skip to main content
10.1145/2506155.2506157acmotherconferencesArticle/Chapter ViewAbstractPublication PagesdisccoConference Proceedingsconference-collections
research-article

Assessing data availability of Cassandra in the presence of non-accurate membership

Published:30 September 2013Publication History

ABSTRACT

Data Centers are evolving to adapt to emerging IT trends such as Big Data and Cloud Computing, which push for increased scalability and improved service availability. Among the side effects of this kind of evolution, the proliferation of new security breaches represents a major issue that usually does not get properly addressed since the focus tends to be kept on developing an innovative high-performance technology rather than making it secure. Consequently, new distributed applications deployed on Data Centers turn out to be vulnerable to malicious attacks. This paper analyzes the vulnerabilities of the gossip-based membership protocol used by Cassandra, a well-known distributed NoSQL Database. Cassandra is being widely employed as storage service in applications where very large data volumes have to be managed. An attack exploiting such weaknesses is presented, which impacts on Cassandra's availability by affecting both the latency and the successful outcome of requests. A lightweight solution is also proposed that prevents this threat from succeeding at the price of a negligible overhead.

References

  1. R. Baldoni, S. Bonomi, and A. S. Nezhad. An algorithm for implementing bft registers in distributed systems with bounded churn. In SSS'11, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. Baldoni, M. Platania, L. Querzoni, and S. Scipioni. Practical uniform peer sampling under churn. In ISPDC '10, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. A. Bazzi. Synchronous byzantine quorum systems. Distributed Computing, 13(1):45--52, Jan. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. E. Bortnikov, M. Gurevich, I. Keidar, G. Kliot, and A. Shraer. Brahms: byzantine resilient random membership sampling. In PODC '08, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Castro and B. Liskov. Practical byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst., 20(4):398--461, Nov. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Cisco Systems. Cisco Annual Security Report, 2013. Available: http://www.cisco.com/en/US/prod/vpndevc/annual_security_report.html.Google ScholarGoogle Scholar
  7. DataStax. Case Study: Adobe, 2011. Available: http://www.datastax.com/wp-content/uploads/2012/11/DataStax-CS-Adobe.pdf.Google ScholarGoogle Scholar
  8. J. R. Douceur. The sybil attack. In First International Workshop on Peer-to-Peer Systems, IPTPS '01, pages 251--260, London, UK, UK, 2002. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. G. P. Jesi, A. Montresor, and M. van Steen. Secure peer sampling. Computer Networks, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Lakshman and P. Malik. Cassandra: structured storage system on a p2p network. In PODC '09, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Malkhi and M. Reiter. Byzantine quorum systems. Distributed Computing, 11(4):203--213, Oct. 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Netflïx. Astyanax, Cassandra Java client, 2012. Project Homepage: https://github.com/Netflix/astyanax.Google ScholarGoogle Scholar
  13. L. Okman, N. Gal-Oz, Y. Gonen, E. Gudes, and J. Abramov. Security issues in nosql databases. In TRUSTCOM '11, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. F. B. Schneider. Implementing fault-tolerant services using the state machine approach: a tutorial. ACM Computing Surveys, 22(4):299--319, Dec. 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. P. Sousa, A. Bessani, M. Correia, N. Neves, and P. Verissimo. Highly available intrusion-tolerant services with proactive-reactive recovery. Parallel and Distributed Systems, IEEE Transactions on, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Symantec Corporation. State of the Data Center Survey, Global Results, 2012. Available: http://bit.ly/OHGNw0.Google ScholarGoogle Scholar
  1. Assessing data availability of Cassandra in the presence of non-accurate membership

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          DISCCO '13: Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing
          September 2013
          27 pages
          ISBN:9781450322485
          DOI:10.1145/2506155
          • Editors:
          • Miguel Correia,
          • Neeraj Mittal

          Copyright © 2013 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 30 September 2013

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          DISCCO '13 Paper Acceptance Rate4of5submissions,80%Overall Acceptance Rate4of5submissions,80%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader