LAST-HDFS: Location-Aware Storage Technique for Hadoop Distributed File System

被引:0
作者
Liao, Cong [1 ]
Squicciarini, Anna [1 ]
Lin, Dan [2 ]
机构
[1] Penn State Univ, Coll Informat Sci & Technol, University Pk, PA 16802 USA
[2] Missouri Univ Sci & Technol, Dept Comp Sci, Rolla, MO USA
来源
PROCEEDINGS OF 2016 IEEE 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD) | 2016年
关键词
Location-Awareness; MapReduce; HDFS;
D O I
10.1109/CLOUD.2016.91
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Enabled by the state-of-the-art cloud computing technologies, cloud storage has gained increasing popularity in recent years. Despite of the benefit of flexible and reliable data access offered by such services, users have to bear with the fact of not actually knowing the whereabouts of their data. The lack of knowledge and control of the physical locations of data could raise legal and regulatory issues, especially for certain sensitive data that are governed by laws to remain within certain geographic boundaries and borders. In this paper, we study the problem of data placement control within distributed file systems supporting cloud storage. Particularly, we consider the open source Hadoop file system (HDFS) as the underlying architecture, and propose a location-aware cloud storage system, named LAST-HDFS, to support and enforce location-aware storage in HDFS-based clusters. In addition, it also includes a monitoring system deployed at individual hosts to oversee and detect potential data placement violations due to the existence of malicious datanodes. We carried out an extensive experimental evaluation in a real cloud environment that demonstrates the effectiveness and efficiency of our proposed system.
引用
收藏
页码:662 / 669
页数:8
相关论文
共 18 条
[1]  
Albeshri A., 2012, Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P506, DOI 10.1109/ICDCSW.2012.50
[2]   Enhanced GeoProof: improved geographic assurance for data in the cloud [J].
Albeshri, Aiiad ;
Boyd, Colin ;
Nieto, Juan Gonzalez .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (02) :191-198
[3]  
[Anonymous], 2008, P 4 INT C SEC PRIV C, DOI 10.1145/1460877.1460889
[4]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[5]   Remote Data Checking Using Provable Data Possession [J].
Ateniese, Giuseppe ;
Burns, Randal ;
Curtmola, Reza ;
Herring, Joseph ;
Khan, Osama ;
Kissner, Lea ;
Peterson, Zachary ;
Song, Dawn .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
[6]  
Barsoum A. F., 2011, IACR Cryptol. ePrint Arch., V2011, P447
[7]  
Benson K, 2011, PROCEEDINGS OF THE 3RD ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'11), P73
[8]  
Bowers KD, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P187
[9]   MR-PDP: Multiple-Replica Provable Data Possession [J].
Curtmola, Reza ;
Khan, Osama ;
Burns, Randal ;
Ateniese, Giuseppe .
28TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2008, :411-+
[10]  
Geist M., LOCATION MATTERS CLO