Skip to main content

Innovative Secure Authentication Interface for Hadoop Cluster Using DNA Cryptography: A Practical Study

  • Conference paper
  • First Online:
Soft Computing and Signal Processing (ICSCSP 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1118))

Included in the following conference series:

Abstract

Big data (BD) handling is a vital task in today’s world where huge amount of data is circulated within a distributed network. To handle BD, Hadoop is being widely used by various organizations, as Hadoop supports both parallel processing and distributed computing over wide area networks. Hadoop clusters (HC) are widely accepted in the distributed and parallel computing frameworks for storing the BD because of its good scalability, tightly coupling among commodity hardware. Though data storage and processing can be handled well by HC, it does not provide data security which is inevitable where data may contain sensitive information. In HC Yet Another Resource Negotiator (YARN) and NameNode act as masters that provide resources for users and processes without authentication. All kinds of users in HC have the same level of accessing privileges which can be a threat to data security. HC completely depends on third-party security providers for satisfying various security requirements which in turn is a computational burden. This paper proposes a proprietary new security mechanism, implemented as Secure Authentication Interface (SAI) layer over HC. SAI provides user authentication, metadata security and access control all at a time. Compared to the existing mechanisms, SAI can provide security with less computational overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Furht, B., Villanustre, F.: Introduction to big data. In: Springer 2016 International Conference on Big Data Technologies of Applications, pp. 17–18, pp. 1–3, USA (Nov 2016)

    Google Scholar 

  2. Adluru, P., Datla, S.S., Zhang, X.: Hadoop eco system for big data security and privacy. In: IEEE 2015 Long Island Systems, Applications and Technology, Farmingdale, NY, USA, pp. 1–6, 1 May 2015

    Google Scholar 

  3. Guo, M.: Design and realization of bank history data management system based on hadoop 2.0. In: Springer 2018; Cluster Computing in Springer, Springer USA, pp. 1–7, 5 Mar 2018

    Google Scholar 

  4. Pradhananga, Y., Karande, S., Karande, C.: High performance analytics of big data with dynamic and optimized hadoop cluster. In: IEEE 2016 International Conference on Advanced Communication Control and Computing Technologies, Ramanathapuram, India, pp. 25–26, pp. 715–720, May 2016

    Google Scholar 

  5. Ismail, M., Gebremeskel, E., Kakantousis, T., Berthou, G., Dowling, J. Hopsworks: Improving user experience and development on hadoop with scalable, strongly consistent metadata. In: IEEE 2017; International Conference on Distributed Computing Systems, Atlanta, USA, pp. 2525–2528, 5–8 July 2017

    Google Scholar 

  6. Jena, B., Gourisaria, M.K., Rautaray, S.S., Pandey, M.: Improvising Name Node performance by aggregator aided HADOOP framework. In: IEEE 2016; International Conference on Control, Instrumentation, Communication and Computational Technologies, Kumaracoil, India, pp. 382–388, 16–17 Dec 2016

    Google Scholar 

  7. Sethi, K.K., Ramesh, D.: Delay scheduling with reduced workload on jobtracker in hadoop. In: Springer 2015, Innovations in Bio-Inspired Computing and Applications, Advances in Intelligent Systems and Computing, vol. 424, pp 371–381

    Google Scholar 

  8. Li, Q., Sun, Z., Wei, Z., Sun, G.: A new data access mechanism for HDFS. In: IOP 2017, Journal of Physics: Conference Series, vol. 898, pp. 1–7

    Google Scholar 

  9. Manwal, M., Gupta, A.: Big data and hadoop—a technological survey. In: IEEE 2017, International Conference on Emerging Trends in Computing and Communication Technologies, Dehradun, India, pp. 1–6, 17–18 Nov 2017

    Google Scholar 

  10. Alam, A., Ahmed, J.: Hadoop architecture and its issues. In: IEEE 2014, International Conference on Computational Science and Computational Intelligence, Las Vegas, NV, USA, pp. 288–291, 10–13 Mar 2014

    Google Scholar 

  11. Revathy, P., Mukesh, R.: Analysis of big data security practices. In: IEEE 2017, 3rd International Conference on Applied and Theoretical Computing and Communication Technology, Tumkur, India, pp. 264–267, 21–23 Dec 2017

    Google Scholar 

  12. Saraladevia, B., Pazhanirajaa, N., Victer Paula, P., Saleem Bashab, M.S., Dhavachelvanc, P.: Big data and hadoop-a study in security perspective. In: Elsevier 2015, 2nd International Symposium on Big Data and Cloud Computing, Chennai, India, pp. 596–601, 12–13 Mar 2015

    Google Scholar 

  13. Pant, P., Kumar, P., Alam, I., Rawat, S.: In: Springer 2018, Analytical Planning and Implementation of Big Data Technology Working at Enterprise Level, pp. 1031–1043, Springer, Singapore (2018)

    Google Scholar 

  14. Gupta, S., Giri, V.: Data security in data lakes. In: Springer 2018, Practical Enterprise Data Lake Insights, pp. 225–259. Apress, Berkeley (2018)

    Google Scholar 

  15. Balaraju, J., Prasada Rao, P.V.R.D.: Recent advances in big data storage and security schemas of HDFS: a survey. In: JOET 2018, vol. 6, Special Issue (Emerging Trends in Engineering Technology), ASSE, USA, pp. 132–138, Mar 2018

    Google Scholar 

  16. Abhishek, K., Verma, M.K., Shivam, K., Kumar, V., Mohan, A.: Integrated hadoop Cloud Framework (IHCF). Indian J. Sci. Technol. IJST 2017, 10, 1–8 (2017)

    Google Scholar 

  17. Kourid, A., Chikhi S.: A comparative study of recent advances in big data for security and privacy. In: Springer 2018, Networking Communication and Data Knowledge Engineering. Lecture Notes on Data Engineering and Communications Technologies, pp. 249–259. Springer, Singapore, 25 Apr 2016, Phuket, Thailand, pp. 100–1003 (2018)

    Google Scholar 

  18. Murthy, K., Ashok kumar, P.S., Palagi, P., Bhasaha, N.: Implication of restful web services in Bigdata analytics. In: 2nd International Conference on Computational Systems and Information Technology for Sustainable Solution, Bangalore, India, IEEE 2017, pp. 122–125 (2017)

    Google Scholar 

  19. Ahmed, H., Ismail, M.A., Hyder, M.F.: Performance optimization of hadoop cluster using linux services. In: 17th IEEE International Multi Topic Conference, IEEE 2014, Karachi, Pakistan, pp. 167–172, 8–10 Dec 2014

    Google Scholar 

  20. Caceres, R. et al.: Building a MAC-based security architecture for the Xen open-source hypervisor. In: Computer Security Applications Conference, Annual (ACSAC), IEEE 2005, Tucson, Arizona, pp. 276–285, 4–9 Dec 2005

    Google Scholar 

  21. Hossain, E.M.S., Alam, K.M.R., Biswas, M.R., Morimoto, Y.: A DNA cryptographic technique based on dynamic DNA sequence table. In: International Conference on Computer and Information Technology, IEEE 2016, Dhaka, Bangladesh, pp. 270–276, 18–20 Dec 2016

    Google Scholar 

  22. Marwan, S., Shawish, A., Nagaty, K.: DNA-based cryptographic methods for data hiding in DNA media. In: ScienceDirect, pp. 110–118, Aug 2016

    Google Scholar 

  23. Balaraju, J., Prasada Rao, P. V. R. D.: Designing authentication for Hadoop Cluster using DNA algorithm. Int. J. Recent. Technol. Eng. (IJRTE) 8(3) (2019). ISSN: 2277-3878. https://doi.org/10.35940/ijrte.C5895.0983

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Balaraju, J., Prasada Rao, P.V.R.D. (2020). Innovative Secure Authentication Interface for Hadoop Cluster Using DNA Cryptography: A Practical Study. In: Reddy, V., Prasad, V., Wang, J., Reddy, K. (eds) Soft Computing and Signal Processing. ICSCSP 2019. Advances in Intelligent Systems and Computing, vol 1118. Springer, Singapore. https://doi.org/10.1007/978-981-15-2475-2_3

Download citation

Publish with us

Policies and ethics