26.08.2016 Views

trademark

2c2kIhh

2c2kIhh

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1.0 Secure Computations in Distributed Programming Frameworks (cont.)<br />

1.9 Protect mappers<br />

1.9.1 Why?<br />

To avoid generating incorrect aggregate outputs.<br />

1.9.2 How?<br />

Detect the mappers returning wrong results due to malicious modifications.<br />

1.10 Check for altered copies of data<br />

1.10.1 Why?<br />

To avoid attacks in cloud and virtual environments.<br />

1.10.2 How?<br />

Detect for the data nodes that are re-introducing the altered copies and check such nodes<br />

for their legitimacy. Hashing mechanism and cell timestamps of cell data will enforce integrity.<br />

CLOUD SECURITY ALLIANCE Big Data Working Group Guidance<br />

© Copyright 2016, Cloud Security Alliance. All rights reserved.<br />

12

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!