JWTAMH: JSON Web Tokens Based Authentication Mechanism for HADOOP.

Authors

  • Manish Gupta Madan Mohan Malaviya University of Technology
  • Anish Gupta Chandigarh Engineering College
  • Britto Raj S. Rajarajeswari College of Engineering
  • Annu Sharma RRASE College of Engineering

DOI:

https://doi.org/10.4108/eetsis.5429

Keywords:

Hadoop, Token-based Authentication, Kerberos, JWT, Security, Access Control

Abstract

The Hadoop platform has become a widely adopted distributed computing platform for handling large-scale data processing tasks. However, the security of the Hadoop platform has become a major concern due to the increased risk of cyber-attacks. To address this concern, various security mechanisms have been proposed for the Hadoop platform, including authentication and access control. This research paper proposes a token-based authentication mechanism to enhance the security of the Hadoop platform. The proposed mechanism utilizes a combination of Kerberos and JSON Web Tokens (JWT) for secure communication between Hadoop components. The experimental results demonstrate the effectiveness of the Single point of failure, Guessing attack, Replay Attack, Brute force attack, and Dictionary attack. The proposed model has better performance in terms of average processing time and accuracy of authentication than other models.

References

Y. Cao, Q. Miao, J. Liu et al., "Abstracting minimal security-relevant behaviors for malware analysis," J. Comput. Virol. Hack. Tech., vol. 9, pp. 193-204, 2013. [Online]. Available: https://doi.org/10.1007/s11416-013-0186-32

S. Ghemawat, H. Gobioff, and S. Leung, "The google file system," in Proceedings of the Nineteenth CM Symposium on Operating Systems Principles, vol. 37, issue 5, 2003, pp. 29-43.

J. Dean and S. Ghemawat, "MapReduce: simplified data processing on large clusters," Commun. ACM, vol. 51, no. 1, pp. 107-113, Jan. 2008. [Online]. Available: https://doi.org/10.1145/1327452.1327492

K. Shvachko, H. Kuang, S. Radia, and R. Chansler, "The Hadoop distributed file system," in Proceedings of the 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), 2010, pp. 1-10.

J. K. Hong, "The security policy for Big Data of US government," J. Digit. Converg., vol. 11, no. 10, pp. 403-409, 2013.

Apache Hadoop MapReduce Tutorial. [Online]. Available: http://hadoop.apache.org/docs/r1.0.4/mapred_tutorial.html

T. White, Hadoop: The Definitive Guide, 2nd ed. O’Reilly Media, Sebastopol, 2009, pp. 41-47.

P. Shen, X. Ding, and W. Ren, "Research on Kerberos Technology Based on Hadoop Cluster Security," in 2nd Int. Conf. Adv. Energy, Environ. Chem. Sci. (AEECS 2018), Atlantis Press, 2018, pp. 228-233.

Y. S. Jeong, S. S. Shin, and K. H. Han, "High-dimensional data authentication protocol based on hash chain for Hadoop systems," Cluster Comput., vol. 19, pp. 475-484, 2016. [Online]. Available: https://doi.org/10.1007/s10586-015-0508-y

K. Zheng and W. Jiang, "A token authentication solution for Hadoop based on Kerberos pre-authentication," in DSAA 2014 - Proc 2014 IEEE Int Conf Data Sci Adv Anal 2014, 2014, pp. 354-360. [Online]. Available: https://doi.org/10.1109/DSAA.2014.7058096

D. Chattaraj, M. Sarma, A. K. Das, N. Kumar, J. J. P. C. Rodrigues, and Y. Park, "HEAP: An Efficient and Fault-Tolerant Authentication and Key Exchange Protocol for Hadoop-Assisted Big Data Platform," IEEE Access, vol. 6, pp. 75342-75382, 2018. [Online]. Available: https://doi.org/10.1109/ACCESS.2018.2883105

M. Haggag, M. M. Tantawy, and M. M. S. El-Soudani, "Token-based authentication for Hadoop platform," Ain Shams Engineering Journal, vol. 14, no. 4, 2023, article 101921. [Online]. Available: https://doi.org/10.1016/j.asej.2022.101921

G. A. Al-Rummana, A. H. A. Al-Ahdal, and G. N. Shinde, "An Implementation of Robust User Authentication Technique for Big Data Platform," in Advances in Cyber Security. ACeS 2021, N. Abdullah, S. Manickam, and M. Anbar, Eds. Springer, Singapore, 2021, vol. 1487, pp. 1256-1261. [Online]. Available: https://doi.org/10.1007/978-981-16-8059-5_4

T. S. Algaradi and B. Rama, "Static knowledge-based authentication mechanism for Hadoop distributed platform using Kerberos," Int. J. Adv. Sci. Eng. Inf. Technol., vol. 9, pp. 772-780, 2019. [Online]. Available: https://doi.org/10.18517/ijaseit.9.3.5721

G. A. Al-Rummana, A. H. A. Al Ahdal, and G. N. Shinde, "A robust user authentication framework for big data," in 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), 2021, pp. 1256-1261.

D. Chattaraj, M. Sarma, A. K. Das, N. Kumar, and J. J. P. C. Rodrigues, "HEAP: an efficient and fault-tolerant authentication and key exchange protocol for Hadoop-assisted big data platform," IEEE Access, vol. 6, pp. 75342-75382, 2018.

D. Chattaraj, M. Sarma, and A. K. Das, "A new two-server authentication and key agreement protocol for accessing secure cloud services," Comput. Netw., vol. 131, pp. 144-164, 2018.

N. Somu, A. Gangaa, and V. S. Shankar Sriram, "Authentication service in Hadoop using one-time pad," Indian J. Sci. Technol., vol. 7, pp. 56-62, 2014.

M. Sarvabhatla, M. R. M. Chandra, and C. S. Vorugunti, "A secure and lightweight authentication service in Hadoop using one-time pad," Procedia Comput. Sci., vol. 50, pp. 81-86, 2015.

T.-Y. Wu, X. Guo, L. Yang, Q. Meng, and C.-M. Chen, "A Lightweight Authenticated Key Agreement Protocol Using Fog Nodes in Social Internet of Vehicles," Mobile Information Systems, vol. 2021, article 3277113, 2021. [Online]. Available: https://doi.org/10.1155/2021/3277113

M. Hena and N. Jeyanthi, "Distributed authentication framework for Hadoop-based big data environment," J. Ambient Intell. Human Comput., vol. 13, pp. 4397-4414, 2022. [Online]. Available: https://doi.org/10.1007/s12652-021-03522-0

H. Honar Pajooh, M. A. Rashid, F. Alam et al., "IoT Big Data provenance scheme using blockchain on Hadoop ecosystem," J. Big Data, vol. 8, article 114, 2021. [Online]. Available: https://doi.org/10.1186/s40537-021-00505

M. Anisetti, C. A. Ardagna, F. Berto, "An assurance process for Big Data trustworthiness," Future Generation Comput. Syst., vol. 146, pp. 34-46, 2023.

A. M. Tall and C. C. Zou, "A Framework for Attribute-Based Access Control in Processing Big Data with Multiple Sensitivities," Appl. Sci., vol. 13, p. 1183, 2023. [Online]. Available: https://doi.org/10.3390/app13021183

M. Gupta and R. K. Dwivedi, "Fortified MapReduce Layer: Elevating Security and Privacy in Big Data," EAI Endorsed Scal. Inf. Syst., vol. 10, no. 6, Oct. 2023.

M. Gupta and R. K. Dwivedi, "Blockchain-Based Secure and Efficient Scheme for Medical Data," EAI Endorsed Scal. Inf. Syst., vol. 10, no. 5, Jun. 2023.

M. K. Gupta, S. K. Pandey, and A. Gupta, "HADOOP- An Open Source Framework for Big Data," in 2022 3rd International Conference on Intelligent Engineering and Management (ICIEM), London, United Kingdom, 2022, pp. 708-711. [Online]. Available: https://doi.org/10.1109/ICIEM54221.2022.9853179

A. Gupta and M. K. Gupta, "HIVE-processing structured data in Hadoop," Int. J. Sci. Eng. Res., vol. 8, no. 6, pp. 45-48, 2017.

Downloads

Published

17-07-2024

How to Cite

1.
Gupta M, Gupta A, Raj S. B, Sharma A. JWTAMH: JSON Web Tokens Based Authentication Mechanism for HADOOP. . EAI Endorsed Scal Inf Syst [Internet]. 2024 Jul. 17 [cited 2024 Nov. 21];11. Available from: https://publications.eai.eu/index.php/sis/article/view/5429

Issue

Section

Research articles