TPM-Based Authentication Mechanism for Apache Hadoop

  title={TPM-Based Authentication Mechanism for Apache Hadoop},
  author={I. Khalil and Zuochao Dou and Abdallah Khreishah},
  • I. Khalil, Zuochao Dou, Abdallah Khreishah
  • Published in SecureComm 2014
  • Computer Science
  • Hadoop is an open source distributed system for data storage and parallel computations that is widely used. It is essential to ensure the security, authenticity, and integrity of all Hadoop’s entities. The current secure implementations of Hadoop rely on Kerberos, which suffers from many security and performance issues including single point of failure, online availability requirement, and concentration of authentication credentials. Most importantly, these solutions do not guard against… CONTINUE READING
    13 Citations
    Data Authorization in Hadoop using Kerberos Authentication System and Transport Layer Security
    • R. Raju, Yallapragada Ravi Raju, Haritha Donavalli
    • 2020
    • PDF
    Mitigation of Insider Attacks for Data Security in Distributed Computing Environments
    Blockchain based approach to enhance big data authentication in distributed environment
    • 27
    A System Architecture for the Detection of Insider Attacks in Big Data Systems
    • 15
    • PDF
    CLAS: A Novel Communications Latency Based Authentication Scheme
    • 4
    • PDF
    TASMR: Towards advanced secure mapreduc framework across untrusted hybrid clouds
    • 1
    • Highly Influenced
    A New HDFS Key Management Mechanism Based on Multi-level Hash Keychain
    Research on the Application of Transparent Encryption in Distributed File System HDFS


    TMR: Towards a Trusted MapReduce Infrastructure
    • A. Ruan, A. Martin
    • Computer Science
    • 2012 IEEE Eighth World Congress on Services
    • 2012
    • 25
    SECOS : Key Management for Scalable and Energy Efficient Crypto On Sensors
    • 13
    • PDF
    Implementation of a Trusted Ticket System
    • 22
    • PDF
    Towards Trusted Cloud Computing
    • 673
    • PDF
    • 48
    The Hadoop Distributed File System
    • 4,385
    • PDF
    Efficient wireless reprogramming through reduced bandwidth usage and opportunistic sleeping
    • 25
    • PDF
    Sustainable GPU Computing at Scale
    • 18
    • PDF
    A novel composite model approach to improve software quality prediction
    • 26
    Did your Adobe password leak? technology/2013/nov/07/adobe-password-leak-can-check
    • 2013