Blockchain based Approach to Enhance Big Data Authentication in Distributed Environment

被引:0
作者
Abdullah, Nazri [1 ]
Hakansson, Anne [1 ]
Moradian, Esmiralda [2 ]
机构
[1] KTH Royal Inst Technol, Sch Informat & Commun Technol, Kista, Sweden
[2] Stockholm Univ, Dept Comp & Syst Sci, Kista, Sweden
来源
2017 NINTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2017) | 2017年
关键词
Big Data; Authentication; Hadoop; Distributed Network; Security; Blockchain; NETWORKS; SECURITY; HADOOP; ATTACK;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Existing authentication protocols for Big Data system such as Apache Hadoop is based on Kerberos. In the Kerberos protocol, there are numerous security issues that have remained unsolved; replay attacks, DDoS and single point of failure are some examples. These indicate potential security vulnerabilities and Big Data risks in using Hadoop. This paper presents drawbacks of Kerberos implementations and identifies authentication requirements that can enhance the security of Big Data in distributed environments. The enhancement proposed is based on the rising technology of blockchain that overcomes shortcomings of Kerberos.
引用
收藏
页码:887 / 892
页数:6
相关论文
共 26 条
[1]  
Adams C., 2005, ENCY CRYPTOGRAPHY SE, P446
[2]   Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice [J].
Adrian, David ;
Bhargavan, Karthikeyan ;
Durumeric, Zakir ;
Gaudry, Pierrick ;
Green, Matthew ;
Halderman, J. Alex ;
Heninger, Nadia ;
Springall, Drew ;
Thome, Emmanuel ;
Valenta, Luke ;
VanderSloot, Benjamin ;
Wustrow, Eric ;
Zanella-Beguelin, Santiago ;
Zimmermann, Paul .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :5-17
[3]  
[Anonymous], 959482014 ISOIEC
[4]  
[Anonymous], 2010, INFOCOM
[5]  
[Anonymous], 2015, ARXIV150603471
[6]  
Bashir K., 2012, INT J ENG TECHNOL, V4, P307
[7]  
Bellovin S. M., 1990, Computer Communication Review, V20, P119, DOI 10.1145/381906.381946
[8]   Elliptic Curve Cryptography in Practice [J].
Bos, Joppe W. ;
Halderman, J. Alex ;
Heninger, Nadia ;
Moore, Jonathan ;
Naehrig, Michael ;
Wustrow, Eric .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 :157-175
[9]  
Cervesato Iliano., 2005, Proceedings of the 2005 workshop on Issues in the theory of security, P12
[10]  
Chundong Wang, 2013, 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), P256, DOI 10.1109/EIDWT.2013.49