600.412.lecture06

600.412.lecture06 - Security and Privacy in Cloud Computing...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Ragib Hasan Johns Hopkins University en.600.412 Spring 2010 Lecture 6 03/22/2010 Security and Privacy in Cloud Computing
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Verifying Computations in a Cloud 3/22/2010 en.600.412 Spring 2010 Lecture 6 | JHU | Ragib Hasan 2 Scenario User sends her data processing job to the cloud. Clouds provide dataflow operation as a service (e.g., MapReduce, Hadoop etc.) Problem : Users have no way of evaluating the correctness of results
Background image of page 2
DataFlow Operations 3/22/2010 en.600.412 Spring 2010 Lecture 6 | JHU | Ragib Hasan 3 Properties High performance, in-memory data processing Each node performs a particular function Nodes are mostly independent of each other Examples MapReduce, Hadoop, System S, Dryad
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
How do we ensure DataFlow operation results are correct? 3/22/2010 en.600.412 Spring 2010 Lecture 6 | JHU | Ragib Hasan 4 Du et al., RunTest: Assuring Integrity of Dataflow Processing in Cloud Computing Infrastructures , AsiaCCS 2010 Goals To determine the malicious nodes in a DataFlow system To determine the nature of their malicious action To evaluate the quality of output data
Background image of page 4
Re-do the computation Check memory footprint of code execution Majority voting Hardware-based attestation Run-time attestation 3/22/2010 en.600.412 Spring 2010 Lecture 6 | JHU | Ragib Hasan 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 18

600.412.lecture06 - Security and Privacy in Cloud Computing...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online