Risk-Aware Data Processing in Hybrid Clouds

作者: Murat Kantarcioglu , Kerim Y Oktay , Vaibhav Khadilkar , Sharad Mehrotra , Bhavani Thuraisingham

DOI:

关键词: Data managementPartition (database)Network securityCloud computingInformation privacyComputer scienceData processingComputer securityHybrid systemCloud computing security

摘要: Abstract : This paper explores query processing in a hybrid cloud model where user's local computing capability is exploited alongside public services to deliver an efficient and secure data management solution. Hybrid clouds offer numerous economic advantages including the ability better manage privacy confidentiality, as well exerting control on monetary expenses of consuming by exploiting resources. Nonetheless, introduces challenges, foremost which is, how partition computation between private components cloud. The solution must account for characteristics workload that will be executed, costs associated with acquiring/operating risks affiliated storing sensitive proposes principled framework distributing meets conflicting goals performance, disclosure risk resource allocation cost. proposed implemented add-on tool Hadoop Hive based infrastructure.

参考文章(22)
Dan Boneh, Craig Gentry, A fully homomorphic encryption scheme Stanford University. ,(2009)
Bhuvan Urgaonkar, Byung Chul Tak, Anand Sivasubramaniam, To move or not to move: the economics of cloud computing ieee international conference on cloud computing technology and science. pp. 5- 5 ,(2011) , 10.5555/2170444.2170449
Steven Y. Ko, Kyungho Jeon, Ramsés Morales, The HybrEx model for confidentiality and privacy in cloud computing ieee international conference on cloud computing technology and science. pp. 8- 8 ,(2011) , 10.5555/2170444.2170452
Nickolai Zeldovich, Raluca Ada Popa, Hari Balakrishnan, Carlo Curino, Evan Philip Charles Jones, Samuel R. Madden, Eugene Wu, Nirmesh Malviya, Relational Cloud: A Database-as-a-Service for the Cloud ,(2011)
Rosario Gennaro, Craig Gentry, Bryan Parno, Non-interactive verifiable computing: outsourcing computation to untrusted workers international cryptology conference. ,vol. 2009, pp. 465- 482 ,(2010) , 10.1007/978-3-642-14623-7_25
Shahram Ghandeharizadeh, David J. DeWitt, Hybrid-Range Partitioning Strategy: A New Declustering Strategy for Multiprocessor Database Machines very large data bases. pp. 481- 492 ,(1990)
David DeWitt, Jim Gray, Parallel database systems Communications of the ACM. ,vol. 35, pp. 85- 98 ,(1992) , 10.1145/129888.129894
Robbert Van Renesse, Kenneth P. Birman, Werner Vogels, Astrolabe ACM Transactions on Computer Systems. ,vol. 21, pp. 164- 206 ,(2003) , 10.1145/762483.762485
Sanjay Agrawal, Vivek Narasayya, Beverly Yang, Integrating vertical and horizontal partitioning into automated physical database design international conference on management of data. pp. 359- 370 ,(2004) , 10.1145/1007568.1007609
Foto N. Afrati, Vinayak Borkar, Michael Carey, Neoklis Polyzotis, Jeffrey D. Ullman, Map-reduce extensions and recursive queries Proceedings of the 14th International Conference on Extending Database Technology - EDBT/ICDT '11. pp. 1- 8 ,(2011) , 10.1145/1951365.1951367