A Study on Generic Data Analysis Application the Cloud Using SGX

Authors

  • S. Baskaran  Head, Department of Computer science, Tamil University (Established by the Govt. of. Tamilnadu), Thanjavur, Tamil Nadu, India
  • S. Venkatesan  Research Scholar, Department of Computer Science, Tamil University, Thanjavur, Tamil Nadu, India

DOI:

https://doi.org//10.32628/CSEIT195363

Keywords:

Sensible Producing Systems, Data Processing, Call Support, Application.

Abstract

The analysis itself however in the midst of preparation and post-processing steps. Handling information returning directly from the supply, e.g. a sensor, typically needs preconditioning like parsing and removing orthogonal data before data processing algorithms will be applied to research the info. complete data processing frameworks generally don't offer such parts since they need a currency computer file format. what is more, they're typically restricted to the offered algorithms or a speedy integration of latest algorithms for the aim of fast testing isn't attainable. to deal with this disadvantage, we have a tendency to gift the info analysis framework Knowing, that is well extendable with extra algorithms by exploitation associate OSGi compliant design. the software package and therefore the hypervisor out of the TCB; therefore, confidentiality and integrity square measure preserved albeit these massive parts square measure compromised. VC3 depends on SGX processors to isolate memory regions on individual computers, and to deploy new protocols that secure distributed MapReduce computations. VC3 optionally enforces region self-integrity invariants for all MapReduce code running inside isolated regions, to stop attacks thanks to unsafe memory reads and writes. Experimental results on common benchmarks show that VC3 performs well compared with unprotected Hadoop: VC3's average runtime overhead is negligible for its base security guarantees, 4.5% with write integrity and eight with read/write integrity.

References

  1. M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-Flow Integrity: Principles, Implementations, and Applications. In ACM Conference on Computer and Communications Security (CCS), 2005.
  2. P. Akritidis, C. Cadar, C. Raiciu, M. Costa, and M. Castro. Preventing memory error exploits with WIT. In IEEE Symposium on Security and Privacy, 2008.
  3. I. Anati, S. Gueron, S. Johnson, and V. Scarlata. Innovative technology for CPU based attestation and sealing. In Workshop on Hardware and Architectural Support for Security and Privacy (HASP), 2013.
  4. Apache Software Foundation. Hadoop. http://wiki.apache.org/hadoop/, Accessed: 11/05/2014.
  5. Apache Software Foundation. HadoopStreaming. http://hadoop.apache.org/docs/r1.2.1/streaming.html, Accessed: 11/05/2014.
  6. A. Arasu, S. Blanas, K. Eguro, R. Kaushik, D. Kossmann, R. Ramamurthy, and R. Venkatesan. Orthogonal security with Cipherbase. In Conference on Innovative Data Systems Research (CIDR), 2013.
  7. C. Turmer, D. Dill, A. Scholz, M. Gul, A. Stautner, T. Bernecker, F. Graf, and B. Wolf. Conceptual design for an activity monitoring system concerning medical applications using triaxial accelerometry. In Austrian Society for Biomedical Engineering (BMT), Rostock, Germany, 2010.
  8. P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In ACM Symposium on Operating Systems Principles (SOSP), 2003.
  9. A. Baumann, M. Peinado, and G. Hunt. Shielding applications from an untrusted cloud with haven. In USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2014.
  10. M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryption schemes. In Advances in Cryptology—CRYPTO, 1998.

Downloads

Published

2019-06-30

Issue

Section

Research Articles

How to Cite

[1]
S. Baskaran, S. Venkatesan, " A Study on Generic Data Analysis Application the Cloud Using SGX, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 3, pp.228-234, May-June-2019. Available at doi : https://doi.org/10.32628/CSEIT195363