Skip to main content
Log in

Secured map reduce computing based on virtual machine using threshold secret sharing and group signature mechanisms in cloud computing environments

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Nowadays, cloud computing becomes a popular technology which combines resources of numerous physical computers and servers to perform distributed computing. The main benefit of cloud computing is that this technology decreases computing costs and infrastructures, allowing much more efficient computing. Through a portal, users submit working tasks and receive the results without assigning to specific servers. Nevertheless, the computers of users and enterprises are located in cloud, and arbitrary clients can randomly log on and take private data away. Thus, the cloud security becomes a significant subject. In this paper, we exploit the threshold crypto sharing (Desmedt and Frankel in Advances in cryptology—CRYPTO’89, 1990) with group signature mechanism to secure transmitted data. During map and reduce phases, this mechanism can protect the divided and merged messages from being tampered with. Additionally, this study exploits a virtual machine platform to simulate cloud computing environments and then perform security operations. Experimental results show that the mechanism presented has lower cost comparing to other existing ones and very promising its application in cloud environments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Creese, S., Hopkins, P., Pearson, S., & Shen, Y. (2009). Data protection-aware design for cloud services. Lecture Notes in Computer Science, vol. 5931, pp. 119–130. Berlin: Springer.

  2. Iqbal, W., Dailey, M., & Carrera, D. (2010) SLA-driven automatic bottleneck detection and resolution for read intensive multitier applications hosted on a cloud. In: Proceedings of the International Conference on Grid and Pervasive Computing, pp. 37–46.

  3. Dean, J., & Ghemawat, S. (2004). MapReduce: Simplified data processing on large clusters. In: Proceedings of the 6th conference on Symposium on Operating Systems Design & Implementation.

  4. Devanbu, P., Gertz, M., Stuart, C. M., & Stubblebine, G. (August 2000). Authentic third-party data publication. In: Proceedings of the 14th IFIP 11.3 Working Conference in Database Security .

  5. Mackey, G., Sehrish, S., Lopez, J., Bent, J., Habib, S., & Wang, J. (2008). Introducing map reduce to high end computing. In: Proceedings of the Petascale Data Storage Workshop Held in Conjunction with SC08.

  6. Ekanayake, J., Pallickara, S., & Fox, G. (2008). Mapreduce for data intensive scientific analysis. In: Proceedings of the IEEE Fourth International Conference on eScience’08, pp. 277–284. IEEE

  7. Itani, W., Kayssi, A., & Chehab, A. (2009). Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures. In: the Proceeding of the 8th IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 711–716. IEEE

  8. Begnum, K. (2010). Simplified cloud-oriented virtual machine management with MLN. The Journal of Supercomputing, 61(2), 251-266. doi:10.1007/s11227-010-0424-0.

  9. Yan, L., Rong, C., & Zhao, G. (2010). Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography. Lecture Notes in Computer Science, vol. 5931. Berlin: Springer

  10. Sun, H., & Aida, K. (2010). A hybrid and secure mechanism to execute parameter survey applications on local and public cloud resources. In: Proceedings of the IEEE Second International Conference on Cloud Computing Technology and Science, pp. 118–126. IEEE

  11. Zhou, D., Zhong, L., Wo, T., & Kang, J. (2010) CloudView: Describe and maintain resource view in cloud. In: Proceedings of the IEEE Second International Conference on Cloud Computing Technology and Science, pp. 151–158. IEEE

  12. Miyamoto, T., Hayashi, M., & Nishimura, K. (2010). Sustainable network resource management system for virtual private clouds. In: Proceedings of the IEEE Second International Conference on Cloud Computing Technology and Science, pp. 512–520. IEEE

  13. Desmedt, Y., & Frankel, Y. (August 1990). Threshold Crypto-Systems. In Advances in Cryptology ( Crypto’89), pp. 307–315. New York: Springer.

  14. Stinson, D. R., & Wei, R. (August 1999). Unconditionally secure proactive secret sharing scheme with combinatorial. In: Proceeding of the 6th Annual International Workshop Selected Areas in Cryptography.

  15. Wang, G. L. (2003). Security Analysis of Several Group Signature Schemes. Lecture Notes in Computer Science, vol. 2904, pp. 252–265. Berlin: Springer.

  16. Fouquet, M., Hoene, C., Schläger, M., & Carle, G. (2011). Data collection in future mobile networks. Telecommunication Systems Journal, 48(3–4), 289–300.

    Article  Google Scholar 

  17. Altman, E., Ayesta, U., & Prabhu, B. J. (2011). Load balancing in processor sharing systems. Telecommunication Systems Journal, 47(1–2), 35–48.

    Article  Google Scholar 

  18. Ibrahiem, M. M., Emary, E., & Hassanien, A. E. (2011). Intelligent agent in telecommunication systems. Telecommunication Systems Journal, 46(3), 191–193.

    Article  Google Scholar 

  19. Hu, J., Deng, J., & Wu, J. (2013) A green private cloud architecture with global collaboration. Telecommunication Systems Journal, 52(2), 1269–1279 doi: 10.1007/s11235-011-9639-5.

  20. Pearson, S., Shen, Y., & Mowbray, M. (2009). A Privacy Manager for Cloud Computing (pp. 90–106). Lecture Notes in Computer Science Berlin: Springer.

  21. Elnikety, E., Elsayed, T., & Ramadan, H .E. (2011). iHadoop: Asynchronous iterations for MapReduce. In: Proceedings of the 3rd IEE International Conference on Cloud Computing Technology and Science. IEEE

  22. Chen, R., Gui, Y., & Gao, J. (2004). Modification on Kerberos Authentication Protocol in Grid Computing Environment (pp. 1079–1082). Lecture Notes in Computer Science Berlin: Springer.

  23. Juan, W., Heng, C. M., & Kang, F. Y. (2011). An improved kerberos intra-domain authentication protocol based-on certificateless public-key cryptography. Advances in Intelligent and Soft Computing, 129, 489–496.

    Article  Google Scholar 

  24. Lin, H.-Y., Yang, C.-Y., & Hsieh, M.-Y. (2012). Secure map reduce data transmission mechanism in cloud computing using threshold secret sharing Schemes. In Advances in Intelligent and Soft Computing. Berlin: Springer

  25. Hsieh, M.-Y., Lin, H.-Y., Lai, C.-F., & Li, K.-C. (2011). Secure protocols for data propagation and group communication in vehicular networks. EURASIP Journal on Wireless Communications and Networking, 2011(1), 1–16.

  26. Lin, H.-Y., & Chiang, T.-C. (2011). Efficient key agreements in dynamic multicast height balanced tree for secure multicast communications in Ad Hoc networks. EURASIP Journal on Wireless Communications and Networking, 2011(1), 382701.

  27. Hsieh, M.-Y. (2011). Data aggregation model using energy-efficient delay scheduling in multi-hop hierarchical wireless sensor networks. IET Communications, 5(18), 2703–2711.

    Article  Google Scholar 

  28. Yeh, C.-H., Hsieh, M.-Y., & Li, K.-C. (2014). An Anonymous Communication Scheme with Non-reputation for Vehicular Ad Hoc Networks (pp. 563–568). Lecture Notes in Electrical Engineering. Berlin: Springer.

Download references

Acknowledgments

This work was partly supported by National Science Council (NSC), Taiwan, under research Grants number NSC102-2221-E-126-003, NSC100-2221-E-126-006, and NTHU-Delta collaborative research projects. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Council, NTHU or Delta Electronics, Inc.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hua Yi Lin.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lin, H.Y., Hsieh, MY. & Li, KC. Secured map reduce computing based on virtual machine using threshold secret sharing and group signature mechanisms in cloud computing environments. Telecommun Syst 60, 303–313 (2015). https://doi.org/10.1007/s11235-015-0031-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-015-0031-8

Keywords

Navigation