<Previous Article In Volume
Using the HashChain to Improve the Security of the Hadoop
Authors
Ying MEI
Corresponding Author
Ying MEI
Available Online September 2017.
- DOI
- 10.2991/eeeis-17.2017.82How to use a DOI?
- Keywords
- Hadoop, Security, Hash Chain, Identity Authentication
- Abstract
For the problem of enforcing mandatory access control onthe data nodes in Hadoop, there exists some limitations by analyzing its own the token-based authentication scheme. Therefore, we use the hash chain password method to improve the original authenticationscheme. By analyzing the security, the novel method is effective againstthe impersonation and replay attacksbyincreasing the confidentiality of the token compared with the original one. At the same time, it is more efficient inthe authentication process for its simplification.
- Copyright
- © 2017, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
<Previous Article In Volume
Cite this article
TY - CONF AU - Ying MEI PY - 2017/09 DA - 2017/09 TI - Using the HashChain to Improve the Security of the Hadoop BT - Proceedings of the 3rd Annual International Conference on Electronics, Electrical Engineering and Information Science (EEEIS 2017) PB - Atlantis Press SP - 554 EP - 558 SN - 2352-5401 UR - https://doi.org/10.2991/eeeis-17.2017.82 DO - 10.2991/eeeis-17.2017.82 ID - MEI2017/09 ER -