Secure HDFS Using OAuth 2.0
||International Journal of Computer Trends and Technology (IJCTT)||
|© 2019 by IJCTT Journal|
|Year of Publication : 2019|
|Authors : Ms. Anuja S. Paval, Prof. Amol S. Dange|
|DOI : 10.14445/22312803/IJCTT-V67I6P115|
MLA Style:Ms. Anuja S. Paval, Prof. Amol S. Dange"Secure HDFS Using OAuth 2.0" International Journal of Computer Trends and Technology 67.6 (2019): 89-92.
APA Style Ms. Anuja S. Paval, Prof. Amol S. Dange. Secure HDFS Using OAuth 2.0International Journal of Computer Trends and Technology, 67(6),89-92.
To Analyse big data is a very challenging task. Hadoop framework which is properly used for processing large amount of data on its distributed programming framework. When Hadoop was invented it was without any security model. So for security purpose we are implementing encryption scheme. For better result we designed a Real Time Encryption Algorithm(RTEA). We compared with Advanced Encryption Algorithm(AES) which is standard algorithm. Basic purpose of study is security. For security purpose we can use encryption and decryption before writing and reading data. For more security Kerberos can be used for authentication various ways of securing the data in hadoop framework are authentication, authorization and encryption of data.
 S. Ghemawat, H.Gobioff and S. Leung, “The Google File System”. In:ACM Symposium onOperating Systems Principles(Octomber 2003).
 Thanh Cuong Nguyen, WenfengShen, Jiwei Jiang and WeiminXu, “A Novel Data Encryption in HDFS”.IEEE International Conference on Green Computing And Communication 2013.
 Raj R. Parmar, Sudipta Roy, Debnath Bhattacharya, Samir Kumar Bandyopadhyay, (Senior Member, IEEE), And Tai-Hoon Kim, “Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions”(2017), DOI 10.1109/ACCESS.2017.2700228.
 Marwan Darwish, AbdelkaderOuda, “Evaluation of an OAuth 2.0 Protocol Implementationfor Web ServerApplications”(2015), 978-4799-6908-1/15/$31.00©2015 IEEE.
 Seonyoung Park and Youngseok Lee, “Secure Hadoop with Encrypted HDFS”, Springer-Verlag Berlin Heildelberg in 2013.
 Jason Cohen and Dr.SubatraAcharya, “Towards a Trusted Hadoop Storage Platform:Design Considerations of an AES Based Encryption Scheme with TPM Rooted Key Protections”. IEEE 10th International Conference on Ubiquitous Intelligence & Computing in 2013.
 Lin H., Shen S., TzengW., Lin B.P., “Toward Data Confidentiality via Integrating Hybrid Encryption Schemes and Hadoop Distributed FileSystem”. 26th IEEE International Conference on Advanced Information Networking And Applications in 2012.
 Monika Kumari, Dr.SanjayTyagi, “A Three Layered Security Model for Data Management in Hadoop Environment”(2014).
 S. Ghemawat and J. Dean, “MapReduce: Simplified data processing on large clusters”, ACMCommun. Mag., vol. 51, no. 1, pp. 107_113,Jan. 2008.
 D. Borthakur, “The Hadoop distributed file system: Architecture and design”,Hadoop Project Website,Aug. 2007.
AES, DataNode, Hadoop, HDFS, OAuth