Enhancing security of Hadoop in a public cloud
Title | Enhancing security of Hadoop in a public cloud |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Xianqing Yu, P. Ning, M. A. Vouk |
Conference Name | Information and Communication Systems (ICICS), 2015 6th International Conference on |
Date Published | April |
Keywords | Access Control, authentication, authentication key, authorisation, cloud computing, compromise resilience, Containers, data access, Data processing, fine-grained access control, Hadoop security mechanism, internal cloud attacks, lack of fine-grained access control, least access privilege, overloaded authentication key, parallel processing, public cloud, resilience, security, security enhancement, SEHadoop, Virtual machine monitors, Vulnerability and Resilience Prediction Models |
Abstract | Hadoop has become increasingly popular as it rapidly processes data in parallel. Cloud computing gives reliability, flexibility, scalability, elasticity and cost saving to cloud users. Deploying Hadoop in cloud can benefit Hadoop users. Our evaluation exhibits that various internal cloud attacks can bypass current Hadoop security mechanisms, and compromised Hadoop components can be used to threaten overall Hadoop. It is urgent to improve compromise resilience, Hadoop can maintain a relative high security level when parts of Hadoop are compromised. Hadoop has two vulnerabilities that can dramatically impact its compromise resilience. The vulnerabilities are the overloaded authentication key, and the lack of fine-grained access control at the data access level. We developed a security enhancement for a public cloud-based Hadoop, named SEHadoop, to improve the compromise resilience through enhancing isolation among Hadoop components and enforcing least access privilege for Hadoop processes. We have implemented the SEHadoop model, and demonstrated that SEHadoop fixes the above vulnerabilities with minimal or no run-time overhead, and effectively resists related attacks. |
URL | https://ieeexplore.ieee.org/document/7103198/ |
DOI | 10.1109/IACS.2015.7103198 |
Citation Key | 7103198 |
Refereed Designation | Refereed |
- internal cloud attacks
- Vulnerability and Resilience Prediction Models
- Virtual machine monitors
- SEHadoop
- security enhancement
- security
- resilience
- public cloud
- parallel processing
- overloaded authentication key
- least access privilege
- lack of fine-grained access control
- Access Control
- Hadoop security mechanism
- fine-grained access control
- Data processing
- data access
- Containers
- compromise resilience
- Cloud Computing
- authorisation
- authentication key
- authentication