RELATED WORK
We believe that we are the first to offer a low-overhead
compromise resilience solution to Hadoop in a public cloud.
We are not aware of any published discussion of the impact of
low isolation level and the lack of fine-grained access control
in Hadoop. The overloaded authentication keys vulnerability
was discussed in the Hadoop security design report [1], but
the authors of that report were relatively dismissive of its
impact. In general, a number of of researchers investigated
at improving security of Hadoop running in a cloud. Myers
and Abdelnur implemented encrypted channel for Hadoop
various communications [16], [17]. Tahoe [18] encrypts data
in a distributed file system and performs integrity-check on
its gateway. HIMA [14] is hypervisor-based agent to measure
integrity of user programs in VM which can improve overall
security of a cloud environment.