DOI QR코드

DOI QR Code

A Novel Node Management in Hadoop Cluster by using DNA

  • Balaraju. J (Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation) ;
  • PVRD. Prasada Rao (Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation)
  • Received : 2023.09.05
  • Published : 2023.09.30

Abstract

The distributed system is playing a vital role in storing and processing big data and data generation is speedily increasing from various sources every second. Hadoop has a scalable, and efficient distributed system supporting commodity hardware by combining different networks in the topographical locality. Node support in the Hadoop cluster is rapidly increasing in different versions which are facing difficulty to manage clusters. Hadoop does not provide Node management, adding and deletion node futures. Node identification in a cluster completely depends on DHCP servers which managing IP addresses, hostname based on the physical address (MAC) address of each Node. There is a scope to the hacker to theft the data using IP or Hostname and creating a disturbance in a distributed system by adding a malicious node, assigning duplicate IP. This paper proposing novel node management for the distributed system using DNA hiding and generating a unique key using a unique physical address (MAC) of each node and hostname. The proposed mechanism is providing better node management for the Hadoop cluster providing adding and deletion node mechanism by using limited computations and providing better node security from hackers. The main target of this paper is to propose an algorithm to implement Node information hiding in DNA sequences to increase and provide security to the node from hackers.

Keywords

References

  1. H. Yang and J. Lee, "Secure Distributed Computing With Straggling Servers Using Polynomial Codes," in IEEE Transactions on Information Forensics and Security, vol. 14, no. 1, pp. 141-150, Jan. 2019, doi: 10.1109/TIFS.2018.2846601.
  2. Khanan A., Abdullah S., Mohamed A.H.H.M., Mehmood A., Ariffin K.A.Z. (2019) Big Data Security and Privacy Concerns: A Review. In: Al-Masri A., Curran K.(eds) Smart Technologies and Innovation for a Sustainable Future. Advances in Science, Technology & Innovation (IEREK Interdisciplinary Series for Sustainable Development). Springer, Cham. https://doi.org/10.1007/978-3-030-01659-3_8.
  3. Roy M. et al. (2020) Data Security Techniques Based on DNA Encryption. In: Chakraborty M., Chakrabarti S., Balas V. (eds) Proceedings of International Ethical Hacking Conference 2019. eHaCON 2019. Advances in Intelligent Systems and Computing, vol 1065. Springer, Singapore. https://doi.org/10.1007/978-981-15-0361-0_19.
  4. R. Samet, A. Aydin and F. Toy, "Big Data Security Problem Based on Hadoop Framework," 2019 4th International Conference on Computer Science and Engineering (UBMK), Samsun, Turkey, 2019, pp. 1-6, doi: 10.1109/UBMK.2019.8907074.
  5. Akhgarnush E., Broeckers L., Jakoby T. (2019) Hadoop: A Standard Framework for Computer Cluster. In: Liermann V., Stegmann C. (eds) The Impact of Digital Transformation and FinTech on the Finance Professional. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-23719-6_18.
  6. A. K. Rajput, R. Tewani and A. Dubey, "The helping protocol "DHCP"," 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, 2016, pp. 634-637.
  7. M. Mohsin and R. Prakash, "IP address assignment in a mobile ad hoc network," MILCOM 2002. Proceedings, Anaheim, CA, USA, 2002, pp. 856-861 vol.2, doi: 10.1109/MILCOM.2002.1179586.
  8. K. S. Sajisha and S. Mathew, "An encryption based on DNA cryptography and steganography," 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, 2017, pp. 162-167, doi: 10.1109/ICECA.2017.8212786.
  9. Nirmalya Kar, Kaushik Mandal, Baby Bhattacharya, Improved chaos-based video steganography using DNA alphabets, ICT Express, Volume 4, Issue1, 2018, Pages 6-13, ISSN 2405-9595, https://doi.org/10.1016/j.icte.2018.01.003.
  10. Salah Alabady, Design and Implementation of a Network Security Model for Cooperative Network, International Arab Journal of Technology, Vol. 1, No. 2, June 2009.
  11. Balaraju, J. and P. V. V. P. Rao. "Recent advances in big data storage and security schemas of HDFS: a survey." (2018).
  12. Mohammed Nadir Bin Ali, Mohamed Emran Hossain, Md. Masud Parvez. Design and Implementation of a Secure Campus Network International Journal of Emerging Technology and Advanced Engineering Website, 2015, 5(7). www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal.
  13. Kartik Pandya. 2013, 1(2). 6. International Journal of Advance Research in Computer Science and Management Studies Network Structure or Topology.
  14. Balaraju, J., Prasada Rao, P. V. R. D.: Designing authentication for Hadoop Cluster using DNA algorithm. Int. J. Recent. Technol. Eng. (IJRTE) 8(3) (2019). ISSN: 2277-3878. https://doi.org/10.35940/ijrte.C5895.0983.
  15. Offor, Kennedy J, Obi, Patrick I, Nwadike Kenny T, Okonkwo II. International Journal of Engineering Research & Technology (IJERT), 2013, 2(8).
  16. Balaraju J., Prasada Rao P.V.R.D. (2020) Innovative Secure Authentication Interface for Hadoop Cluster Using DNA Cryptography: A Practical Study. In: Reddy V., Prasad V., Wang J., Reddy K. (eds) Soft Computing and Signal Processing. ICSCSP 2019. Advances in Intelligent Systems and Computing, vol 1118. Springer, Singapore. https://doi.org/10.1007/978-981-15-2475-2_3.
  17. Gugnani S., Khanolkar D., Bihany T., Khadilkar N. (2014) Rule Based Classification on a Multi Node Scalable Hadoop Cluster. In: Fortino G., Di Fatta G., Li W., Ochoa S., Cuzzocrea A., Pathan M. (eds) Internet and Distributed Computing Systems. IDCS 2014. Lecture Notes in Computer Science, vol 8729. Springer, Cham. https://doi.org/10.1007/978-3-319-11692-1_15.
  18. Demidov V.V. (2020) Hiding and Storing Messages and Data in DNA. In: DNA beyond Genes. Springer, Cham. https://doi.org/10.1007/978-3-030-36434-2_2.