메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1082-1087

Accountable MapReduce in cloud computing

Author keywords

[No Author keywords available]

Indexed keywords

MALICIOUS NODES; MAP-REDUCE; REAL TIME;

EID: 79960584361     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOMW.2011.5928788     Document Type: Conference Paper
Times cited : (40)

References (93)
  • 2
    • 79960571912 scopus 로고    scopus 로고
    • http://hadoop.apache.org/
  • 3
    • 37549003336 scopus 로고    scopus 로고
    • MapReduce: Simplified data processing on large clusters
    • J. Dean and S. Ghemawat, "MapReduce: simplified data processing on large clusters," Commun. ACM, vol. 51, 2008, pp. 107-113.
    • (2008) Commun. ACM , vol.51 , pp. 107-113
    • Dean, J.1    Ghemawat, S.2
  • 4
    • 41149122088 scopus 로고    scopus 로고
    • The role of accountability in dependable distributed systems
    • A.R. Yumerefendi and J.S. Chase, "The role of accountability in dependable distributed systems," Proc. of HotDep, 2005.
    • (2005) Proc. of HotDep
    • Yumerefendi, A.R.1    Chase, J.S.2
  • 6
    • 0003969633 scopus 로고
    • Department of Defense. Technical Report 5200.28-STD, Department of Defense
    • Department of Defense. Trusted Computer System Evaluation Criteria. Technical Report 5200.28-STD, Department of Defense, 1985.
    • (1985) Trusted Computer System Evaluation Criteria.
  • 7
    • 70350060199 scopus 로고    scopus 로고
    • Flow-net methodology for accountability in wireless networks
    • Sept./Oct.
    • Y. Xiao, "Flow-Net Methodology for Accountability in Wireless Networks," IEEE Network, Vol. 23, No. 5, Sept./Oct. 2009, pp. 30-37.
    • (2009) IEEE Network , vol.23 , Issue.5 , pp. 30-37
    • Xiao, Y.1
  • 11
    • 79960569161 scopus 로고    scopus 로고
    • J. Schlesinger, "Cloud Security in Map/Reduce," 2009. http://www.defcon.org/images/defcon-17/dc-17-presentations/defcon-17-jas on-schlesinger-cloud-security.pdf
    • (2009) Cloud Security in Map/Reduce
    • Schlesinger, J.1
  • 15
    • 63649149613 scopus 로고    scopus 로고
    • Self-service, prorated super computing fun!
    • D. Gottfrid, "Self-service, Prorated Super Computing Fun!". The New York Times. http://open.blogs.nytimes.com/2007/11/01/self-service-prorated- super-computing-fun/?scp=1&sq=self%20service%20prorated&st=cse.
    • The New York Times
    • Gottfrid, D.1
  • 18
  • 21
    • 85088777233 scopus 로고    scopus 로고
    • A collaborative monitoring mechanism for making a multitenant platform accountable
    • C. Wang and Y. Zhou, "A Collaborative Monitoring Mechanism for Making a Multitenant Platform Accountable." Hotcloud 2010.
    • (2010) Hotcloud
    • Wang, C.1    Zhou, Y.2
  • 22
    • 78650662129 scopus 로고    scopus 로고
    • Enhancing intrusion detection system with proximity information
    • Z. Zhuang, Y. Li, and Z. Chen, "Enhancing Intrusion Detection System with proximity information," International Journal of Security and Networks, Vol. 5, No.4 pp. 207-219, 2010.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.4 , pp. 207-219
    • Zhuang, Z.1    Li, Y.2    Chen, Z.3
  • 26
    • 78650656608 scopus 로고    scopus 로고
    • Detect DDoS flooding attacks in mobile ad hoc networks
    • Y. Guo and S. Perreau, "Detect DDoS flooding attacks in mobile ad hoc networks," International Journal of Security and Networks, Vol. 5, No.4 pp. 259-269, 2010.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.4 , pp. 259-269
    • Guo, Y.1    Perreau, S.2
  • 27
    • 77949732329 scopus 로고    scopus 로고
    • Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
    • H. Guo, Y. Mu, X.Y. Zhang, and Z.J. Li, "Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security," International Journal of Security and Networks, Vol. 5, No.2/3 pp. 173-187, 2010.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 173-187
    • Guo, H.1    Mu, Y.2    Zhang, X.Y.3    Li, Z.J.4
  • 28
    • 77949752019 scopus 로고    scopus 로고
    • Security assessments of IEEE 802.15.4 standard based on X.805 framework
    • A. O. Richard, A. Ahmad, and K. Kiseon, " Security assessments of IEEE 802.15.4 standard based on X.805 framework," International Journal of Security and Networks, Vol. 5, No.2/3 pp. 188-197, 2010.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 188-197
    • Richard, A.O.1    Ahmad, A.2    Kiseon, K.3
  • 29
    • 77949729303 scopus 로고    scopus 로고
    • Experimental analysis of application-level intrusion detection algorithms
    • Y. Dong, S. Hsu, S. Rajput, and B. Wu, "Experimental analysis of application-level intrusion detection algorithms," International Journal of Security and Networks, Vol. 5, No.2/3 pp. 198-205, 2010.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 198-205
    • Dong, Y.1    Hsu, S.2    Rajput, S.3    Wu, B.4
  • 31
    • 77949837905 scopus 로고    scopus 로고
    • A backpressure technique for filtering spoofed traffic at upstream routers
    • S. Malliga and A. Tamilarasi, "A backpressure technique for filtering spoofed traffic at upstream routers," International Journal of Security and Networks, Vol. 5, No.1 pp. 3-14, 2010.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 3-14
    • Malliga, S.1    Tamilarasi, A.2
  • 32
    • 77949801623 scopus 로고    scopus 로고
    • Authentication and secret search mechanisms for RFID-aware wireless sensor networks
    • S. Huang and S. Shieh, "Authentication and secret search mechanisms for RFID-aware wireless sensor networks," International Journal of Security and Networks, Vol. 5, No.1 pp. 15-25, 2010.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 15-25
    • Huang, S.1    Shieh, S.2
  • 33
    • 77949844099 scopus 로고    scopus 로고
    • An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks
    • Y. Hsiao and R. Hwang, "An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks," International Journal of Security and Networks, Vol. 5, No.1 pp. 26-34, 2010.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 26-34
    • Hsiao, Y.1    Hwang, R.2
  • 34
    • 77949835881 scopus 로고    scopus 로고
    • Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
    • L. Xu, S. Chen, X. Huang, and Y. Mu, "Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks," International Journal of Security and Networks, Vol. 5, No.1 pp. 35-44, 2010.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 35-44
    • Xu, L.1    Chen, S.2    Huang, X.3    Mu, Y.4
  • 35
    • 77949817850 scopus 로고    scopus 로고
    • Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
    • K. Tsai, C. Hsu, and T. Wu, "Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks," International Journal of Security and Networks, Vol. 5, No.1 pp. 45-52, 2010.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 45-52
    • Tsai, K.1    Hsu, C.2    Wu, T.3
  • 36
    • 77949864345 scopus 로고    scopus 로고
    • Lightweight authentication protocol for mobile RFID networks
    • M. Yang, "Lightweight authentication protocol for mobile RFID networks," International Journal of Security and Networks, Vol. 5, No.1 pp. 53-62, 2010.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 53-62
    • Yang, M.1
  • 37
    • 77949830969 scopus 로고    scopus 로고
    • A cross-layer authentication design for secure video transportation in wireless sensor network
    • J. Wang and G.L. Smith, "A cross-layer authentication design for secure video transportation in wireless sensor network," International Journal of Security and Networks, Vol. 5, No.1 pp. 63-76, 2010.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 63-76
    • Wang, J.1    Smith, G.L.2
  • 41
    • 54249117650 scopus 로고    scopus 로고
    • Secure scalable group signature with dynamic joins and separable authorities
    • A. Kiayias and M. Yung, "Secure scalable group signature with dynamic joins and separable authorities," International Journal of Security and Networks, Vol. 1, No.1/2, pp. 24-45, 2006.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.1-2 , pp. 24-45
    • Kiayias, A.1    Yung, M.2
  • 45
    • 74549166520 scopus 로고    scopus 로고
    • Wireless networking security: Open issues in trust, management, interoperation and measurement
    • J. B. Evans, W. Wang, and B. J. Ewy, "Wireless networking security: open issues in trust, management, interoperation and measurement," International Journal of Security and Networks, Vol. 1, No.1/2, pp. 84-94, 2006.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.1-2 , pp. 84-94
    • Evans, J.B.1    Wang, W.2    Ewy, B.J.3
  • 46
    • 72449209394 scopus 로고    scopus 로고
    • Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
    • H. Englund and T. Johansson, "Three ways to mount distinguishing attacks on irregularly clocked stream ciphers," International Journal of Security and Networks, Vol. 1, No.1/2 pp. 95-102, 2006.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.1-2 , pp. 95-102
    • Englund, H.1    Johansson, T.2
  • 51
    • 79955980141 scopus 로고    scopus 로고
    • A lightweight encryption and authentication scheme for wireless sensor networks
    • J. Zheng, J. Li, M. J. Lee, and M. Anshel, "A lightweight encryption and authentication scheme for wireless sensor networks," International Journal of Security and Networks 2006-Vol. 1, No.3/4 pp. 138-146, 2006.
    • (2006) International Journal of Security and Networks 2006 , vol.1 , Issue.3-4 , pp. 138-146
    • Zheng, J.1    Li, J.2    Lee, M.J.3    Anshel, M.4
  • 52
    • 79951694028 scopus 로고    scopus 로고
    • Analysis of routing security-energy trade-offs in wireless sensor networks
    • J. N. Al-Karaki, "Analysis of routing security-energy trade-offs in wireless sensor networks," International Journal of Security and Networks 2006-Vol. 1, No.3/4 pp. 147-157, 2006.
    • (2006) International Journal of Security and Networks 2006 , vol.1 , Issue.3-4 , pp. 147-157
    • Al-Karaki, J.N.1
  • 53
    • 49949107235 scopus 로고    scopus 로고
    • Load-balanced key establishment methodologies in wireless sensor networks
    • O. Araz and H. Qi, "Load-balanced key establishment methodologies in wireless sensor networks," International Journal of Security and Networks 2006-Vol. 1, No.3/4 pp. 158-166, 2006.
    • (2006) International Journal of Security and Networks 2006 , vol.1 , Issue.3-4 , pp. 158-166
    • Araz, O.1    Qi, H.2
  • 54
    • 84890880165 scopus 로고    scopus 로고
    • Limiting DoS attacks during multihop data delivery in wireless sensor networks
    • 2006
    • J. Deng, R. Han, and S. Mishra, "Limiting DoS attacks during multihop data delivery in wireless sensor networks," International Journal of Security and Networks 2006-Vol. 1, No.3/4 pp. 167-178, 2006.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 167-178
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 56
    • 77955716028 scopus 로고    scopus 로고
    • The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
    • X. Wang, "The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones," International Journal of Security and Networks, Vol. 1, Nos.3/4 pp. 184-197, 2006.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 184-197
    • Wang, X.1
  • 57
    • 51249122792 scopus 로고    scopus 로고
    • A self-encryption authentication protocol for teleconference services
    • Y. Jiang, C. Lin, M. Shi, and X. Shen, "A self-encryption authentication protocol for teleconference services," International Journal of Security and Networks, Vol. 1, Nos.3/4 pp. 198-205, 2006.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 198-205
    • Jiang, Y.1    Lin, C.2    Shi, M.3    Shen, X.4
  • 58
    • 77955290752 scopus 로고    scopus 로고
    • An adaptive expert system approach for intrusion detection
    • S. F. Owens and R. R. Levary, "An adaptive expert system approach for intrusion detection," International Journal of Security and Networks, Vol. 1, Nos.3/4 pp. 206-217, 2006.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 206-217
    • Owens, S.F.1    Levary, R.R.2
  • 59
    • 77955710234 scopus 로고    scopus 로고
    • Convertible identity-based anonymous designated ring signatures
    • Y. Chen, W. Susilo, and Y. Mu, "Convertible identity-based anonymous designated ring signatures," International Journal of Security and Networks, Vol. 1, Nos.3/4 pp. 218-225, 2006.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 218-225
    • Chen, Y.1    Susilo, W.2    Mu, Y.3
  • 60
    • 79951716783 scopus 로고    scopus 로고
    • Low-power authenticated group key agreement for heterogeneous wireless networks
    • J. Teo, C. Tan, and J. Ng, "Low-power authenticated group key agreement for heterogeneous wireless networks," International Journal of Security and Networks, Vol. 1, Nos.3/4 pp. 226-236, 2006.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 226-236
    • Teo, J.1    Tan, C.2    Ng, J.3
  • 61
    • 77954644745 scopus 로고    scopus 로고
    • A new signature scheme without random oracles
    • C. Tan, "A new signature scheme without random oracles," International Journal of Security and Networks, Vol. 1, Nos.3/4 pp. 237-242, 2006.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 237-242
    • Tan, C.1
  • 62
    • 67649498303 scopus 로고    scopus 로고
    • Modelling misbehaviour in ad hoc networks: A game theoretic approach for intrusion detection
    • Y. Liu, C. Comaniciu, and H. Man, "Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection," International Journal of Security and Networks, Vol. 1, Nos.3/4 pp. 243-254, 2006.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 243-254
    • Liu, Y.1    Comaniciu, C.2    Man, H.3
  • 63
    • 44649095872 scopus 로고    scopus 로고
    • A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks
    • V. Karyotis, S. Papavassiliou, M. Grammatikou, and V. Maglaris, "A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks," International Journal of Security and Networks, Vol. 1, Nos.3/4 pp. 255-265, 2006.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 255-265
    • Karyotis, V.1    Papavassiliou, S.2    Grammatikou, M.3    Maglaris, V.4
  • 65
    • 79551652560 scopus 로고    scopus 로고
    • DKMS: Distributed hierarchical access control for multimedia networks
    • R. Li, J. Li, and H. Chen, "DKMS: distributed hierarchical access control for multimedia networks," International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp. 3-10, 2007.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 3-10
    • Li, R.1    Li, J.2    Chen, H.3
  • 67
    • 74549116861 scopus 로고    scopus 로고
    • Securing Wi-Fi networks with position verification: Extended version
    • R. A. Malaney, "Securing Wi-Fi networks with position verification: extended version," International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp. 27-36, 2007.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 27-36
    • Malaney, R.A.1
  • 68
    • 74549171036 scopus 로고    scopus 로고
    • On pairwise connectivity of wireless multihop networks
    • F. Sun and M. A. Shayman, " On pairwise connectivity of wireless multihop networks," International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp. 37-49, 2007.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 37-49
    • Sun, F.1    Shayman, M.A.2
  • 69
    • 74049111426 scopus 로고    scopus 로고
    • Hash-AV: Fast virus signature scanning by cache-resident filters
    • Oz. Erdogan and P. Cao, " Hash-AV: fast virus signature scanning by cache-resident filters," International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp. 50-59, 2007.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 50-59
    • Erdogan, Oz.1    Cao, P.2
  • 70
    • 79551643767 scopus 로고    scopus 로고
    • Secure message delivery in publish/subscribe networks using overlay multicast
    • P. Rabinovich and R. Simon, "Secure message delivery in publish/subscribe networks using overlay multicast," International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp. 60-70, 2007.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 60-70
    • Rabinovich, P.1    Simon, R.2
  • 71
    • 34548366188 scopus 로고    scopus 로고
    • Optimal worm-scanning method using vulnerable-host distributions
    • Z. Chen and C. Ji, " Optimal worm-scanning method using vulnerable-host distributions," International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp. 71-80, 2007.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 71-80
    • Chen, Z.1    Ji, C.2
  • 72
    • 79551647519 scopus 로고    scopus 로고
    • Vulnerabilities in distance-indexed IP traceback schemes
    • J. Pan, L. Cai, and X. Shen, " Vulnerabilities in distance-indexed IP traceback schemes," International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp. 81-94, 2007.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 81-94
    • Pan, J.1    Cai, L.2    Shen, X.3
  • 74
    • 79551646922 scopus 로고    scopus 로고
    • End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
    • H. Ling and T. Znati, "End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks," International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp. 109-121, 2007.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 109-121
    • Ling, H.1    Znati, T.2
  • 75
    • 39349109602 scopus 로고    scopus 로고
    • Design and analysis of a multipacket signature detection system
    • N. S. Artan and H. J. Chao, "Design and analysis of a multipacket signature detection system," International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp. 122-136, 2007.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 122-136
    • Artan, N.S.1    Chao, H.J.2
  • 79
    • 85016433011 scopus 로고    scopus 로고
    • Efficient multicast stream authentication for the fully adversarial network model
    • C. Tartary and H. Wang, "Efficient multicast stream authentication for the fully adversarial network model," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 175-191, 2007.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 175-191
    • Tartary, C.1    Wang, H.2
  • 80
  • 81
    • 79951648076 scopus 로고    scopus 로고
    • LIP: A lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network
    • H. Hsu, S. Zhu, and A. R. Hurson, "LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 202-215, 2007.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 202-215
    • Hsu, H.1    Zhu, S.2    Hurson, A.R.3
  • 84
    • 68149086398 scopus 로고    scopus 로고
    • Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
    • K. Hoeper and G. Gong, "Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 239-250, 2007.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 239-250
    • Hoeper, K.1    Gong, G.2
  • 85
    • 38049042723 scopus 로고    scopus 로고
    • On security proof of McCullagh-Barreto's key agreement protocol and its variants
    • Z. Cheng and L. Chen, "On security proof of McCullagh-Barreto's key agreement protocol and its variants," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 251-259, 2007.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 251-259
    • Cheng, Z.1    Chen, L.2
  • 87
    • 66249092571 scopus 로고    scopus 로고
    • Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
    • D. Huang, "Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 272-283, 2007.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 272-283
    • Huang, D.1
  • 90
    • 77955714466 scopus 로고    scopus 로고
    • Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
    • I. Ray and N. Poolsappasit, "Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents," International Journal of Security and Networks, Vol. 3, No. 2, pp. 80-94, 2008.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.2 , pp. 80-94
    • Ray, I.1    Poolsappasit, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.