{"id":"https://openalex.org/W2512063315","doi":"https://doi.org/10.1109/tbdata.2016.2599928","title":"MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-Based Verifications","display_name":"MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-Based Verifications","publication_year":2016,"publication_date":"2016-08-18","ids":{"openalex":"https://openalex.org/W2512063315","doi":"https://doi.org/10.1109/tbdata.2016.2599928","mag":"2512063315"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tbdata.2016.2599928","pdf_url":null,"source":{"id":"https://openalex.org/S2491400915","display_name":"IEEE Transactions on Big Data","issn_l":"2332-7790","issn":["2332-7790","2372-2096"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5107835489","display_name":"Yongzhi Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"funder","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongzhi Wang","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, Xi'an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi'an, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043356063","display_name":"Yulong Shen","orcid":"https://orcid.org/0000-0002-8448-705X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"funder","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yulong Shen","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, Xi'an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi'an, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100403969","display_name":"Hua Wang","orcid":"https://orcid.org/0000-0002-8465-0996"},"institutions":[{"id":"https://openalex.org/I71270174","display_name":"Victoria University","ror":"https://ror.org/04j757h98","country_code":"AU","type":"funder","lineage":["https://openalex.org/I71270174"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Hua Wang","raw_affiliation_strings":["Centre of Applied Informatics, Victoria University, Melbourne, Vic., Australia"],"affiliations":[{"raw_affiliation_string":"Centre of Applied Informatics, Victoria University, Melbourne, Vic., Australia","institution_ids":["https://openalex.org/I71270174"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071311514","display_name":"Jinli Cao","orcid":"https://orcid.org/0000-0002-0221-6361"},"institutions":[{"id":"https://openalex.org/I196829312","display_name":"La Trobe University","ror":"https://ror.org/01rxfrp27","country_code":"AU","type":"funder","lineage":["https://openalex.org/I196829312"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jinli Cao","raw_affiliation_strings":["Department of Computer Science and Computer Engineering, La Trobe University, Melbourne, Vic., Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Computer Engineering, La Trobe University, Melbourne, Vic., Australia","institution_ids":["https://openalex.org/I196829312"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014884811","display_name":"Xiaohong Jiang","orcid":"https://orcid.org/0000-0001-9739-1930"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"funder","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaohong Jiang","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.404,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":50,"citation_normalized_percentile":{"value":0.919234,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"4","issue":"3","first_page":"418","last_page":"431"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9971,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9971,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9965,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9948,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.5629552},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.47862357}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.87044054},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.7898488},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.787741},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.71068966},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.6606292},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.5629552},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.47862357},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.47142905},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.43775472},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22358179},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.20264745},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.19006106},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16913483},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tbdata.2016.2599928","pdf_url":null,"source":{"id":"https://openalex.org/S2491400915","display_name":"IEEE Transactions on Big Data","issn_l":"2332-7790","issn":["2332-7790","2372-2096"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.66,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61602364"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61373173"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"U1536202"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61571352"},{"funder":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities","award_id":"JB160312"},{"funder":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities","award_id":"BDY131419"},{"funder":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities","award_id":"XJS16042"}],"datasets":[],"versions":[],"referenced_works_count":31,"referenced_works":["https://openalex.org/W1271915645","https://openalex.org/W1503242180","https://openalex.org/W1504669610","https://openalex.org/W1576967699","https://openalex.org/W1600255172","https://openalex.org/W1632686634","https://openalex.org/W1993854458","https://openalex.org/W2005759443","https://openalex.org/W2013608896","https://openalex.org/W2020063067","https://openalex.org/W2067410255","https://openalex.org/W2094348610","https://openalex.org/W2106289562","https://openalex.org/W2114579022","https://openalex.org/W2123144030","https://openalex.org/W2126087831","https://openalex.org/W2126924915","https://openalex.org/W2129467152","https://openalex.org/W2139359217","https://openalex.org/W2141102961","https://openalex.org/W2147524598","https://openalex.org/W2151167752","https://openalex.org/W2153575752","https://openalex.org/W2173213060","https://openalex.org/W2311542229","https://openalex.org/W2343858165","https://openalex.org/W2784203613","https://openalex.org/W3137092842","https://openalex.org/W3151869053","https://openalex.org/W4210484371","https://openalex.org/W4253217431"],"related_works":["https://openalex.org/W4362686666","https://openalex.org/W4319993352","https://openalex.org/W4286797639","https://openalex.org/W4210438071","https://openalex.org/W3156380347","https://openalex.org/W3152823548","https://openalex.org/W2534156288","https://openalex.org/W2397192327","https://openalex.org/W2141006951","https://openalex.org/W2125735429"],"abstract_inverted_index":{"Big":[0],"data":[1,20,33,60],"applications":[2],"have":[3],"made":[4],"significant":[5,51],"impacts":[6],"in":[7,56,172,203,214],"recent":[8],"years":[9],"thanks":[10],"to":[11,30,36,156],"the":[12,37,40,49,57,99,103,107,111,129,139,145,186],"fast":[13],"growth":[14],"of":[15,48,79,94,123,147,153,174,212],"cloud":[16,24,88,131],"computing":[17,61],"and":[18,90,106,110,132,160,178],"big":[19,32,59],"infrastructures.":[21],"However,":[22],"public":[23,41],"is":[25,46,168],"still":[26],"not":[27],"widely":[28],"accepted":[29],"perform":[31,150],"computing,":[34],"due":[35],"concern":[38],"with":[39],"cloud's":[42],"security.":[43],"Result":[44],"integrity":[45,78,177],"one":[47],"most":[50],"security":[52,159],"problems":[53],"that":[54,74,166,215],"exists":[55],"cloud-based":[58],"scenario.":[62],"In":[63,115],"this":[64],"paper,":[65],"we":[66,149],"propose":[67],"MtMR,":[68,148],"a":[69,86,120,151,169],"Merkle":[70,95,134],"tree-based":[71,96,135],"verification":[72,136],"method":[73,171],"assures":[75],"high":[76,175],"result":[77,176],"MapReduce":[80,84],"jobs.":[81],"MtMR":[82,118,167,194],"overlays":[83],"on":[85,98,128,137,144],"hybrid":[87],"environment":[89],"applies":[91],"two":[92],"rounds":[93],"verifications":[97],"prereduce":[100],"phase":[101,105],"(i.e.,":[102],"map":[104],"shuffle":[108],"phase)":[109],"reduce":[112,124,205],"phase,":[113],"respectively.":[114],"each":[116,204],"round,":[117],"samples":[119],"small":[121],"portion":[122],"task":[125,140,206],"input/output":[126,141],"records":[127,202,213],"private":[130],"performs":[133],"all":[138],"records.":[142],"Based":[143],"design":[146],"series":[152],"theoretical":[154],"studies":[155],"analyze":[157],"its":[158],"performance":[161,180],"overhead.":[162,181],"Our":[163],"results":[164],"indicate":[165],"promising":[170],"terms":[173],"low":[179],"For":[182],"example,":[183],"by":[184,207],"setting":[185],"sampled":[187],"record":[188],"ratio":[189],"as":[190],"an":[191],"optimal":[192],"value,":[193],"can":[195],"guarantee":[196],"no":[197],"more":[198],"than":[199],"10":[200],"incorrect":[201],"sampling":[208],"only":[209],"4":[210],"percent":[211],"task.":[216]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2512063315","counts_by_year":[{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":19},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":3}],"updated_date":"2025-04-29T18:19:10.714565","created_date":"2016-09-16"}