High-performance and high-concurrency encryption scheme for Hadoop platform
Papers|更新时间:2024-06-05
|
High-performance and high-concurrency encryption scheme for Hadoop platform
Journal on CommunicationsVol. 40, Issue 12, Pages: 29-40(2019)
作者机构:
1. 中国科学院信息工程研究所,北京100093
2. 中国科学院大学网络空间安全学院,北京 100049
3. 中国科学技术大学网络空间安全学院,安徽 合肥 230027
作者简介:
基金信息:
The National Key Research Project and Development Program of China(2017YFB0802705);The Strategic Priority Research Program of the Chinese Academy of Sciences(XDC02040400);The National Natural Science Foundation of China(U1836203)
CHEN L , HUANG J , WANG R . Overview on security issues and solutions of Hadoop big data platform [J ] . Computer Systems & Applications , 2018 , 27 ( 1 ): 1 - 9 .
LIANG S X , QIN J , SONG L . Design for protection scheme of hybrid encryption in HDFS [J ] . Computer Era , 2014 ( 7 ): 17 - 19 .
DÍAZ A F , BLOKHIN I , ORTEGA J . Secure data access in Hadoop using elliptic curve cryptography [C ] // International Conference on Algorithms and Architectures for Parallel Processing . 2016 : 136 - 145 .
WANG F , KOHLER M , SCHAAD A . Initial encryption of large searchable data sets using Hadoop [C ] // The 20th ACM Symposium on Access Control Models and Technologies . SACMAT , 2015 : 165 - 168 .
SONG Y , SHIN Y S , JANG M . Design and implementation of HDFS data encryption scheme using ARIA algorithm on Hadoop [C ] // 2017 IEEE International Conference on Big Data and Smart Computing . IEEE , 2017 : 84 - 90 .
LIN H Y , SHEN S T , TZENG W G , et al . Toward data confidential ity via integrating hybrid encryption schemes and Hadoop distributed file system [C ] // 2012 IEEE 26th International Conference on Advanced Information Networking and Applications (AINA) . IEEE , 2012 : 740 - 747 .
BHATOTIA P , RODRIGUES R , VERMA A . Shredder:GPU-accelerated incremental storage and computation [C ] // The 10th USENIX conference on File and Storage Technologies . 2012 .
COHEN J , ACHARYA S . Towards a trusted Hadoop storage platform:design considerations of an AES based encryption scheme with TPM rooted key protections [C ] // The 2013 IEEE 10th International Conference on Ubiquitous Intelligence & Computing and 2013 IEEE 10th International Conference on Autonomic & Trusted Computing . IEEE , 2013 : 444 - 451 .
ZHOU W , XU Y , WANG G . Research on key management for multi-privileged group communications [C ] // IEEE Trustcom/BigDataSE/ISPA . IEEE Computer Society , 2015 : 151 - 158 .
KANDAH F I , NICHOLS O , YANG L . Efficient key management for big data gathering in dynamic sensor networks [C ] // International Conference on Computing . IEEE , 2017 : 667 - 671 .
ALBAKRI A , MADDUMALA M , HARN L . Hierarchical polynomial-based key management scheme in fog computing [C ] // IEEE TrustCom/BigDataSE . IEEE , 2018 : 1593 - 1597 .