Security Threats to Hadoop: Data Leakage Attacks and Investigation

被引:13
作者
Fu, Xiao [1 ]
Gao, Yun [1 ]
Luo, Bin [1 ]
Du, Xiaojiang [2 ]
Guizani, Mohsen [3 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing, Jiangsu, Peoples R China
[2] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[3] Univ Idaho, ECE Dept, Moscow, ID 83843 USA
来源
IEEE NETWORK | 2017年 / 31卷 / 02期
基金
中国国家自然科学基金;
关键词
Big data;
D O I
10.1109/MNET.2017.1500095NM
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As one of the most popular platforms for processing big data, Hadoop has low costs, convenience, and fast speed. However, it is also a significant target of data leakage attacks, as a growing number of businesses and individuals store and process their private data in it. How to investigate data leakage attacks in Hadoop is an important but long-neglected issue. This article first presents some possible data leakage attacks in Hadoop. Then an investigation framework is proposed and tested based on some simulated cases.
引用
收藏
页码:67 / 71
页数:5
相关论文
共 6 条
[1]   A lightweight live memory forensic approach based on hardware virtualization [J].
Cheng, Yingxin ;
Fu, Xiao ;
Du, Xiaojiang ;
Luo, Bin ;
Guizani, Mohsen .
INFORMATION SCIENCES, 2017, 379 :23-41
[2]  
Cohen Jason., 2013, NETWORK SYSTEM SECUR, P735, DOI DOI 10.1007/978-3-642-38631-2_64
[3]  
Das Devaraj., 2011, ADDING SECURITY APAC
[4]   Data correlation-based analysis methods for automatic memory forensic [J].
Fu, X. ;
Du, X. ;
Luo, B. .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) :4213-4226
[5]  
Ko R. K. L., 2014, CLOUD 2014
[6]  
Park S., 2013, GPC 2013