Innovative Secure Authentication Interface for Hadoop Cluster Using DNA Cryptography: A Practical Study

  • J. Balaraju
  • P. V. R. D. Prasada Rao
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1118)


Big data (BD) handling is a vital task in today’s world where huge amount of data is circulated within a distributed network. To handle BD, Hadoop is being widely used by various organizations, as Hadoop supports both parallel processing and distributed computing over wide area networks. Hadoop clusters (HC) are widely accepted in the distributed and parallel computing frameworks for storing the BD because of its good scalability, tightly coupling among commodity hardware. Though data storage and processing can be handled well by HC, it does not provide data security which is inevitable where data may contain sensitive information. In HC Yet Another Resource Negotiator (YARN) and NameNode act as masters that provide resources for users and processes without authentication. All kinds of users in HC have the same level of accessing privileges which can be a threat to data security. HC completely depends on third-party security providers for satisfying various security requirements which in turn is a computational burden. This paper proposes a proprietary new security mechanism, implemented as Secure Authentication Interface (SAI) layer over HC. SAI provides user authentication, metadata security and access control all at a time. Compared to the existing mechanisms, SAI can provide security with less computational overhead.


Big data Parallel processing Distributed computing Hadoop cluster Data security Secure Authentication Interface Metadata security 


  1. 1.
    Furht, B., Villanustre, F.: Introduction to big data. In: Springer 2016 International Conference on Big Data Technologies of Applications, pp. 17–18, pp. 1–3, USA (Nov 2016)Google Scholar
  2. 2.
    Adluru, P., Datla, S.S., Zhang, X.: Hadoop eco system for big data security and privacy. In: IEEE 2015 Long Island Systems, Applications and Technology, Farmingdale, NY, USA, pp. 1–6, 1 May 2015Google Scholar
  3. 3.
    Guo, M.: Design and realization of bank history data management system based on hadoop 2.0. In: Springer 2018; Cluster Computing in Springer, Springer USA, pp. 1–7, 5 Mar 2018Google Scholar
  4. 4.
    Pradhananga, Y., Karande, S., Karande, C.: High performance analytics of big data with dynamic and optimized hadoop cluster. In: IEEE 2016 International Conference on Advanced Communication Control and Computing Technologies, Ramanathapuram, India, pp. 25–26, pp. 715–720, May 2016Google Scholar
  5. 5.
    Ismail, M., Gebremeskel, E., Kakantousis, T., Berthou, G., Dowling, J. Hopsworks: Improving user experience and development on hadoop with scalable, strongly consistent metadata. In: IEEE 2017; International Conference on Distributed Computing Systems, Atlanta, USA, pp. 2525–2528, 5–8 July 2017Google Scholar
  6. 6.
    Jena, B., Gourisaria, M.K., Rautaray, S.S., Pandey, M.: Improvising Name Node performance by aggregator aided HADOOP framework. In: IEEE 2016; International Conference on Control, Instrumentation, Communication and Computational Technologies, Kumaracoil, India, pp. 382–388, 16–17 Dec 2016Google Scholar
  7. 7.
    Sethi, K.K., Ramesh, D.: Delay scheduling with reduced workload on jobtracker in hadoop. In: Springer 2015, Innovations in Bio-Inspired Computing and Applications, Advances in Intelligent Systems and Computing, vol. 424, pp 371–381Google Scholar
  8. 8.
    Li, Q., Sun, Z., Wei, Z., Sun, G.: A new data access mechanism for HDFS. In: IOP 2017, Journal of Physics: Conference Series, vol. 898, pp. 1–7Google Scholar
  9. 9.
    Manwal, M., Gupta, A.: Big data and hadoop—a technological survey. In: IEEE 2017, International Conference on Emerging Trends in Computing and Communication Technologies, Dehradun, India, pp. 1–6, 17–18 Nov 2017Google Scholar
  10. 10.
    Alam, A., Ahmed, J.: Hadoop architecture and its issues. In: IEEE 2014, International Conference on Computational Science and Computational Intelligence, Las Vegas, NV, USA, pp. 288–291, 10–13 Mar 2014Google Scholar
  11. 11.
    Revathy, P., Mukesh, R.: Analysis of big data security practices. In: IEEE 2017, 3rd International Conference on Applied and Theoretical Computing and Communication Technology, Tumkur, India, pp. 264–267, 21–23 Dec 2017Google Scholar
  12. 12.
    Saraladevia, B., Pazhanirajaa, N., Victer Paula, P., Saleem Bashab, M.S., Dhavachelvanc, P.: Big data and hadoop-a study in security perspective. In: Elsevier 2015, 2nd International Symposium on Big Data and Cloud Computing, Chennai, India, pp. 596–601, 12–13 Mar 2015Google Scholar
  13. 13.
    Pant, P., Kumar, P., Alam, I., Rawat, S.: In: Springer 2018, Analytical Planning and Implementation of Big Data Technology Working at Enterprise Level, pp. 1031–1043, Springer, Singapore (2018)Google Scholar
  14. 14.
    Gupta, S., Giri, V.: Data security in data lakes. In: Springer 2018, Practical Enterprise Data Lake Insights, pp. 225–259. Apress, Berkeley (2018)Google Scholar
  15. 15.
    Balaraju, J., Prasada Rao, P.V.R.D.: Recent advances in big data storage and security schemas of HDFS: a survey. In: JOET 2018, vol. 6, Special Issue (Emerging Trends in Engineering Technology), ASSE, USA, pp. 132–138, Mar 2018Google Scholar
  16. 16.
    Abhishek, K., Verma, M.K., Shivam, K., Kumar, V., Mohan, A.: Integrated hadoop Cloud Framework (IHCF). Indian J. Sci. Technol. IJST 2017, 10, 1–8 (2017)Google Scholar
  17. 17.
    Kourid, A., Chikhi S.: A comparative study of recent advances in big data for security and privacy. In: Springer 2018, Networking Communication and Data Knowledge Engineering. Lecture Notes on Data Engineering and Communications Technologies, pp. 249–259. Springer, Singapore, 25 Apr 2016, Phuket, Thailand, pp. 100–1003 (2018)Google Scholar
  18. 18.
    Murthy, K., Ashok kumar, P.S., Palagi, P., Bhasaha, N.: Implication of restful web services in Bigdata analytics. In: 2nd International Conference on Computational Systems and Information Technology for Sustainable Solution, Bangalore, India, IEEE 2017, pp. 122–125 (2017)Google Scholar
  19. 19.
    Ahmed, H., Ismail, M.A., Hyder, M.F.: Performance optimization of hadoop cluster using linux services. In: 17th IEEE International Multi Topic Conference, IEEE 2014, Karachi, Pakistan, pp. 167–172, 8–10 Dec 2014Google Scholar
  20. 20.
    Caceres, R. et al.: Building a MAC-based security architecture for the Xen open-source hypervisor. In: Computer Security Applications Conference, Annual (ACSAC), IEEE 2005, Tucson, Arizona, pp. 276–285, 4–9 Dec 2005Google Scholar
  21. 21.
    Hossain, E.M.S., Alam, K.M.R., Biswas, M.R., Morimoto, Y.: A DNA cryptographic technique based on dynamic DNA sequence table. In: International Conference on Computer and Information Technology, IEEE 2016, Dhaka, Bangladesh, pp. 270–276, 18–20 Dec 2016Google Scholar
  22. 22.
    Marwan, S., Shawish, A., Nagaty, K.: DNA-based cryptographic methods for data hiding in DNA media. In: ScienceDirect, pp. 110–118, Aug 2016Google Scholar
  23. 23.
    Balaraju, J., Prasada Rao, P. V. R. D.: Designing authentication for Hadoop Cluster using DNA algorithm. Int. J. Recent. Technol. Eng. (IJRTE) 8(3) (2019). ISSN: 2277-3878.

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • J. Balaraju
    • 1
  • P. V. R. D. Prasada Rao
    • 1
  1. 1.Department of Computer Science and EngineeringKoneru Lakshmaiah Education FoundationVaddeswaram, GunturIndia

Personalised recommendations