DOI QR코드

DOI QR Code

Kerberos Authentication Deployment Policy of US in Big data Environment

빅데이터 환경에서 미국 커버로스 인증 적용 정책

  • Hong, Jinkeun (Div. of Information and Communication, Baekseok University)
  • 홍진근 (백석대학교 정보통신학부)
  • Received : 2013.10.18
  • Accepted : 2013.11.20
  • Published : 2013.11.28

Abstract

This paper review about kerberos security authentication scheme and policy for big data service. It analyzed problem for security technology based on Hadoop framework in big data service environment. Also when it consider applying problem of kerberos security authentication system, it analyzed deployment policy in center of main contents, which is occurred in commercial business. About the related applied Kerberos policy in US, it is researched about application such as cross platform interoperability support, automated Kerberos set up, integration issue, OPT authentication, SSO, ID, and so on.

본 논문은 빅데이터 서비스를 위한 커버로스 보안 인증 방안과 정책에 대해 살펴보았다. 빅데이터 서비스 환경에서 하둡 기반의 보안기술에 대한 문제점에 대해 분석하였다. 또한 커버로스 보안 인증체계의 적용 문제를 고려할 때 미국의 상용 분야에서 발생하고 있는 주요 내용을 중심으로 적용 정책을 분석하였다. 커버로스 정책 적용과 관련하여, 미국은 크로스플랫폼 상호운용성 지원, 자동화된 커버로스 설정, 통합 이슈, OTP인증, 싱글사인온, ID 등 다양한 적용에 대한 연구가 이루어지고 있다.

Keywords

References

  1. SungHwan Kim, JungHo Eom, TaiMyoung Chung, Big data Security Hardening Methodology using Attributes Relationship, ICISA2013, pp.1-2, 2013.
  2. Hojabri M., Rao K. V., Innovation in cloud computing: Implementation of kerberos version5in cloud computing in order to enhance the security issues, ICICES2013, pp.452-456, 2013.
  3. A. Boldyreva and V. Kumar, Provable-Security Analysis of Authentication Encryption in Kerberos, IEEE Security and Privacy 2007, pp.92-100, 2007.
  4. H.M.N Al-Hamadi, C. Y. Yeun, M.J. Zemerly, and M. Al Qutayri, Distributed Lightweight Kerberos Protocol for Mobile Agent System, IEEE GCC2011, pp.233-236, 2011.
  5. Inshil Doh, Kijoon Chae, Jiyoung Lim and Min Young Chung, An Improved Security Approach Based on Kerberos for M2M Open IPTV System, The 15th International Conference on NBiS2012, pp.754-759, 2012.
  6. Zhao Hu, Yuesheng Zhu and Limin Ma, An improved Kerberos protocol based on Diffie-Hellman-DSA Key exchange, 18th IEEE ICON2012, pp.400-404, 2012.
  7. Wang Chundong, Feng Chaoran, Security Analysis and Improvement for Kerberos Based on Dynamic Password and Diffie-Hellman Algorithm, EIDWT2013, pp.256-260, 2013.
  8. Woo J., Tripunitara M., Composing Kerberos and Multimedia Internet KEYing for Authenticated Transport of Group Keys, IEEE Trans. on Parallel and Distributed Systems, Vol.pp, Issue99, pp.1-11, 2013.
  9. David Zage, Kristin Glass, and Richard Colbaugh, Improving Supply Chain Security Using Big data, IEEE ISI2013, pp.254-259, 2013.

Cited by

  1. A token-based authentication security scheme for Hadoop distributed file system using elliptic curve cryptography vol.11, pp.3, 2015, https://doi.org/10.1007/s11416-014-0236-5