Hadoop is one of well-known "Big Data" frameworks studied widely and used by major vendors such as Yahoo! and Facebook. However current version of Hadoop Framework has a number of security vulnerabilities in its architecture and also in its implementation. Many research articles have studied its vulnerabilities and some of them proposed their own security schemes. This paper introduces PK scheme, one of Hadoop security schemes, and presents its well-designed security protocol and also its performance problem. PK scheme is based on one-time token method, and pretty strong to prevent vulnerability of the block access token which acts as a proof of user's access right on data blocks. This paper introduces a novel approach making up its performance problem, and proposes efficient security scheme which is based on hash chain method.
[1]
Sang-Soo Yeo,et al.
Scalable and Flexible Privacy Protection Scheme for RFID Systems
,
2005,
ESAS.
[2]
Ik Rae Jeong,et al.
A Study on Security Improvement in Hadoop Distributed File System Based on Kerberos
,
2013,
Inscrypt 2013.
[3]
Hairong Kuang,et al.
The Hadoop Distributed File System
,
2010,
2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST).
[4]
H. Y. Kim,et al.
Trends in Technology of Cloud Computing
,
2009
.
[5]
Sanjay Ghemawat,et al.
MapReduce: Simplified Data Processing on Large Clusters
,
2004,
OSDI.
[6]
Leslie Lamport,et al.
Password authentication with insecure communication
,
1981,
CACM.