Protecting big data storage with trusted computing: designing a trusted infrastructure and software solution

dc.contributor.advisorAcharya, Subrata
dc.contributor.authorCohen, Jason C.
dc.contributor.departmentTowson University. Department of Computer and Information Sciences
dc.date.accessioned2015-12-17T19:36:28Z
dc.date.available2015-12-17T19:36:28Z
dc.date.issued2014-06-18
dc.date.submitted2014-05
dc.description(D. Sc.) -- Towson University, 2014.
dc.description.abstractApache Hadoop has the potential to offer powerful and cost effective solutions to big data analytics; however, sensitive data stored within a Hadoop Distributed File System (HDFS) infrastructure has equal potential to be an attractive target for exfiltration, corruption, unauthorized access, and modification. Pairing Apache Hadoop distributed file storage with hardware-based Trusted Computing mechanisms, based on TCG standards, has the potential to alleviate risk of data compromise. With the growing use of Hadoop to tackle big data analytics involving sensitive data, an HDFS cluster could be a target for data exfiltration, corruption, or modification. By implementing open, standards based Trusted Computing technology at the infrastructure and application levels; a novel and robust security posture and protection is presented. A discussion of the motivation for research on this topic, a threat model and evaluation of a targeted Advanced Persistent Threat against HDFS is presented, and a set of common security concerns within HDFS is addressed through infrastructure and software involving integrity validation and data-at-rest encryption. To accomplish these goals, technology from the Trusted Computing Group, such as the pervasively available Trusted Platform Module is used. In addition, a discussion of design considerations in building an encryption framework for Hadoop in a trustworthy manner is presented along with a description of performance and security results of experiments creating an encryption scheme for Hadoop utilizing hardware key protections and Intel AES-NI (Advanced Encryption Standard New Instructions) for encryption acceleration. This work includes an evaluation of the recently implemented crypto framework for Hadoop and independent test of the performance claims of AES-NI regarding mitigating encryption performance overhead.
dc.description.tableofcontentsThreat modeling -- Theory: designing a trusted architecture and encryption scheme with TPM key protection to mitigate integrity, confidentiality, and advanced persistent threats -- Security improvement results from experimental implementation of trusted Hadoop software components, vulnerabilities, and protection of secrets -- Performance results of experimental trusted Hadoop HDFS storage platform
dc.formatapplication/pdf
dc.format.extentix, 139 pages
dc.genredissertations
dc.identifierdoi:10.13016/M2G71S
dc.identifier.otherDSP2014Cohen
dc.identifier.urihttp://hdl.handle.net/11603/2083
dc.language.isoeng
dc.relation.ispartofTowson University Archives
dc.relation.ispartofTowson University Electronic Theses and Dissertations
dc.relation.ispartofTowson University Institutional Repository
dc.rightsCopyright protected, all rights reserved.
dc.titleProtecting big data storage with trusted computing: designing a trusted infrastructure and software solution
dc.typeText
dcterms.accessRightsThere are no restrictions on access to this document. An internet release form signed by the author to display this document online is on file with Towson University Special Collections and Archives.

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
DSP2014Cohen_redacted.pdf
Size:
2.88 MB
Format:
Adobe Portable Document Format