Affiliation:
1. School of Information Technology and Engineering, VIT Vellore , Tamilnadu , India
Abstract
Abstract
Apache Hadoop answers the quest of handling Bigdata for most organizations. It offers distributed storage and data analysis via Hadoop Distributed File System (HDFS) and Map-Reduce frameworks. Hadoop depends on third-party security providers like Kerberos for its security requirements. Kerberos by itself comes with many security loopholes like Single point of Failure (SoF), Dictionary Attacks, Time Synchronization and Insider Attacks. This paper suggests a solution that aims to eradicate the security issues in the Hadoop Cluster with a focus on Dictionary Attacks and Single Point of Failure. The scheme roots on Secure Remote Password Protocol, Blockchain Technology and Threshold Cryptography. Practical Byzantine Fault Tolerance mechanism (PBFT) is deployed at the blockchain as the consensus mechanism. The proposed scheme outperforms many of the existing schemes in terms of computational overhead and storage requirements without compromising the security level offered by the system. Riverbed Modeller (AE) Simulation results strengthen the aforesaid claims.
Reference34 articles.
1. 1. Rahul, P. K., T. Gireesh Kumar. A Novel Authentication Framework for Hadoop. – Advances in Intelligent Systems and Computing, Vol. 324, 2015, pp. 333-340.10.1007/978-81-322-2126-5_37
2. 2. Lingappa, R. What Is Secure Remote Password (SRP) Protocol and How to Use It? The Startup, Medium. 2019. Accessed 15 March 2021. https://medium.com/swlh/what-is-secure-remote-password-srp-protocol-and-how-to-use-it-70e415b94a76
3. 3. Hena, M., N. Jeyanthi. Authentication Framework for Kerberos Enabled Hadoop Clusters. – Int. J. Eng. Adv. Technol., Vol. 9, 2019, No 1, pp. 510-519.10.35940/ijeat.A9638.109119
4. 4. Castro, M., B. Liskov. Practical Byzantine Fault Tolerance. – In: Proc. of 3rd Symposium on Operating Systems Design and Implementation, New Orleans, USA, February 1999, pp. 1-14.
5. 5. Li, R., H. Asaeda, J. Li, X. Fu. A Distributed Authentication and Authorization Scheme for In-Network Big Data Sharing. – Digit. Commun. Networks, Vol. 3, November 2017, No 4, pp. 226-235.10.1016/j.dcan.2017.06.001
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A New Architecture for Data Analysis on Blockchain Without Data Replication;Lecture Notes in Information Systems and Organisation;2024
2. Data Analysis on Blockchain Distributed File Systems: Systematic Literature Review;Proceedings of the 31st International Conference on Information Systems Development;2023-10-05
3. DKSM: A Decentralized Kerberos Secure Service-Management Protocol for Internet of Things;Internet of Things;2023-10
4. Small file storage optimization model in cloud environment;2022 IEEE 10th Joint International Information Technology and Artificial Intelligence Conference (ITAIC);2022-06-17