Yan Ding, Huaimin Wang, Songzheng Chen, Xiaodong Tang, Hongyi Fu, Peichang Shi
{"title":"PIIM: Method of Identifying Malicious Workers in the MapReduce System with an Open Environment","authors":"Yan Ding, Huaimin Wang, Songzheng Chen, Xiaodong Tang, Hongyi Fu, Peichang Shi","doi":"10.1109/SOSE.2014.47","DOIUrl":"https://doi.org/10.1109/SOSE.2014.47","url":null,"abstract":"MapReduce is widely utilized as a typical computation model of mass data processing. When a MapReduce framework is deployed in an open computation environment, the trustworthiness of the participant workers becomes an important issue because of security threats and the motivation of subjective cheating. Current integrity protection mechanisms are based on replication techniques and use redundant computation to process the same task. However, these solutions require a large amount of computation resource and lack scalability. A probe injection-based identification of malicious worker (PIIM) method is explored in this study. The method randomly injects the probes, whose results are previously known, into the input data and detects malicious workers by analyzing the processed results of the probes. A method of obtaining the set of workers involved in the computation of each probe is proposed by analyzing the shuffle phase in the MapReduce programming model. An EnginTrust-based reputation mechanism that employs information on probe execution is then designed to evaluate the trustworthiness of all the workers and detect the malicious ones. The proposed method operates at the application level and requires no modification to the MapReduce framework. Simulation experiments indicate that the proposed method is effective in detecting malicious workers in large-scale computations. In a system with 100 workers wherein 20 of them are malicious, a detection rate of above 97% can be achieved with only 500 randomly injected probes.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115048146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Empirical Patterns in Google Scholar Citation Counts","authors":"Peter T. Breuer, Jonathan P. Bowen","doi":"10.1109/SOSE.2014.55","DOIUrl":"https://doi.org/10.1109/SOSE.2014.55","url":null,"abstract":"Scholarly impact can be measured crudely by the number of citations as a approximate indication of impact in terms of influencing other researchers, but this metric varies in applicability between disciplines. The number of citations for each publication of an author can be mapped as a graph in various ways. In doing so, certain empirical patterns may be discerned. This paper explores these patterns, using citation data from Google Scholar for a number of authors.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116029081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}