Integrity protection for big data processing with dynamic redundancy computation

Zhimin Gao, Nicholas Desalvo, Pham Dang Khoa, Seung Hun Kim, Lei Xu, Won Woo Ro, Rakesh M. Verma, Weidong Shi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Big data is a hot topic and has found various applications in different areas such as scientific research, financial analysis, and market studies. The development of cloud computing technology provides an adequate platform for big data applications. No matter public or private, the outsourcing and sharing characteristics of the computation model make security a big concern for big data processing in the cloud. Most existing works focus on protection of data privacy but integrity protection of the processing procedure receives little attention, which may lead the big data application user to wrong conclusions and cause serious consequences. To address this challenge, we design an integrity protection solution for big data processing in cloud environments using reputation based redundancy computation. The implementation and experiment results show that the solution only adds limited cost to achieve integrity protection and is practical for real world applications.

Original languageEnglish
Title of host publicationProceedings - IEEE International Conference on Autonomic Computing, ICAC 2015
EditorsPhilippe Lalanda, Samuel Kounev, Ada Diaconescu, Lucy Cherkasova
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages159-160
Number of pages2
ISBN (Electronic)9781467369701
DOIs
Publication statusPublished - 2015 Sep 14
Event12th IEEE International Conference on Autonomic Computing, ICAC 2015 - Grenoble, France
Duration: 2015 Jul 72015 Jul 10

Publication series

NameProceedings - IEEE International Conference on Autonomic Computing, ICAC 2015

Other

Other12th IEEE International Conference on Autonomic Computing, ICAC 2015
CountryFrance
CityGrenoble
Period15/7/715/7/10

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computer Networks and Communications
  • Software
  • Control and Systems Engineering

Fingerprint Dive into the research topics of 'Integrity protection for big data processing with dynamic redundancy computation'. Together they form a unique fingerprint.

Cite this