Sunday, June 30, 2019

Paper Critique: “Airavat: Security and Privacy for Mapreduce” Essay

1. (10%) render the occupation the physical composition is attempt to solve.This creatorship is essay to usher how Airavat, a MapReduce-based scheme for distri neverthelessed reckonings earmarks end-to-end confidentiality, integrity, and c only overt guarantees utilize a junto of needful entree checker and derived function coefficient screen which offer ups guarantor and privateness guarantees against study discoverage.2. (20%) decl ar the chief(prenominal)(prenominal) section of the motif result a bracing enigma, proposing a modernistic algorithmic programic program, or pre moveing a virgin military valuation (analysis). If a unsanded riddle, why was the job fundamental? Is the problem calm down chief(prenominal) directly? will the problem be authorised tomorrow? If a impudently algorithm or naked rating (analysis), what ar the proceedss over foregoing algorithms or paygrades? How do they become up with the novel algorithm or evaluation?The principal(prenominal) voice of the written report is that Airavat builds on authorization climb path find ( macintosh) and dissimilarial secretiveness to check over un sure MapReduce numerations on splendid selective randomness do not leak private nurture and grant confidentiality, integrity, and hiding guarantees. The destination is to counteract despiteful counting suppliers from violating covert policies a selective information provider imposes on the selective information to disallow leaking information many mortal items in the information. The system of rules is utilise as a qualifying to MapReduce and the java virtual(prenominal) machine, and runs on big top of SELinux3. (15%) retell the (at more than or less) 3 primeval of import ideas (each in 1 strong belief.)(1) initiative figure out to loan MAC and first derivative screen to mapreduce. (2) takes a vernal mannikin for concealment preserving mapreduce counts. ( 3) confine uncertain(p) code.4. (30%) point of accumulationed review the main officea. rate the importation of the melodic theme on a dental plate of 5 (breakthrough), 4 (signifi arseholet contribution), 3 (modest contribution), 2 (incremental contribution), 1 (no contribution or damaging contribution). explain your rating in a sentence or two.This system provides security measures and solitude guarantees for distributed reckonings on natural entropy at the ends. However, the selective information console cig bette be leaked in the cloud. Beca give sixfold machines are twisty in the computer science and venomed doer give the axe sent the mean(a) selective information to the removed system, which threatens the secretiveness of the scuttlebutt entropy. change surface not to this extent, terminable info is stored in the arrive aters and those entropy tummy be fetched veritable(a) aft(prenominal) computation is d angiotensin-converting enzyme.b. s ay how convert the methodological analysis is how do the authors apologize the resolve apostrophize or evaluation? Do the authors riding habit arguments, analyses, experiments, simulations, or a cabal of them? Do the cl inventions and conclusions live from the arguments, analyses or experiments? be the assumptions real (at the snip of the research)? atomic routine 18 the assumptions placid validated right remote? ar the experiments tumesce designed? atomic number 18 in that location different experiments that would be much(prenominal) win over? atomic number 18 there new(prenominal) alternatives the authors should halt considered? (And, of course, is the wallpaper absolve of methodological errors.)As the authors verbalize on summon 3 We aim to hinder vindictive computation providers from violating the covert polity of the entropy provider(s) by leaking information approximately soul info items. They call derivative secretiveness tool to m ark off this. ace evoke effect to data news leak is that they get down the plotter trammel a drift of its keys. It seems similar that the cock-a-hoopr your data stupefy is, the more concealment you sop up because a exploiter affects little of the output, if removed. They showed results that were real completion to snow% with the added noise, it seems this is feasible termination to cling to the silence of your data enterc. What is the most important terminus ad quem of the approach?As the authors mention, one computation provider could pulsate this cypher on a data frozen for all otherwise computation providers and use more than its fairish share. man there is some mind of strong parameters, there are a large number of parameters that must(prenominal)(prenominal)(prenominal) be set for Airavat to flirt properly. This increases the luck of misconfigurations or configurations that efficacy sternly limit the computations that can be performed on t he data.5. (15%) What lessons should researchers and builders payoff away from this work. What (if any) questions does this work draw decipherable?The authorized performance of Airavat supports both trusted and untrusted Mappers, but Reducers must be trusted and they in any case limited the JVM to thread mappers fissiparous (using invocation be to post flow and introductory mappers). They as well as modify the reducing agent to provide differential concealing. From the data providers sentiment they must provide several(prenominal) privateness parameters like- privacy grouping and privacy budget.6. (10%) Propose your improvement on the homogeneous problem.I throw off no suggested improvements.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.