Next Article in Journal
Dynamic Network Topology Control of Branch-Trimming Robot for Transmission Lines
Previous Article in Journal
Four-Step Current Commutation Strategy for a Matrix Converter Based on Enhanced-PWM MCU Peripherals
Previous Article in Special Issue
Load Balancing Scheme for Effectively Supporting Distributed In-Memory Based Computing
Article Menu
Issue 5 (May) cover image

Export Article

Open AccessArticle

SHIYF: A Secured and High-Integrity YARN Framework

1
College of Computer Science and Technology, Jilin University, Changchun 130012, China
2
Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun 130012, China
*
Author to whom correspondence should be addressed.
Electronics 2019, 8(5), 548; https://doi.org/10.3390/electronics8050548
Received: 17 April 2019 / Revised: 7 May 2019 / Accepted: 11 May 2019 / Published: 15 May 2019
(This article belongs to the Special Issue Cloud Computing and Applications)
PDF [8708 KB, uploaded 15 May 2019]

Abstract

Cloud computing is becoming a powerful parallel data processing method, and it can be adopted by many network service providers to build a service framework. Although cloud computing is able to efficiently process a large amount of data, it can be attacked easily due to its massively distributed cluster nodes. In this paper, we propose a secure and high-integrity YARN framework (SHIYF), which establishes a close relationship between speculative execution and the security of Yet Another Resource Negotiator (YARN, MapReduce 2.0). SHIYF computes and compares the MD5 hashes of the intermediate and final results in the MapReduce process by launching the speculative executions in a certain ratio, which is able to find actual and potentially malicious nodes in the Hadoop cluster. The prototype of SHIYF is implemented based on Hadoop 2.8.0. In this paper, theoretical derivations and experiments show that SHIYF not only guarantees the security and high integrity of the MapReduce process but also successfully locates the malicious nodes and the potential malicious ones in Hadoop, while increasing overhead slightly. Furthermore, the malicious node detection ratio is more than 87%.
Keywords: Cloud computing; Hadoop; MapReduce; YARN; speculative execution; security; integrity Cloud computing; Hadoop; MapReduce; YARN; speculative execution; security; integrity
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Deng, J.; Liu, Y.; Wang, J.; Li, S. SHIYF: A Secured and High-Integrity YARN Framework. Electronics 2019, 8, 548.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Electronics EISSN 2079-9292 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top