CONCLUSION
We studied the potential internal cloud attacks to Hadoop
in a public cloud. We designed and implemented SEHadoop
model that consists of SEHadoop runtime model, SEHadoop
Block Token and SEHadoop Delegation Token to improve
compromise resilience of Hadoop in a public cloud. SEHadoop
model enhances isolation level among Hadoop components
and enforces least access privilege on Hadoop processes. Our
experimental results exhibit how enhanced isolation and least
access privilege of SEHadoop prevent attackers from using
compromised Hadoop processes to compromise the rest of
components of Hadoop. SEHadoop Block Token does not