Practical Verification of MapReduce Computation Integrity via Partial Re-execution

02/21/2020
by   Eunjung Yoon, et al.
0

Big data processing is often outsourced to powerful, but untrusted cloud service providers that provide agile and scalable computing resources to weaker clients. However, untrusted cloud services do not ensure the integrity of data and computations while clients have no control over the outsourced computation or no means to check the correctness of the execution. Despite a growing interest and recent progress in verifiable computation, the existing techniques are still not practical enough for big data processing due to high verification overhead. In this paper, we present a solution called V-MR (Verifiable MapReduce), which is a framework that verifies the integrity of MapReduce computation outsourced in the untrusted cloud via partial re-execution. V-MR is practically effective and efficient in that (1) it can detect the violation of MapReduce computation integrity and identify the malicious workers involved in the that produced the incorrect computation. (2) it can reduce the overhead of verification via partial re-execution with carefully selected input data and program code using program analysis. The experiment results of a prototype of V-MR show that V-MR can verify the integrity of MapReduce computation effectively with small overhead for partial re-execution.

READ FULL TEXT
research
02/15/2022

GuaranTEE: Introducing Control-Flow Attestation for Trusted Execution Environments

The majority of cloud providers offers users the possibility to deploy T...
research
08/29/2018

Fair Marketplace for Secure Outsourced Computations

The cloud computing paradigm offers clients ubiquitous and on demand acc...
research
06/03/2019

Gap-Measure Tests with Applications to Data Integrity Verification

In this paper we propose and examine gap statistics for assessing unifor...
research
03/15/2023

vFHE: Verifiable Fully Homomorphic Encryption with Blind Hash

Fully homomorphic encryption (FHE) is a powerful encryption technique th...
research
11/03/2018

Fast Integrity Verification for High-Speed File Transfers

The amount of data generated by scientific and commercial applications i...
research
05/12/2023

The Case for the Anonymization of Offloaded Computation

Computation offloading (often to external computing resources over a net...
research
08/12/2023

SGX-MR-Prot: Efficient and Developer-Friendly Access-Pattern Protection in Trusted Execution Environments

Trusted Execution Environments, such as Intel SGX, use hardware supports...

Please sign up or login with your details

Forgot password? Click here to reset