Full Paper View Go Back

Providing Security to Data Stored on HDFS Using Security Protocol

Poonam R. Wagh1 , Amol D. Potgantwar2

1 Department of Computer Engineering, SITRC, Nashik, India.
2 Department of Computer Engineering, SITRC, Nashik, India.

Correspondence should be addressed to: wagh.poonam@gmail.com.


Section:Research Paper, Product Type: Journal
Vol.5 , Issue.4 , pp.20-25, Aug-2017

Online published on Aug 30, 2017


Copyright © Poonam R. Wagh, Amol D. Potgantwar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Poonam R. Wagh, Amol D. Potgantwar, “Providing Security to Data Stored on HDFS Using Security Protocol,” International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.4, pp.20-25, 2017.

MLA Style Citation: Poonam R. Wagh, Amol D. Potgantwar "Providing Security to Data Stored on HDFS Using Security Protocol." International Journal of Scientific Research in Network Security and Communication 5.4 (2017): 20-25.

APA Style Citation: Poonam R. Wagh, Amol D. Potgantwar, (2017). Providing Security to Data Stored on HDFS Using Security Protocol. International Journal of Scientific Research in Network Security and Communication, 5(4), 20-25.

BibTex Style Citation:
@article{Wagh_2017,
author = {Poonam R. Wagh, Amol D. Potgantwar},
title = {Providing Security to Data Stored on HDFS Using Security Protocol},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {8 2017},
volume = {5},
Issue = {4},
month = {8},
year = {2017},
issn = {2347-2693},
pages = {20-25},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=298},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=298
TI - Providing Security to Data Stored on HDFS Using Security Protocol
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Poonam R. Wagh, Amol D. Potgantwar
PY - 2017
DA - 2017/08/30
PB - IJCSE, Indore, INDIA
SP - 20-25
IS - 4
VL - 5
SN - 2347-2693
ER -

1210 Views    397 Downloads    374 Downloads
  
  

Abstract :
Different organizations and individuals tend to outsource their data to cloud storage, the security and user privacy protection attract more attention. Several attempts has been made to improve security of the cloud storage, which used for security of data but it is not very effective method for protecting and securing confidential data from unauthorized access. In the proposed system combination of security systems used to ensure security of the network to additional extent. A novel model of cloud secure storage is proposed, which combines the Hadoop distributed file system (HDFS) security protocol and cryptography for data stored on HDFS. The model uses the HDFS as the storage platform. Hadoop uses security protocols like Kerberos, LDAP and keytabs for user authentication. The fast encryption of cryptography algorithms and identity authentication like RSA, blowfish, AES can be used for overtime checking and the performance of Hadoop. Thus the security system with combination at different levels can supply secured, effective, stable effect on large data through Hadoop and cloud computing.

Key-Words / Index Term :
HDFS, Kerberos, Cloud computing, AES

References :
[1]. Nitesh Jain, Pradeep Sharma, "A Security Key Management Model for Cloud Environment", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.1, pp.45-48, 2017.
[2]. B. Subasri, P. Vijayalakshmi, P. Yurega, E. Revathi, "Improving Zero Knowledge in Cloud Storage Auditing System", International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.204-207, 2014.
[3]. Rajesh Verma , "Comparative Based Study of Scheduling Algorithms for Resource Management in Cloud Computing Environment", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.4, pp.17-23, 2013.
[4]. B. Lakhe, “Monitoring in Hadoop”, Practical Hadoop Security, pp. 119–141, 2014.
[5]. Shubhangi D.C., Sabahat Fatima, "Privacy-Preserving Outsourcing of Medical Image Data using SIFT Descriptor", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.141-145, 2017.
[6]. Y. Wang, C. Xu, X. Li, and W. Yu, “JVM-Bypass for Efficient Hadoop Shuffling,” 2013 IEEE 27th International Symposium on Parallel and Distributed Processing, May 2013.
[7]. Ruchi Mittal and Ruhi Bagga, "Performance Analysis of Hadoop with Pseudo-Distributed Mode on Different Machines", International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.113-117, 2015.
[8]. J. Cohen and S. Acharya, “Towards a Trusted Hadoop Storage Platform: Design Considerations of an AES Based Encryption Scheme with TPM Rooted Key Protections,” 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, Dec. 2013.
[9]. W. Stallings, “Network Security Essentials: Applications and Standards”, Prentice-Hall Published, 2000.
[10]. P. Adluru, S. S. Datla, and X. Zhang, “Hadoop eco system for big data security and privacy,” 2015 Long Island Systems, Applications and Technology, May 2015.
[11]. D. Nunez, I. Agudo, and J. Lopez, “Delegated Access for Hadoop Clusters in the Cloud,” 2014 IEEE 6th International Conference on Cloud Computing Technology and Science, Dec. 2014.a
[12]. Xianqing Yu, P. Ning, and M. A. Vouk, “Enhancing security of Hadoop in a public cloud,” 2015 6th International Conference on Information and Communication Systems (ICICS), Apr. 2015.
[13]. Lin Wen-hui, Lei Zhen-Ming, Yang Jie, He Gang, Liu Jun, and Liu Fang, “Secure cloud storage management method based on time stamp authority,” National Doctoral Academic Forum on Information and Communications Technology 2013, 2013.
[14]. H. Zhou and Q. Wen, “A new solution of data security accessing for Hadoop based on CP-ABE,” 2014 IEEE 5th International Conference on Software Engineering and Service Science, Jun. 2014.
[15]. P. Zerfos, H. Yeo, B. D. Paulovicks, and V. Sheinin, “SDFS: Secure distributed file system for data-at-rest security for Hadoop-as-a-service,” 2015 IEEE International Conference on Big Data (Big Data), Oct. 2015.
[16]. A. Sharif, S. Cooney, S. Gong, and D. Vitek, “Current security threats and prevention measures relating to cloud services, Hadoop concurrent processing, and big data,” 2015 IEEE International Conference on Big Data (Big Data), Oct. 2015.
[17]. G. Zhou, D. Zhao, K. Zou, W. Xu, X. Lv, Q. Wang, and W. Yin, “The static security analysis in power system based on Spark Cloud Computing platform,” 2015 IEEE Innovative Smart Grid Technologies - Asia (ISGT ASIA), Nov. 2015.
[18]. A. Desai, Nagegowda K S, and Ninikrishna T, “Secure and QoS aware architecture for cloud using software defined networks and Hadoop,” 2015 International Conference on Computing and Network Communications (CoCoNet), Dec. 2015.
[19]. Arsha Sultana and S. Madhavi , "Generating Optimized Association Rule for Big Data Using GA and MLMS", International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.144-148, 2015.
[20]. V. Kapoor, "Data Encryption and Decryption Using Modified RSA Cryptography Based on Multiple Public Keys and ‘n’prime Number", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.35-38, 2013.
[21]. S.L.Mewada, U.K. Singh, P. Sharma, "Security Enhancement in Cloud Computing (CC)", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.31-37, 2013.
[22]. S. M. Khan and K. W. Hamlen, “Hatman: Intra-cloud Trust Management for Hadoop,” 2012 IEEE Fifth International Conference on Cloud Computing, Jun. 2012.
[23]. F. A. H. Jing, S. B. L. Renfa, and T. C. T. Zhuo, “The research of the data security for cloud disk based on the Hadoop framework,” 2013 Fourth International Conference on Intelligent Control and Information Processing (ICICIP), Jun. 2013.
[24]. XU Guang-hui, “Deploying and researching Hadoop in virtual
machines (ICAL)”, IEEE International Conference on Zhengzhou, pp. 395-399, 2012.
[25]. Z. Tang, J. Zhou, K. Li, and R. Li, “MTSD: A Task Scheduling Algorithm for MapReduce Base on Deadline Constraints,” 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum, May 2012.
[26]. P.N. Priyanka, S.V. Phaneendra, "Study on Migration from conventional File System to advancement of Bigdata Technologies in the real world", International Journal of Computer Sciences and Engineering, Vol.2, Issue.8, pp.11-20, 2014.
[27]. Da-Wei Zhang, Fu-Quan Sun, Xu Cheng, and Chao Liu, “Research on hadoop-based enterprise file cloud storage system,” 2011 3rd International Conference on Awareness Science and Technology (iCAST), Sep. 2011.
[28]. Hou Qinhua,Wu Yongwei,Zheng Weimin, “A Method on Protection of User Data Privacy in Cloud Storage Platform”, Journal of Computer Research and Development, pp.4871146-1154, 2011.
[29]. S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing,” 2010 Proceedings IEEE INFOCOM, Mar. 2010.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation