Security issues relating to inadequate authentication in MapReduce applications

  • James Dyer
  • , Waleed W Smari (Editor)
  • , Vesna Zeljkovic (Editor)
  • , Ning Zhang

Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

367 Downloads (Pure)

Abstract

In this paper, we discuss security issues relating to inadequate authentication in MapReduce applications. We examine MapReduce applications deployed in the cloud, as this environment significantly increases security risks to the applica-tions. We outline a generic model of MapReduce computation and then perform a detailed threat analysis of this model. Then, based on this threat analysis, we produce a set of security requirements for the design of an authentication solution for MapReduce applications. We then review related work against these requirements, and conclude that most of the work surveyed does not address two of our requirements, which we believe to be of significant importance when deploying MapReduce in the cloud.
Original languageEnglish
Title of host publicationHigh Performance Computing and Simulation (HPCS), 2013 International Conference on
EditorsWaleed W Smari, Vesna Zeljkovic
Place of PublicationIEEE Xplore
PublisherIEEE
Pages281-288
Number of pages8
ISBN (Print)978-1-4799-0836-3, 9781479908363
DOIs
Publication statusPublished - 1 Jul 2013
EventHigh Performance Computing and Simulation (HPCS), 2013 International Conference on - Helsinki, Finland
Duration: 1 Jul 20135 Jul 2013

Conference

ConferenceHigh Performance Computing and Simulation (HPCS), 2013 International Conference on
CityHelsinki, Finland
Period1/07/135/07/13

Keywords

  • Cloud computing, scalable computing, security, authentication, access control

Fingerprint

Dive into the research topics of 'Security issues relating to inadequate authentication in MapReduce applications'. Together they form a unique fingerprint.

Cite this