposed for protecting the client side, e.g., the encoders for ESA.…”
Section: Higher Assurance By Using Trustworthy Hardwarementioning
confidence: 99%
“…Nevertheless, hardware-based solutions rely on the fact that the users must trust the hardware producers (e.g., Intel) who manage the master keys that are involved in some important protocols. Furthermore, even in the presence of trusted hardware, side-channel attacks based on memory and network access patterns have proven to be effective in many scenarios [29,37,47], which shows the immaturity of deploying such systems -at their current stage -to address critical challenges such as secure data sharing. Instead, UnLynx, is based on well-established cryptographic techniques that rely on a standard security model, and it provides a set of critical security features that none of previous contributions have achieved, such as proof of computation and decentralized trust.…”
Section: Related Workmentioning
confidence: 99%
“…However, these systems do not meet our security definition; i.e., they offer a weaker security guarantee. Recent systems [20,37] adopt a similar approach to this paper's to support privacy-preserving computation. However, they focus on the MapReduce computation model, and specifically use scrambling to ensure security for the shuffling phase (which is essentially a sorting algorithm).…”
Section: Related Workmentioning
confidence: 99%
“…While these works are ideal for applications that make few accesses in a large dataset, they may not necessarily be so for other applications that potentially require accessing the entire dataset multiple times, for example data management tasks. For such applications, customized algorithms are likely to perform better (e.g., [37]). StC offers a simple way for implementing those algorithms.…”
Section: Secure Computation By Data-obliviousmentioning
confidence: 99%