2015
DOI: 10.14257/ijsia.2015.9.11.39
|View full text |Cite
|
Sign up to set email alerts
|

Research on Hadoop Identity Authentication Based on Improved Kerberos Protocol

Abstract: This paper researches the authentication mechanism of Kerberos protocol under HDFS, and

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 2 publications
(1 reference statement)
0
2
0
Order By: Relevance
“…Hadoop currently supports security mechanisms to mitigate these risks, including the use of Kerberos, the adoption of firewalls, and the implementation of basic HDFS permissions [41]. However, Kerberos is not a mandatory requirement for a Hadoop cluster, which makes it possible to run entire groups of data without implementing any security.…”
Section: -Vulnerabilities Of Big Datamentioning
confidence: 99%
“…Hadoop currently supports security mechanisms to mitigate these risks, including the use of Kerberos, the adoption of firewalls, and the implementation of basic HDFS permissions [41]. However, Kerberos is not a mandatory requirement for a Hadoop cluster, which makes it possible to run entire groups of data without implementing any security.…”
Section: -Vulnerabilities Of Big Datamentioning
confidence: 99%
“…The rapid development of the network has brought great conveniences to people's study, life, work, and entertainment, 1 but at the same time, the security problem of the network has become increasingly prominent 2 ; therefore, technologies such as data encryption, 3 identity authentication, 4 intrusion detection, 5 and virus defense 6 have been extensively studied to realize network security better. Network virus refers to a group of codes that can destroy the function or data of computers and also has the ability of self-replication, that is, it can spread quickly among the networks to affect the normal use of computers.…”
Section: Introductionmentioning
confidence: 99%