A Design of Permission Management System Based on Group Key in Hadoop Distributed File System |
Kim, Hyungjoo
(숭실대학교 컴퓨터학과)
Kang, Jungho (숭실대학교 컴퓨터학과) You, Hanna (KT 융합연구소) Jun, Moonseog (숭실대학교 컴퓨터학과) |
1 | O. G. Min, H. Y. Kim, and G. H. Nam, "Trends in Technology of Cloud Computing," Electronics and Telecommunications Trends, Vol.24, No.4, pp.1-13, 2009. |
2 | A. Melnikov, et al., "Simple Authentication and Security Layer," Internet RFC 4422, Jun., 2006. |
3 | O. O'Malley, K. Zhang, S. Radia, R. Marti, and Ch. Harrell, "Hadoop Security Design," 2009, Available From: https://issues.apache.org/jira/secure/attachment/12428537/security-design.pdf, accessed Feb., 28, 2014. |
4 | Govind S, "Hadoop-Really a Preferred Approach over Relational Database Management Systems?," Available From: https://www.academia.edu/3474885, accessed Feb., 17, 2014. |
5 | S. Park, H. Kim, "Improving Hadoop Security Through Hashchain," Journal of Korean institute of information technology, Vol.10, No.6, pp.65-73, 2012. |
6 | A. Becherer, "Hadoop Security Design Just Add Kerberos? Really?," iSEC PARTNER, 2010. |
7 | S. H. Park, I. R. Jeong, "A Study on Security Improvement in Hadoop Distributed File System Based on Kerberos," Journal of The Korea Institute of Information Security & Cryptology(JKIISC), Vol.23, No.5, pp.803-813, 2013. DOI |
8 | D. Borthakur, "The Hadoop Distributed File System: Architecture and Design," The Apache Software Foundation, Available From: http://hadoop.apache.org/docs/r0.18.0/hdfs_design.pdf, 2007. |
9 | Wei Dai, "Crypto++ 5.6.0 Benchmarks," Available From: http://www.cryptopp.com/benchmarks.html, Mar., 2009. |