TrustedMR: A Trusted MapReduce System based on Tamper Resistance Hardware - Archive ouverte HAL Access content directly
Preprints, Working Papers, ... Year :

TrustedMR: A Trusted MapReduce System based on Tamper Resistance Hardware

(1, 2) , (2, 3) , (2, 1)
1
2
3

Abstract

With scalability, fault tolerance, ease of programming, and flexibility , MapReduce has gained many attractions for large-scale data processing. However, despite its merits, MapReduce does not focus on the problem of data privacy, especially when processing sensitive data, such as personal data, on un-trusted infrastructure. In this paper, we investigate a scenario based on the Trusted Cells paradigm : a user stores his personal data in a local secure data store and wants to process this data using MapReduce on a third party infrastructure , on which secure devices are also connected. The main contribution of the paper is to present TrustedMR, a trusted MapReduce system with high security assurance provided by tamper-resistant hardware, to enforce the security aspect of the MapReduce. Thanks to TrustedMR, encrypted data can then be processed by untrusted computing nodes without any modification to the existing MapReduce framework and code. Our evaluation shows that the performance overhead of TrustedMR is limited to few percents, compared to an original MapReduce framework that handles cleartexts.
Fichier principal
Vignette du fichier
cr.pdf (1.53 Mo) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01185484 , version 1 (27-08-2015)
hal-01185484 , version 2 (01-09-2015)

Identifiers

  • HAL Id : hal-01185484 , version 2

Cite

Quoc-Cuong To, Benjamin Nguyen, Philippe Pucheral. TrustedMR: A Trusted MapReduce System based on Tamper Resistance Hardware. 2015. ⟨hal-01185484v2⟩
193 View
309 Download

Share

Gmail Facebook Twitter LinkedIn More