Performance Evaluation of a Hadoop-Based Secure Cloud Platform

Article Preview

Abstract:

Cloud computing platforms offer a convenient solution for addressing challenges of processing large-scale data in both academia and industry, beyond what could be achieved with traditional on-site clusters. There are a great number of on-line cloud services, and in the meantime, the security issue is getting more and more significant for cloud users. Whereas Hadoop-based cloud platform is currently a well-known service framework, our goal in this paper is to investigate the mechanisms of authentication and encryption of Hadoop. We try to construct a highly secure Hadoop platform with small deployment cost, robust attacking prevention, and less performance degradation. We also conduct a number of simulations to evaluate the performance under different parametric settings and cryptographic algorithms. Simulation results reveal the feasibility of security mechanisms, and find that the more important thing to construct cloud platforms with appropriate security mechanisms is to consider the application requirements, which could be a better trade-off between security and user requirement.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3527-3531

Citation:

Online since:

January 2013

Export:

Price:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] A. Verma and S. Kaushal: Cloud computing security issues and challenges: a survey, Advances in Computing and Communications Vol. 193 (2011), p.445–454.

DOI: 10.1007/978-3-642-22726-4_46

Google Scholar

[2] H. Takabi, J. B. D. Joshi, and G. Ahn: Security and privacy challenges in cloud computing environments, IEEE Security & Privacy Vol. 8 (2010), p.24–31.

DOI: 10.1109/msp.2010.186

Google Scholar

[3] D. Zissis and D. Lekkas: Addressing cloud computing security issues, Future Generation Computer Systems Vol. 28 (2012), p.583–592.

DOI: 10.1016/j.future.2010.12.006

Google Scholar

[4] J. Wu, Q. Shen, T. Wang, J. Zhu, and J. Zhang: Recent advances in cloud security, Journal of Computers Vol. 6 (2011), p.2156–2163.

Google Scholar

[5] O. O'Malley, K. Zhang, S. Radia, R. Marti, and C. Harrell: Hadoop security design, available from: http://carfield.com.hk:8080/document/distributed/hadoop-security-design.pdf (2009).

Google Scholar

[6] M. Leech, M. Ganis, Y. Lee, R. Kuris, D. Koblas, and L. Jones: SOCKS protocol version 5 (IETF RFC 1928), available from: http://tools.ietf.org/html/rfc1928 (1996).

DOI: 10.17487/rfc1928

Google Scholar

[7] S. Kent and K. Seo: Security architecture for the internet protocol (IETF RFC 4301), available from: http://tools.ietf.org/html/rfc4301 (2005).

Google Scholar

[8] HDFS proxy guide (The Apache Software Foundation), available from: http://hadoop.apache.org/hdfs/docs/r0.21.0/hdfsproxy.pdf (2009).

Google Scholar

[9] Service level authorization guide (The Apache Software Foundation), available from: http://hadoop.apache.org/common/docs/stable/service_level_auth.pdf (2008).

Google Scholar

[10] A. Kimball: Securing a Hadoop cluster through a gateway (Cloudera), available form: http://www.cloudera.com/blog/2008/12/securing-a-hadoop-cluster-through-a-gateway/ (2008).

Google Scholar

[11] Announcing the Advanced Encryption Standard (AES) (Federal Information Processing Standards (FIPS) Publication 197) (2001).

Google Scholar

[12] W. C. Barker: Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, NIST Special Publication 800-67 Version 1.2 (2011).

DOI: 10.6028/nist.sp.800-67ver1

Google Scholar