INTRODUCTION OF AN AUTHENTICATION METHOD FOR SECURING DATA IN HADOOP SYSTEM

J. Srividya, Veernala Swapna

Abstract


The increasing popularity of cloud basis Hadoop system has led to the improvisation of security. It permits users for storing and processing purpose of huge data at exceptionally low costs however it lacks security measures to carry out satisfactory authentication as well as authorization of users and services. In our work we introduce a token-based approach which provides more secured protection of distributed file system data without burdening authentication functions. The introduced authentication approach protects sensitive distributed file system data against various attacks such as impersonation and replay attacks. The system will make use of hash chain of authentication keys, rather than public key-basis authentication keys which are found in existed file systems. The scheme allows clients to be verified by data node by the use of block access token while thwarting replay as well as impersonation attacks. The proposed system will include an additional layer of security towards the traditional symmetric key Hadoop’s distributed file system authentication process. The technology of elliptic curve cryptography makes authentication keys unidentified, thus protecting them against various attacks. The scheme allows clients to be verified by data node by the use of block access token while thwarting replay as well as impersonation attacks.


Keywords


Hadoop System; Token-Based; Distributed File System; Hash Chain; Elliptic Curve Cryptography; Authentication Keys;

References


. Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. In: Proceedings of Sixth Symposium on Operating System Design and Implementation (OSDI04), pp. 137–150 (2004).

. Shvachko, K., Kuang, H., Radia, S., Chansler, R.: The Hadoop distributed file system. In: Proceedings of the 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), pp. 1–10 (2010).

. Vatamanu, C.,Gavilut,D., Benchea, R.M.: Building a practical and reliable classifier for malware detection. J. Comput.Virol.Hacking Tech. 9(4), 205–214 (2013).

. Lee, S.H., Lee,D.W.:Current status of BigData utilization. J. Digit. Converg. 11(2), 229–233 (2013).

. White, T.: Hadoop The Definitive Guide, 2nd edn, pp. 41–47. O’Reilly Media, Sebastopol (2009).

. Condie, T., Conway, N., Alvaro, P., Hellerstein, J.M., Elmeleegy,K., Sears, R.: MapReduce Online. In: Proceedings of NSDI’10 (2010).


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.