Research on Kerberos Technology Based on Hadoop Cluster Security
- DOI
- 10.2991/aeecs-18.2018.40How to use a DOI?
- Keywords
- Hadoop cluster, Kerberos, Security.
- Abstract
This article is based on the ecological security of the Hadoop cluster. Combined with the practical application of Kerberos security authentication system in Hadoop cluster, we propose a multi node HA (High Available) configuration in Kerberos, realize Master-Master-Slave design mode and increase redundant nodes in storage. Based on the characteristics of dual Master, we set timed tasks, execute scripts on time, carry out data dump of Master nodes, prevent single Master failure, and avoid the failure of Kerberos authentication system. We use Slave nodes to carry out one way backup storage from dual Master to Slave. After double Master Kerberos database has been destroyed, it can recover Master nodes with the fastest speed. This improves the security and resilience of access to Hadoop cluster components and authentication architecture using database data.
- Copyright
- © 2018, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Peng Shen AU - Xiaoming Ding AU - Wenjun Ren PY - 2018/03 DA - 2018/03 TI - Research on Kerberos Technology Based on Hadoop Cluster Security BT - Proceedings of the 2018 2nd International Conference on Advances in Energy, Environment and Chemical Science (AEECS 2018) PB - Atlantis Press SP - 228 EP - 233 SN - 2352-5401 UR - https://doi.org/10.2991/aeecs-18.2018.40 DO - 10.2991/aeecs-18.2018.40 ID - Shen2018/03 ER -