2012 IEEE 26th International Conference on Advanced Information Networking and Applications 2012
DOI: 10.1109/aina.2012.28
|View full text |Cite
|
Sign up to set email alerts
|

Toward Data Confidentiality via Integrating Hybrid Encryption Schemes and Hadoop Distributed File System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0
1

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(16 citation statements)
references
References 11 publications
0
15
0
1
Order By: Relevance
“…However, as they only consider the use of symmetric encryption, the secret keys used for encrypting have to be shared with the computing nodes. In a similar work, Lin et al [11] show the impact of integrating RSA and pairing-based encryption on HDFS. In their experiments, performance is affected by between 20% and 180%.…”
Section: Related Workmentioning
confidence: 95%
“…However, as they only consider the use of symmetric encryption, the secret keys used for encrypting have to be shared with the computing nodes. In a similar work, Lin et al [11] show the impact of integrating RSA and pairing-based encryption on HDFS. In their experiments, performance is affected by between 20% and 180%.…”
Section: Related Workmentioning
confidence: 95%
“…Apache Accumulo is built on top of Apache Hadoop, Zookeeper, and Thrift. [3] M 8 Apache Sentry [4] S Apache Ranger [4] M Project Rhino [5] S Apache Accumulo [6] S Airavat [92] S Khaled et al [57] Vigiles [109] GuardMR [107] G-Hadoop [135] SecDM [97] M iBigTable [119] Lin et al [64] S 9 10 SAPSC [96] M ClusterBFT [99] S, H 11 Moca et al [76] SecureMR [118] S AccountableMR [123] S VIAF [115] S CCMR [116] M IntegrityMR [117] M VAWS [39] S Hatman [58] S 12 TrustMR [108] S TS-TRV [38] S Log-based [125] S Watermarking based [53,37] S Accountable MapReduce (RBAC) [110] S Airavat. Airavat [92] is a system that provides mandatory access control together with differential privacy for data protection.…”
Section: Authentication Authorization and Access Control Based Apprmentioning
confidence: 99%
“…We assume these storage servers are honest for storage services but malicious for data confidentiality. This confidentiality requirement is essential when storage servers are owned by a cloud infrastructure provider (public cloud) and data are owned by other parties [11]. Risk coming with opportunity and the problem of data security in cloud computing become bottleneck of cloud computing [12].…”
Section: Related Workmentioning
confidence: 99%