Hadoop Identity Authentication using Public Private Key Concept

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2017 by IJETT Journal
Volume-45 Number-9
Year of Publication : 2017
Authors : Risha Tabassum, Dr. Nidhi Tyagi
DOI :  10.14445/22315381/IJETT-V45P283

Citation 

Risha Tabassum, Dr. Nidhi Tyagi "Hadoop Identity Authentication using Public Private Key Concept", International Journal of Engineering Trends and Technology (IJETT), V45(9),436-442 March 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
Protection from unauthorized access to data and information is notable challenge within data transmission process. One of the best known public key encryption algorithms is the RSA (Rivest, Shamir, Adleman) algorithm [3], which is based on the principles of number theory. Hadoop supports to authenticate its clients and users using Kerberos for security. This paper suggests the authentication mechanism of Kerberos protocol under HDFS and provide security to the communication channel with help of RSA. It modifies Kerberos protocol by using RSA public key encryption and data signature mechanism. It provides a more reliable and efficient identity authentication solution for HDFS.

 References

[1] ZHOU Xianwei, LI Shuai, and LIN Fuhong,” Big Data security and privacy: Review”,2014:135-145.
[2] Bindiya M.K & Ravi Kumar G.k, “Securing Big Data over network using MD5 algorithm technique”, IJCS, Volume 123- No.15, August 2015. Kalyani Shirudkar & Dilip Motwani, “Big-Data security”, IJARCSSE, Volume 5, Issue 3, March 2015.
[3] Lohr s, “The age of big data[J]”. New York Times, 2012, 11.
[4] Steven M. Bellovin,Michael Merritt, “ Limitations of the Kerberos Authentication System”, AT&T Bell Laboratories.
[5] Tom Davenport, IIA Director of Research & faculty leader. http://www.sas.com/en_ca/news/sascom/2014q3/big-datadavenport. html
[6] McCune J C. Data, data everywhere [J]. Management Review, 1998, 87(10): 10-12.

Keywords
HDFS, Kerberos, Public key encryption, RSA.