Preview

Airavat: Security and Privacy for MapReduce

Better Essays
Open Document
Open Document
762 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Airavat: Security and Privacy for MapReduce
Paper Critique: “Airavat: Security and Privacy for MapReduce”
Reviewer: Jeffrey A. Ingalsbe

1. (10%) State the problem the paper is trying to solve.

This paper is trying to demonstrate how Airavat, a MapReduce-based system for distributed computations provides end-to-end confidentiality, integrity, and privacy guarantees using a combination of mandatory access control and differential privacy which provides security and privacy guarantees against data leakage.

2. (20%) State the main contribution of the paper: solving a new problem, proposing a new algorithm, or presenting a new evaluation (analysis). If a new problem, why was the problem important? Is the problem still important today? Will the problem be important tomorrow? If a new algorithm or new evaluation (analysis), what are the improvements over previous algorithms or evaluations? How do they come up with the new algorithm or evaluation?

The main contribution of the paper is that Airavat builds on mandatory access control (MAC) and differential privacy to ensure untrusted MapReduce computations on sensitive data do not leak private information and provide confidentiality, integrity, and privacy guarantees. The goal is to prevent malicious computation providers from violating privacy policies a data provider imposes on the data to prevent leaking information about individual items in the data. The system is implemented as a modification to MapReduce and the Java virtual machine, and runs on top of SELinux

3. (15%) Summarize the (at most) 3 key main ideas (each in 1 sentence.)

(1) First work to add MAC and differential privacy to mapreduce.
(2) Proposes a new framework for privacy preserving mapreduce computations.
(3) Confines untrusted code.

4. (30%) Critique the main contribution a. Rate the significance of the paper on a scale of 5 (breakthrough), 4 (significant contribution), 3 (modest contribution), 2 (incremental contribution), 1 (no contribution or

You May Also Find These Documents Helpful

  • Powerful Essays

    Privacy of communications is essential to ensure that data cannot be modified or viewed in transit. Distributed environments bring with them the possibility that a malicious third party can perpetrate a computer crime by tampering with data as it moves between sites.…

    • 4620 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    LAS432 Project Rubrics 3

    • 831 Words
    • 6 Pages

    Your contribution to the paper will be evaluated according to the complexity of the material, the thoroughness of your research, the quality of the analysis and synthesis of other course material, and your writing skills. I will look at how well your team covered off on all requirements and how your section fits into the overall project.…

    • 831 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    3. Based on this information, explain whether your article for this week was peer reviewed? How can you determine this information?…

    • 694 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    II. The explanation and supportive reasoning why these papers are ranked the way they are.…

    • 344 Words
    • 2 Pages
    Good Essays
  • Better Essays

    5. Has the researcher avoided citing a large number of resources for a single point? No. Rating Scale of 1.…

    • 1634 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    The particular motivation behind this paper is to portray the confirmation process and to portray how this and other data security contemplations will influence the configuration and advancement process for new data frameworks.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    The scholarly criteria for this paper includes neutrality throughout the paper, sources/studies to back up claims and vast knowledge of the subject which becomes obvious with the complex words and explanations. Neutrality is important so you do not allow your own biases to skew the results of your study or you paper. Without neutrality, you might overlook details that could potentially counter your ideas. Sources and studies are very important to prove that your ideas are wrong or right with direct numbers. Since numbers can't lie they will always give you the truth if the calculations are right. A vast knowledge of your subject is also very important especially with writing an article to teach other people. You can't teach…

    • 666 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    3. State the processes you intend to review the journal article with? (50-75 words- 5…

    • 699 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    After taking a review of the analysis ,we rate each alternative on each criterion, using a scale of one to five, with one representing very poor and five representing very good.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Grading for this assignment will be based on answer quality, logic/organization of the paper, and…

    • 2161 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    sandel paper

    • 692 Words
    • 3 Pages

    The evaluation of the papers will be based on thoroughness (including adequate coverage of relevant issues/techniques as well as references to the related work), soundness (including justification for any claims made, illustrative example, correct and adequate analysis of connections or relationships among concepts or techniques), clarity/organization, and significance (defined by the degree to which the paper covers new material, and the extent of the original work by the author in drawing conclusions…

    • 692 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Week 3 Case Study CIS 500

    • 711 Words
    • 3 Pages

    Strader, whom is the CIO at Volvo, created vehicles that are data rich it environments given that consumers today highly value smart tech as much as automotive engineering. Volvo Car Corporation is one of the car industry’s most well-known brands. Volvo brand focuses on passengers and drivers; for the fact that the company strive to develop some of the safest cars on the road.…

    • 711 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nist 800-125

    • 15467 Words
    • 62 Pages

    The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations.…

    • 15467 Words
    • 62 Pages
    Powerful Essays
  • Powerful Essays

    Research Methods Outline

    • 5723 Words
    • 23 Pages

    4. Reflect on 1, 2 & 3. Then discuss how research has generated new knowledge…

    • 5723 Words
    • 23 Pages
    Powerful Essays