Securing Authentication Within Hadoop
- DOI
- 10.2991/icemie-16.2016.25How to use a DOI?
- Keywords
- component; kerberos; hadoop; mapreduce; HDFS
- Abstract
In this paper, we discuss authentication issues for Hadoop security in a cloud environment. The main focus is on security issues that are associated with authentication in Hadoop which is framework for storing data on large clusters of commodity hardware — everyday computer hardware that is affordable and easily available — and running applications against that data* We also discuss various possible solutions to those issues in hadoop security and authentication. Hadoop security is developing at a rapid pace which includes computer security, network security, information security, and data privacy. As the amount of enterprise-critical data that resides in the cluster increases, the need for securing access becomes just as critical. Hadoop was not built with security to begin with. Although, cloud computing, big data and its applications, advantages are likely to represent the most promising new frontiers in science. Then it appears essential to get know Hadoop in term of security.
- Copyright
- © 2016, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Michael Kanyeba AU - Lasheng Yu PY - 2016/04 DA - 2016/04 TI - Securing Authentication Within Hadoop BT - Proceedings of the 2016 International Conference on Electrical, Mechanical and Industrial Engineering PB - Atlantis Press SP - 100 EP - 103 SN - 2352-5401 UR - https://doi.org/10.2991/icemie-16.2016.25 DO - 10.2991/icemie-16.2016.25 ID - Kanyeba2016/04 ER -