{"title":"A Novel Authentication Service for Hadoop in Cloud Environment","authors":"G. Sadasivam, K. Kumari, S. Rubika","doi":"10.1109/CCEM.2012.6354591","DOIUrl":null,"url":null,"abstract":"Authentication remains as significant security challenge in hadoop environment. Hadoop does not strongly authenticate the client. As a result, data nodes can be accessed using block locations. This paper suggests the usage of the fundamental properties of a triangle and dual servers to improve the security level of hadoop clusters The password given by the user is interpreted and alienated into more than one unit using the authentication server and stored in multiple Backend Servers along with the corresponding username. The Authentication Server uses the values stored in multiple Backend Servers to authenticate the user. Authentication and Backend servers work together to authenticate the user. The registration process and the authentication process are hosted as a web service to authenticate the users before logging into the hadoop cluster. This paper suggests three approaches for security enhancement in hadoop environment based on triangle properties. An analysis on the security level and complexity of these approaches has also been presented in this paper.","PeriodicalId":409273,"journal":{"name":"2012 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCEM.2012.6354591","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15
Abstract
Authentication remains as significant security challenge in hadoop environment. Hadoop does not strongly authenticate the client. As a result, data nodes can be accessed using block locations. This paper suggests the usage of the fundamental properties of a triangle and dual servers to improve the security level of hadoop clusters The password given by the user is interpreted and alienated into more than one unit using the authentication server and stored in multiple Backend Servers along with the corresponding username. The Authentication Server uses the values stored in multiple Backend Servers to authenticate the user. Authentication and Backend servers work together to authenticate the user. The registration process and the authentication process are hosted as a web service to authenticate the users before logging into the hadoop cluster. This paper suggests three approaches for security enhancement in hadoop environment based on triangle properties. An analysis on the security level and complexity of these approaches has also been presented in this paper.