Cargando…

A Novel Hadoop Security Model for Addressing Malicious Collusive Workers

With the daily increase of data production and collection, Hadoop is a platform for processing big data on a distributed system. A master node globally manages running jobs, whereas worker nodes process partitions of the data locally. Hadoop uses MapReduce as an effective computing model. However, H...

Descripción completa

Detalles Bibliográficos
Autores principales: Sauber, Amr M., Awad, Ahmed, Shawish, Amr F., El-Kafrawy, Passent M.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8285196/
https://www.ncbi.nlm.nih.gov/pubmed/34306054
http://dx.doi.org/10.1155/2021/5753948
_version_ 1783723509126529024
author Sauber, Amr M.
Awad, Ahmed
Shawish, Amr F.
El-Kafrawy, Passent M.
author_facet Sauber, Amr M.
Awad, Ahmed
Shawish, Amr F.
El-Kafrawy, Passent M.
author_sort Sauber, Amr M.
collection PubMed
description With the daily increase of data production and collection, Hadoop is a platform for processing big data on a distributed system. A master node globally manages running jobs, whereas worker nodes process partitions of the data locally. Hadoop uses MapReduce as an effective computing model. However, Hadoop experiences a high level of security vulnerability over hybrid and public clouds. Specially, several workers can fake results without actually processing their portions of the data. Several redundancy-based approaches have been proposed to counteract this risk. A replication mechanism is used to duplicate all or some of the tasks over multiple workers (nodes). A drawback of such approaches is that they generate a high overhead over the cluster. Additionally, malicious workers can behave well for a long period of time and attack later. This paper presents a novel model to enhance the security of the cloud environment against untrusted workers. A new component called malicious workers' trap (MWT) is developed to run on the master node to detect malicious (noncollusive and collusive) workers as they convert and attack the system. An implementation to test the proposed model and to analyze the performance of the system shows that the proposed model can accurately detect malicious workers with minor processing overhead compared to vanilla MapReduce and Verifiable MapReduce (V-MR) model [1]. In addition, MWT maintains a balance between the security and usability of the Hadoop cluster.
format Online
Article
Text
id pubmed-8285196
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher Hindawi
record_format MEDLINE/PubMed
spelling pubmed-82851962021-07-22 A Novel Hadoop Security Model for Addressing Malicious Collusive Workers Sauber, Amr M. Awad, Ahmed Shawish, Amr F. El-Kafrawy, Passent M. Comput Intell Neurosci Research Article With the daily increase of data production and collection, Hadoop is a platform for processing big data on a distributed system. A master node globally manages running jobs, whereas worker nodes process partitions of the data locally. Hadoop uses MapReduce as an effective computing model. However, Hadoop experiences a high level of security vulnerability over hybrid and public clouds. Specially, several workers can fake results without actually processing their portions of the data. Several redundancy-based approaches have been proposed to counteract this risk. A replication mechanism is used to duplicate all or some of the tasks over multiple workers (nodes). A drawback of such approaches is that they generate a high overhead over the cluster. Additionally, malicious workers can behave well for a long period of time and attack later. This paper presents a novel model to enhance the security of the cloud environment against untrusted workers. A new component called malicious workers' trap (MWT) is developed to run on the master node to detect malicious (noncollusive and collusive) workers as they convert and attack the system. An implementation to test the proposed model and to analyze the performance of the system shows that the proposed model can accurately detect malicious workers with minor processing overhead compared to vanilla MapReduce and Verifiable MapReduce (V-MR) model [1]. In addition, MWT maintains a balance between the security and usability of the Hadoop cluster. Hindawi 2021-07-08 /pmc/articles/PMC8285196/ /pubmed/34306054 http://dx.doi.org/10.1155/2021/5753948 Text en Copyright © 2021 Amr M. Sauber et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Sauber, Amr M.
Awad, Ahmed
Shawish, Amr F.
El-Kafrawy, Passent M.
A Novel Hadoop Security Model for Addressing Malicious Collusive Workers
title A Novel Hadoop Security Model for Addressing Malicious Collusive Workers
title_full A Novel Hadoop Security Model for Addressing Malicious Collusive Workers
title_fullStr A Novel Hadoop Security Model for Addressing Malicious Collusive Workers
title_full_unstemmed A Novel Hadoop Security Model for Addressing Malicious Collusive Workers
title_short A Novel Hadoop Security Model for Addressing Malicious Collusive Workers
title_sort novel hadoop security model for addressing malicious collusive workers
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8285196/
https://www.ncbi.nlm.nih.gov/pubmed/34306054
http://dx.doi.org/10.1155/2021/5753948
work_keys_str_mv AT sauberamrm anovelhadoopsecuritymodelforaddressingmaliciouscollusiveworkers
AT awadahmed anovelhadoopsecuritymodelforaddressingmaliciouscollusiveworkers
AT shawishamrf anovelhadoopsecuritymodelforaddressingmaliciouscollusiveworkers
AT elkafrawypassentm anovelhadoopsecuritymodelforaddressingmaliciouscollusiveworkers
AT sauberamrm novelhadoopsecuritymodelforaddressingmaliciouscollusiveworkers
AT awadahmed novelhadoopsecuritymodelforaddressingmaliciouscollusiveworkers
AT shawishamrf novelhadoopsecuritymodelforaddressingmaliciouscollusiveworkers
AT elkafrawypassentm novelhadoopsecuritymodelforaddressingmaliciouscollusiveworkers