A Three-Tier Authentication Scheme for Kerberized Hadoop Environment

被引:2
作者
Hena, M. [1 ]
Jeyanthi, N. [1 ]
机构
[1] VIT Vellore, Sch Informat Technol & Engn, Vellore, Tamil Nadu, India
关键词
Apache hadoop; authentication; bigdata; blockchain; Kerberos; INDUSTRIAL IOT; SECURE; SYSTEM; SERVICE;
D O I
10.2478/cait-2021-0046
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Apache Hadoop answers the quest of handling Bigdata for most organizations. It offers distributed storage and data analysis via Hadoop Distributed File System (HDFS) and Map-Reduce frameworks. Hadoop depends on third-party security providers like Kerberos for its security requirements. Kerberos by itself comes with many security loopholes like Single point of Failure (SoF), Dictionary Attacks, Time Synchronization and Insider Attacks. This paper suggests a solution that aims to eradicate the security issues in the Hadoop Cluster with a focus on Dictionary Attacks and Single Point of Failure. The scheme roots on Secure Remote Password Protocol, Blockchain Technology and Threshold Cryptography. Practical Byzantine Fault Tolerance mechanism (PBFT) is deployed at the blockchain as the consensus mechanism. The proposed scheme outperforms many of the existing schemes in terms of computational overhead and storage requirements without compromising the security level offered by the system. Riverbed Modeller (AE) Simulation results strengthen the aforesaid claims.
引用
收藏
页码:119 / 136
页数:18
相关论文
共 32 条
[1]   Deploying Fog Computing in Industrial Internet of Things and Industry 4.0 [J].
Aazam, Mohammad ;
Zeadally, Sherali ;
Harras, Khaled A. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (10) :4674-4682
[2]  
Abdullah N, 2017, INT CONF UBIQ FUTUR, P887
[3]  
Algaradi T. S., 2019, Int. J. Adv. Sci. Eng. Inf. Technol., V9, P772, DOI [10.18517/ijaseit.9.3.5721, DOI 10.18517/IJASEIT.9.3.5721]
[4]   Secured Document Sharing Using Visual Cryptography in Cloud Data Storage [J].
Brindha, K. ;
Jeyanthi, N. .
CYBERNETICS AND INFORMATION TECHNOLOGIES, 2015, 15 (04) :111-123
[5]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[6]   A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment [J].
Esfahani, Alireza ;
Mantas, Georgios ;
Matischek, Rainer ;
Saghezchi, Firooz B. ;
Rodriguez, Jonathan ;
Bicaku, Ani ;
Maksuti, Silia ;
Tauber, Markus G. ;
Schmittner, Christoph ;
Bastos, Joaquim .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01) :288-296
[7]  
Hena M., 2019, INT J ENG ADV TECHNO, V9, P510
[8]  
Hena M., 2020, 10 INT C SOFT COMP P
[9]   Towards Secure Industrial IoT: Blockchain System With Credit-Based Consensus Mechanism [J].
Huang, Junqin ;
Kong, Linghe ;
Chen, Guihai ;
Wu, Min-You ;
Liu, Xue ;
Zeng, Peng .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (06) :3680-3689
[10]   Evaluating Machine Learning Approaches for Discovering Optimal Sets of Projection Operators for Quantum State Tomography of Qubit Systems [J].
Ivanova-Rohling, Violeta N. ;
Rohling, Niklas .
CYBERNETICS AND INFORMATION TECHNOLOGIES, 2020, 20 (06) :61-73