[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2791405.2791410acmotherconferencesArticle/Chapter ViewAbstractPublication PageswciConference Proceedingsconference-collections
research-article

A Robust and Light Weight Authentication Framework for Hadoop File System in Cloud Computing Environment

Published: 10 August 2015 Publication History

Abstract

The advancement of web and mobile technologies results in the rapid augmentation of traditional enterprise data, IoT generated data, social media data which outcomes in peta bytes and exa bytes of structured and un structured data across clusters of servers per day. The storage, processing, analyzing and securing these big data is becoming a serious concern to large and medium enterprises. Hadoop or HDFS is a distributed file system based on cloud for storage and processing of large voluminous amounts of data across clusters of servers. Along with huge potential for dynamism for processing and scalability, HDFS also brought inherent security drawbacks like lack of authentication and authorization of remote user connecting to cluster, missing of encryption of sensitive data at communication, storage and processing levels. These existing drawbacks demands for a robust, light weight security framework for HDFS. In this context, we propose a secure and light weight remote user authentication framework for HDFS, which guarantees all the critical security requirements of a distributed file system.

References

[1]
Rahul, P. K. GireeshKumar T. 2015. A Novel Authentication Framework for Hadoop, International conference on Intelligence and Evolutionary Algorithms in Engineering Systems (ICAEES 201), Vol 324, 2015, pp 333--340.
[2]
Venkata, N. I., Sailaja, A., and Srinivasa Rao, R. security issues associated with big data in cloud computing, International Journal of Network Security & Its Applications (IJNSA), Vol. 6, No. 3, May 2014.
[3]
Devaraj, D., Owen, O., 'Malley., Sanjay, R., Kan., Z., and, Adding security to Apache Hadoop, Horton works Technical report1, http://hortonworks.com/wp-content/uploads/2011/10/security-design_withCover-1.pdf.
[4]
Nivethitha, S., Gangaa A., and Shankar, S. Authentication Service in Hadoop Using one Time Pad, Indian Journal of Science & Technology, vol 7, pp 56--62, Apr 2014.
[5]
Sadasivam G.S., Kumari, K. A., and Rubika S. A Novel Authentication Service for Hadoop in Cloud Environment, IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), pp 1--6, oct 2012, India.
[6]
Jam, M.R, Khanli, L.M., Javan M.S., andAkbari, M.K. A survey on security of Hadoop, International eConference on Computer and Knowledge Engineering (ICCKE), pp: 716--721, 29-30 Oct. 2014, India.
[7]
Sandeep, K.S. "An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol", International Journal of Network Security, Vol. 14, PP. 39--46, Jan. 2012.
[8]
Zhou, Quan., Deqin, Xiao., Tang. H., and Chunming R. TSHC: Trusted Scheme for Hadoop Cluster, Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), 9-11 Sept. 2013.
[9]
Ibrahim, L., and Ning, Zhang., MapReduce: MR Model Abstraction for Future Security Study, In Proc of the 7th International Conference on Security of Information and Networks, SIN '14, 9-11 Sep, Univ of Glasgow, 2014.
[10]
Yoon, S., J., and Yong, T., K. A token-based authentication security scheme for Hadoop distributed file system using elliptic curve cryptography, springer journal of Journal of Computer Virology and Hacking Techniques, February 2015.
[11]
James, D. and Ning, Zhang. Security issues relating to inadequate authentication in map reduce applications. In High Performance Computing and Simulation (HPCS), 2013 International Conference on, pages 281--288. IEEE, 2013.
[12]
Yoon, S., Jeong, Y., T., K. A token-based authentication security scheme for Hadoop distributed file system using elliptic curve cryptography, springer journal of Journal of Computer Virology and Hacking Techniques.
[13]
Bhushan, L. Open Source Authentication in Hadoop, Springer journal of Practical Hadoop Security, 2014, pp 51--74
[14]
Ibrahim, L., and Ning, Z. SIN '14 Proceedings of the 7th International Conference on Security of Information and Networks, MapReduce: MR Model Abstraction for Future Security Study.
[15]
Byoung, J.B, Young, J.K., Young, K.Kim., Ok, K.Ha., and Yong, K. An Intrusive Analyzer for Hadoop Systems Based on Wireless Sensor Networks International Journal of Distributed Sensor Networks, Volume 2014.

Index Terms

  1. A Robust and Light Weight Authentication Framework for Hadoop File System in Cloud Computing Environment

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    WCI '15: Proceedings of the Third International Symposium on Women in Computing and Informatics
    August 2015
    763 pages
    ISBN:9781450333610
    DOI:10.1145/2791405
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 10 August 2015

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Authentication
    2. Authorization
    3. Big Data
    4. Hadoop Distributed File System
    5. Hadoop Framework

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    WCI '15

    Acceptance Rates

    WCI '15 Paper Acceptance Rate 98 of 452 submissions, 22%;
    Overall Acceptance Rate 98 of 452 submissions, 22%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 212
      Total Downloads
    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 11 Dec 2024

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media