{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T13:18:20Z","timestamp":1753881500400,"version":"3.41.2"},"reference-count":27,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T00:00:00Z","timestamp":1625788800000},"content-version":"vor","delay-in-days":189,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","award":["MOBTT75"],"award-info":[{"award-number":["MOBTT75"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Computational Intelligence and Neuroscience"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>With the daily increase of data production and collection, Hadoop is a platform for processing big data on a distributed system. A master node globally manages running jobs, whereas worker nodes process partitions of the data locally. Hadoop uses MapReduce as an effective computing model. However, Hadoop experiences a high level of security vulnerability over hybrid and public clouds. Specially, several workers can fake results without actually processing their portions of the data. Several redundancy\u2010based approaches have been proposed to counteract this risk. A replication mechanism is used to duplicate all or some of the tasks over multiple workers (nodes). A drawback of such approaches is that they generate a high overhead over the cluster. Additionally, malicious workers can behave well for a long period of time and attack later. This paper presents a novel model to enhance the security of the cloud environment against untrusted workers. A new component called malicious workers\u2019 trap (MWT) is developed to run on the master node to detect malicious (noncollusive and collusive) workers as they convert and attack the system. An implementation to test the proposed model and to analyze the performance of the system shows that the proposed model can accurately detect malicious workers with minor processing overhead compared to vanilla MapReduce and Verifiable MapReduce (V\u2010MR) model [1]. In addition, MWT maintains a balance between the security and usability of the Hadoop cluster.<\/jats:p>","DOI":"10.1155\/2021\/5753948","type":"journal-article","created":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T20:50:09Z","timestamp":1625863809000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Hadoop Security Model for Addressing Malicious Collusive Workers"],"prefix":"10.1155","volume":"2021","author":[{"given":"Amr M.","family":"Sauber","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1879-1026","authenticated-orcid":false,"given":"Ahmed","family":"Awad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2419-8643","authenticated-orcid":false,"given":"Amr F.","family":"Shawish","sequence":"additional","affiliation":[]},{"given":"Passent M.","family":"El-Kafrawy","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,7,9]]},"reference":[{"key":"e_1_2_10_1_2","unstructured":"YoonE.andLiuP. Practical verification of mapreduce computation integrity via partial re-execution 2020 https:\/\/arxiv.org\/abs\/2002.09560."},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1002\/9781119281320.ch7"},{"key":"e_1_2_10_3_2","doi-asserted-by":"crossref","unstructured":"ShvachkoK. KuangH. RadiaS. andChanslerR. The hadoop distributed file system Proceedings of the 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST) May 2010 Lake Tahoe NV USA IEEE 1\u201310 https:\/\/doi.org\/10.1109\/msst.2010.5496972 2-s2.0-77957838299.","DOI":"10.1109\/MSST.2010.5496972"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1088\/1755-1315\/108\/4\/042052"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.25007\/ajnu.v9n1a530"},{"key":"e_1_2_10_6_2","doi-asserted-by":"crossref","unstructured":"ElKafrawyP. M. SauberA. M. andHafezM. M. HDFSX: big data distributed file system with small files support Proceedings of the 12th International Computer Engineering Conference (ICENCO) December 2016 Cairo Egypt IEEE.","DOI":"10.1109\/ICENCO.2016.7856457"},{"key":"e_1_2_10_7_2","doi-asserted-by":"crossref","unstructured":"ElKafrawyP. M. SauberA. M. HafezM. M. andShawishA. F. HDFSx: an enhanced model to handle small files in Hadoop with a simulating toolkit Proceedings of the 1st International Conference on Computer Applications & Information Security (ICCAIS) August 2018 Saudi Arabia Riyadh.","DOI":"10.1109\/CAIS.2018.8442036"},{"key":"e_1_2_10_8_2","doi-asserted-by":"crossref","unstructured":"IslamN. S. ur RahmanM. W. LuX. andPandaD. K. D. K. Efficient data access strategies for Hadoop and Spark on HPC cluster with heterogeneous storage Proceedings of the 2016 IEEE International Conference on Big Data (Big Data) December 2016 Washington D.C. USA IEEE 223\u2013232 https:\/\/doi.org\/10.1109\/bigdata.2016.7840608 2-s2.0-85015157229.","DOI":"10.1109\/BigData.2016.7840608"},{"key":"e_1_2_10_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03491-9"},{"key":"e_1_2_10_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3054129"},{"key":"e_1_2_10_11_2","doi-asserted-by":"crossref","unstructured":"WangY.andWeiJ. VIAF: verification-based integrity assurance framework for MapReduce Proceedings of the 2011 IEEE 4th International Conference on Cloud Computing July 2011 Washington D.C. USA IEEE 300\u2013307 https:\/\/doi.org\/10.1109\/cloud.2011.33 2-s2.0-80053152850.","DOI":"10.1109\/CLOUD.2011.33"},{"key":"e_1_2_10_12_2","doi-asserted-by":"crossref","unstructured":"WeiW. DuJ. YuT. andGuX. SecureMR: A service integrity assurance framework for mapreduce Proceedings of the 2009 Annual Computer Security Applications Conference December 2009 Honolulu HI USA IEEE 73\u201382.","DOI":"10.1109\/ACSAC.2009.17"},{"key":"e_1_2_10_13_2","doi-asserted-by":"crossref","unstructured":"BendahmaneA. EssaaidiM. moussaouiA. E. andYounesA. A new mechanism to ensure integrity for MapReduce in cloud computing Proceedings of the 2012 International Conference on Multimedia Computing and Systems May 2012 Tangiers Morocco IEEE 785\u2013790 https:\/\/doi.org\/10.1109\/icmcs.2012.6320295 2-s2.0-84869853330.","DOI":"10.1109\/ICMCS.2012.6320295"},{"key":"e_1_2_10_14_2","doi-asserted-by":"crossref","unstructured":"WangY. WeiJ. SrivatsaM. DuanY. andDuW. IntegrityMR: integrity assurance framework for big data analytics and management applications Proceedings of the 2013 IEEE International Conference on Big Data October 2013 Silicon Valley CA USA IEEE 33\u201340 https:\/\/doi.org\/10.1109\/bigdata.2013.6691780 2-s2.0-84893248171.","DOI":"10.1109\/BigData.2013.6691780"},{"key":"e_1_2_10_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.07.001"},{"key":"e_1_2_10_16_2","doi-asserted-by":"crossref","unstructured":"DingY. WangH. ShiP. FuH. GuoC. andZhangM. Trusted sampling-based result verification on mass data processing Proceedings of the 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering March 2013 San Francisco CA USA IEEE 391\u2013396 https:\/\/doi.org\/10.1109\/sose.2013.65 2-s2.0-84880915817.","DOI":"10.1109\/SOSE.2013.65"},{"key":"e_1_2_10_17_2","doi-asserted-by":"crossref","unstructured":"El-KafrawyP. M. AbdoA. A. andShawishA. F. Security issues over some cloud models Procedia Computer Science 65 Proceedings of the International Conference on Communication Management and Information Technology ICCMIT 2015 April 2015 Prague - Czech Republic Procedia CS 853\u2013858 https:\/\/doi.org\/10.1016\/j.procs.2015.09.041 2-s2.0-84953324539.","DOI":"10.1016\/j.procs.2015.09.041"},{"key":"e_1_2_10_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5_327"},{"key":"e_1_2_10_19_2","doi-asserted-by":"crossref","unstructured":"HuangJ. NicolD. M. andCampbellR. H. Denial-of-Service threat to hadoop\/YARN clusters with multi-tenancy Proceedings of the 2014 IEEE International Congress on Big Data July 2014 Anchorage AK USA IEEE 48\u201355 https:\/\/doi.org\/10.1109\/bigdata.congress.2014.17 2-s2.0-84923931660.","DOI":"10.1109\/BigData.Congress.2014.17"},{"volume-title":"CompTIA Security+ Study Guide: Exam SY0-101","year":"2006","author":"Pastore M. A.","key":"e_1_2_10_20_2"},{"key":"e_1_2_10_21_2","doi-asserted-by":"crossref","unstructured":"MocaM. SilaghiG. C. andFedakG. Distributed results checking for mapreduce in volunteer computing Proceedings of the 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum May 2011 Anchorage AK USA IEEE 1847\u20131854 https:\/\/doi.org\/10.1109\/ipdps.2011.351 2-s2.0-83455203600.","DOI":"10.1109\/IPDPS.2011.351"},{"key":"e_1_2_10_22_2","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00362-1"},{"key":"e_1_2_10_23_2","doi-asserted-by":"publisher","DOI":"10.3745\/jips.03.0053"},{"key":"e_1_2_10_24_2","doi-asserted-by":"crossref","unstructured":"UlusoyH. KantarciogluM. andPattukE. TrustMR: computation integrity assurance system for MapReduce Proceedings of the 2015 IEEE International Conference on Big Data (Big Data) November 2015 Santa Clara CA USA IEEE 441\u2013450 https:\/\/doi.org\/10.1109\/bigdata.2015.7363785 2-s2.0-84963718582.","DOI":"10.1109\/BigData.2015.7363785"},{"key":"e_1_2_10_25_2","doi-asserted-by":"crossref","unstructured":"WangY. WeiJ. andSrivatsaM. Result integrity check for MapReduce computation on hybrid clouds Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing July 2013 Santa Clara CA USA IEEE 847\u2013854 https:\/\/doi.org\/10.1109\/cloud.2013.118.","DOI":"10.1109\/CLOUD.2013.118"},{"key":"e_1_2_10_26_2","doi-asserted-by":"crossref","unstructured":"RenY.andTangW. A service integrity assurance framework for cloud computing based on MapReduce Proceedings of the 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems November 2012 Hangzhou China IEEE 240\u2013244 https:\/\/doi.org\/10.1109\/ccis.2012.6664404 2-s2.0-84890412195.","DOI":"10.1109\/CCIS.2012.6664404"},{"key":"e_1_2_10_27_2","doi-asserted-by":"publisher","DOI":"10.5120\/12494-9077"}],"container-title":["Computational Intelligence and Neuroscience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/cin\/2021\/5753948.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/cin\/2021\/5753948.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/5753948","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T11:17:51Z","timestamp":1722943071000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/5753948"}},"subtitle":[],"editor":[{"given":"Ahmed Mostafa","family":"Khalil","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/5753948"],"URL":"https:\/\/doi.org\/10.1155\/2021\/5753948","archive":["Portico"],"relation":{},"ISSN":["1687-5265","1687-5273"],"issn-type":[{"type":"print","value":"1687-5265"},{"type":"electronic","value":"1687-5273"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-05-14","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-19","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"5753948"}}