International Journal of Engineering
Trends and Technology

Research Article | Open Access | Download PDF

Volume 45 | Number 4 | Year 2017 | Article Id. IJETT-V45P283 | DOI : https://doi.org/10.14445/22315381/IJETT-V45P283

Hadoop Identity Authentication using Public Private Key Concept


Risha Tabassum, Dr. Nidhi Tyagi

Citation :

Risha Tabassum, Dr. Nidhi Tyagi, "Hadoop Identity Authentication using Public Private Key Concept," International Journal of Engineering Trends and Technology (IJETT), vol. 45, no. 4, pp. 436-442, 2017. Crossref, https://doi.org/10.14445/22315381/IJETT-V45P283

Abstract

Protection from unauthorized access to data and information is notable challenge within data transmission process. One of the best known public key encryption algorithms is the RSA (Rivest, Shamir, Adleman) algorithm [3], which is based on the principles of number theory. Hadoop supports to authenticate its clients and users using Kerberos for security. This paper suggests the authentication mechanism of Kerberos protocol under HDFS and provide security to the communication channel with help of RSA. It modifies Kerberos protocol by using RSA public key encryption and data signature mechanism. It provides a more reliable and efficient identity authentication solution for HDFS.

Keywords

HDFS, Kerberos, Public key encryption, RSA.

References

[1] ZHOU Xianwei, LI Shuai, and LIN Fuhong,” Big Data security and privacy: Review”,2014:135-145.
[2] Bindiya M.K & Ravi Kumar G.k, “Securing Big Data over network using MD5 algorithm technique”, IJCS, Volume 123- No.15, August 2015. Kalyani Shirudkar & Dilip Motwani, “Big-Data security”, IJARCSSE, Volume 5, Issue 3, March 2015.
[3] Lohr s, “The age of big data[J]”. New York Times, 2012, 11.
[4] Steven M. Bellovin,Michael Merritt, “ Limitations of the Kerberos Authentication System”, AT&T Bell Laboratories.
[5] Tom Davenport, IIA Director of Research & faculty leader. http://www.sas.com/en_ca/news/sascom/2014q3/big-datadavenport. html
[6] McCune J C. Data, data everywhere [J]. Management Review, 1998, 87(10): 10-12.

Time: 0.0013 sec Memory: 32 KB
Current: 1.87 MB
Peak: 4 MB