A Solution For Privacy Protection In MapReduce

被引:7
|
作者
Quang Tran [1 ]
Sato, Hiroyuki [1 ]
机构
[1] Univ Tokyo, Grad Sch Engn, Tokyo 1138654, Japan
来源
2012 IEEE 36TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC) | 2012年
关键词
Cloud Computing; Privacy; Security; Randomization; Static Code Analysis;
D O I
10.1109/COMPSAC.2012.70
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Recently, the development of storage and networking technology have made processing tremendous data become real. As a result, the demand of discovering knowledge from the bigdata by using tools such as statistical analysis and data mining become higher. Using MapReduce a software framework introduced by Google in 2004 to implement computations on clusters of commodity computers is an economical solution. However, malicious MapReduce framework or source codes can leak the sensitive data through computation process. Giving user the least privilege on MapReduce-based system can solve the problem. Therefore, in our research, we propose a MapReduce-based computational system limiting the access to system resource by using RBAC and TE. Moreover, noise were added to the output of the Reduce to ensure the computational result can not signal the presence of a sensitive data. Our prototype implementation demonstrates the efficiency of preserving privacy on several cases.
引用
收藏
页码:515 / 520
页数:6
相关论文
共 50 条
  • [31] The Security and Privacy Protection of Hospital Information System
    Wang, Na
    Wang, Jin-guo
    3RD INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE AND DEVELOPMENT (ICSSD 2017), 2017, : 212 - 214
  • [32] Accountability as a Way Forward for Privacy Protection in the Cloud
    Pearson, Siani
    Charlesworth, Andrew
    CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 131 - +
  • [33] A Survey on Privacy Protection of Blockchain: The Technology and Application
    Wang, Dan
    Zhao, Jindong
    Wang, Yingjie
    IEEE ACCESS, 2020, 8 : 108766 - 108781
  • [34] Privacy protection scheme for mobile social network
    Safi, Seyyed Mohammad
    Movaghar, Ali
    Ghorbani, Mohammad
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (07) : 4062 - 4074
  • [35] Privacy protection by typing in ubiquitous computing systems
    Siewe, Francois
    Yang, Hongji
    JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 120 : 133 - 153
  • [36] Citizens' perceptions of data protection and privacy in Europe
    Hallinan, Dara
    Frieclewald, Michael
    McCarthy, Paul
    COMPUTER LAW & SECURITY REVIEW, 2012, 28 (03) : 263 - 272
  • [37] Photo Privacy Protection on Online Social Networks
    Li, Yifang
    COMPANION OF THE 2018 ACM CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING (CSCW'18), 2018, : 117 - 120
  • [38] Body scanners versus privacy and data protection
    Mironenko, Olga
    COMPUTER LAW & SECURITY REVIEW, 2011, 27 (03) : 232 - 244
  • [39] Privacy and anonymity protection with blind threshold signatures
    Juang, WS
    Lei, CL
    Liaw, HT
    INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE, 2002, 7 (02) : 143 - 157
  • [40] Injunctions and the Protection of Privacy
    Eady, David
    CIVIL JUSTICE QUARTERLY, 2010, 29 (04): : 411 - 427