Browse > Article
http://dx.doi.org/10.3745/KTCCS.2015.4.4.141

A Design of Permission Management System Based on Group Key in Hadoop Distributed File System  

Kim, Hyungjoo (숭실대학교 컴퓨터학과)
Kang, Jungho (숭실대학교 컴퓨터학과)
You, Hanna (KT 융합연구소)
Jun, Moonseog (숭실대학교 컴퓨터학과)
Publication Information
KIPS Transactions on Computer and Communication Systems / v.4, no.4, 2015 , pp. 141-146 More about this Journal
Abstract
Data have been increased enormously due to the development of IT technology such as recent smart equipments, social network services and streaming services. To meet these environments the technologies that can treat mass data have received attention, and the typical one is Hadoop. Hadoop is on the basis of open source, and it has been designed to be used at general purpose computers on the basis of Linux. To initial Hadoop nearly no security was introduced, but as the number of users increased data that need security increased and there appeared new version that introduced Kerberos and Token system in 2009. But in this method there was a problem that only one secret key can be used and access permission to blocks cannot be authenticated to each user, and there were weak points that replay attack and spoofing attack were possible. Hence, to supplement these weak points and to maintain efficiency a protocol on the basis of group key, in which users are authenticated in logical group and then this is reflected to token, is proposed in this paper. The result shows that it has solved the weak points and there is no big overhead in terms of efficiency.
Keywords
Authentication; Hadoop; HDFS; Kerberos; Group Key;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 O. G. Min, H. Y. Kim, and G. H. Nam, "Trends in Technology of Cloud Computing," Electronics and Telecommunications Trends, Vol.24, No.4, pp.1-13, 2009.
2 A. Melnikov, et al., "Simple Authentication and Security Layer," Internet RFC 4422, Jun., 2006.
3 O. O'Malley, K. Zhang, S. Radia, R. Marti, and Ch. Harrell, "Hadoop Security Design," 2009, Available From: https://issues.apache.org/jira/secure/attachment/12428537/security-design.pdf, accessed Feb., 28, 2014.
4 Govind S, "Hadoop-Really a Preferred Approach over Relational Database Management Systems?," Available From: https://www.academia.edu/3474885, accessed Feb., 17, 2014.
5 S. Park, H. Kim, "Improving Hadoop Security Through Hashchain," Journal of Korean institute of information technology, Vol.10, No.6, pp.65-73, 2012.
6 A. Becherer, "Hadoop Security Design Just Add Kerberos? Really?," iSEC PARTNER, 2010.
7 S. H. Park, I. R. Jeong, "A Study on Security Improvement in Hadoop Distributed File System Based on Kerberos," Journal of The Korea Institute of Information Security & Cryptology(JKIISC), Vol.23, No.5, pp.803-813, 2013.   DOI
8 D. Borthakur, "The Hadoop Distributed File System: Architecture and Design," The Apache Software Foundation, Available From: http://hadoop.apache.org/docs/r0.18.0/hdfs_design.pdf, 2007.
9 Wei Dai, "Crypto++ 5.6.0 Benchmarks," Available From: http://www.cryptopp.com/benchmarks.html, Mar., 2009.