全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Hadoop Distributed File System Security Challenges and Examination of Unauthorized Access Issue

DOI: 10.4236/jis.2022.132002, PP. 23-42

Keywords: Hadoop Security Issue, Unauthorized Access, Honeypot Node, Intrusion Detector

Full-Text   Cite this paper   Add to My Lib

Abstract:

Hadoop technology is followed by some security issues. At its beginnings, developers paid attention to the development of basic functionalities mostly, and proposal of security components was not of prime interest. Because of that, the technology remained vulnerable to malicious activities of unauthorized users whose purpose is to endanger system functionalities or to compromise private user data. Researchers and developers are continuously trying to solve these issues by upgrading Hadoop’s security mechanisms and preventing undesirable malicious activities. In this paper, the most common HDFS security problems and a review of unauthorized access issues are presented. First, Hadoop mechanism and its main components are described as the introduction part of the leading research problem. Then, HDFS architecture is given, and all including components and functionalities are introduced. Further, all possible types of users are listed with an accent on unauthorized users, which are of great importance for the paper. One part of the research is dedicated to the consideration of Hadoop security levels, environment and user assessments. The review also includes an explanation of Log Monitoring and Audit features, and detail consideration of authorization and authentication issues. Possible consequences of unauthorized access to a system are covered, and a few recommendations for solving problems of unauthorized access are offered. Honeypot nodes, security mechanisms for collecting valuable information about malicious parties, are presented in the last part of the paper. Finally, the idea for developing a new type of Intrusion Detector, which will be based on using an artificial neural network, is presented. The detector will be an integral part of a new kind of virtual honeypot mechanism and represents the initial base for future scientific work of authors.

References

[1]  Saraladevi, B., Pazhaniraja, N., Paul, P.V., Basha, M.S.S. and Dhavachelvan, P. (2018) Big Data Security Challenges: Hadoop Perspective. International Journal of Pure and Applied Mathematics, 120, 11767-11784.
[2]  Kumar, V. and Chaturvedi, A. (2017) Challenges and Security Issues in Implementation of Hadoop Technology in Current Digital Era. International Journal of Scientific & Engineering Research, 8, 984-990.
[3]  Abouelmehdi, K., Beni-Hssane, A., Khaloufi, H. and Saadi, M. (2016) Big Data Emerging Issues: Hadoop Security and Privacy. 2016 5th International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, 29 September-1 October 2016, 731-736.
https://doi.org/10.1109/ICMCS.2016.7905621
[4]  Inukollu, V.N., Arsi, S. and Ravuri, S.R. (2014) Security Issues Associated with Big Data in Cloud Computing. International Journal of Network Security & Its Applications (IJNSA), 6, 45-56.
https://doi.org/10.5121/ijnsa.2014.6304
[5]  Kumar, M.P. and Pattem, S. (2017) Security Issues in Hadoop Associated with Big Data. IOSR Journal of Computer Engineering (IOSR-JCE), 19, 80-85.
[6]  Singh, K. and Kaur, R. (2014) Hadoop: Addressing Challenges of Big Data. 2014 IEEE International Advance Computing Conference (IACC), Gurgaon, 21-22 February 2014, 686-689.
https://doi.org/10.1109/IAdCC.2014.6779407
[7]  Honnutagi, P.S. (2014) The Hadoop Distributed File System. International Journal of Computer Science and Information Technologies, 5, 6238-6243.
[8]  Shvachko, K., Kuang, H., Radia, S. and Chansler, R. (2010) The Hadoop Distributed File System. 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), Incline Village, NV, 3-7 May 2010, 1-10.
https://doi.org/10.1109/MSST.2010.5496972
[9]  Shafer, J., Rixner, S. and Cox, A.L. (2010) The Hadoop Distributed File System: Balancing Portability and Performance. 2010 IEEE International Symposium on Performance Analysis of Systems & Software (ISPASS), White Plains, NY, 28-30 March 2010, 122-133.
https://doi.org/10.1109/ISPASS.2010.5452045
[10]  Borthakur, D. (2005) The Hadoop Distributed File System: Architecture and Design. The Apache Software Foundation, Wakefield, MA.
[11]  Rani, N.S. and Lakshmi, N.V.M. (2018) Major Challenges with Hadoop Distributed Framework: An Overview. IADS International Conference on Computing, Communications & Data Engineering, Tirupati, 7-8 February 2018.
[12]  Sajwan, V., Yadav, V. and Haider, M. (2015) The Hadoop Distributed File System: Architecture and Internals. International Journal of Combined Research & Development (IJCRD), 4, 541-544.
[13]  Sharma, P.P. and Navdeti, C.P. (2014) Securing Big Data Hadoop: A Review of Security Issues, Threats and Solution. International Journal of Computer Science and Information Technologies (IJCSIT), 5, 2126-2131.
[14]  Neuman, B.C. and Ts’o, T. (1994) Kerberos: An Authentication Service for Computer Networks. IEEE Communications Magazine, 32, 33-38.
https://doi.org/10.1109/35.312841
[15]  Kadam, S.R. and Patil, V. (2017) Review on Big Data Security in Hadoop. International Research Journal of Engineering and Technology (IRJET), 4, 1362-1365.
[16]  Kumar, A., Nikitha, S. and Sundarajan, P. (2015) A Framework of Privacy Scribed Thesis on Cloud Environment and Hadoop Based Big Data. International Journal of Technology Enhancements and Emerging Engineering Research, 3, 114-118.
[17]  Reddy, Y.B. (2015) Access Control Mechanisms in Big Data Processing. Proceeding (829) Software Engineering and Applications/831: Advances in Power and Energy Systems, Marina del Rey, 26-27 October 2015.
https://doi.org/10.2316/P.2015.829-006
[18]  Parmar, R.R., Roy, S., Bhattacharyya, D., Bandyopadhyay, S.K. and Kim, T. (2017) Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions. IEEE Access, 5, 7156-7163.
https://doi.org/10.1109/ACCESS.2017.2700228
[19]  Gupta, M., Patwa, F., Benson, J. and Sandhu, R. (2017) Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment. Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies (SACMAT), Indianapolis, 21-23 June 2017, 183-190.
https://doi.org/10.1145/3078861.3084173
[20]  Kanyeba, M. and Yu, L. (2016) Securing Authentication within Hadoop. 2016 International Conference on Electrical, Mechanical and Industrial Engineering (ICEMIE), Phuket, 24-25 April 2016, 100-103.
https://doi.org/10.2991/icemie-16.2016.25
[21]  Blocki, J. and Datta, A. (2016) CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection. 2016 IEEE 29th Computer Security Foundations Symposium (CSF), Lisbon, 27 June-1 July 2016, 371-386.
https://doi.org/10.1109/CSF.2016.33
[22]  Turner, S. (2014) Transport Layer Security. IEEE Internet Computing, 18, 60-63.
https://doi.org/10.1109/MIC.2014.126
[23]  Shahane, R., Shruthi, P., Viswanadh, B. and Abhilash, D. (2019) A Comparative Study of Various Security Threats and Solutions for the Security of Hadoop Framework in Terms of Authentication and Authorization. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8, 1599-1602.
[24]  Tripathi, S., Gupta, B., Almomani, A., Mishra, A. and Veluru, S. (2013) Hadoop Based Defense Solution to Handle Distributed Denial of Service (DDoS) Attacks. Journal of Information Security, 4, 150-164.
https://doi.org/10.4236/jis.2013.43018
[25]  Daoudhiri, K., Abouchabaka, J. and Rafalia, N. (2018) Attacks and Countermeasures in a Hadoop Cluster. International Journal of Scientific & Engineering Research, 9, 66-70.
[26]  Provos, N. (2004) A Virtual Honeypot Framework. Proceedings of the 13th USENIX Security Symposium, San Diego, CA, 9-13 August 2004, 1-14.
[27]  Samu, F. (2016) Design and Implementation of a Real-Time Honeypot System for the Detection and Prevention of Systems Attacks. Master’s Thesis, St. Cloud State University, St Cloud, MN.
[28]  Holz, T. and Raynal, F. (2005) Detecting Honeypots and Other Suspicious Environments. Proceedings of the 2005 IEEE Workshop on Information Assurance and Security, West Point, NY, 15-17 June 2005, 29-36.
[29]  Varlan, C., Rughiniş, R. and Purdilă, O. (2010) A Practical Analysis of Virtual Honeypot Mechanisms. Proceedings of the 9th RoEduNet IEEE International Conference, Sibiu, 24-26 June 2010, 25-30.
[30]  Ekwonwune, E. and Ezeoha, B. (2019) Scalable Distributed File Sharing System: A Robust Strategy for a Reliable Networked Environment in Tertiary Institutions. International Journal of Communications, Network and System Sciences, 12, 49-58.
https://doi.org/10.4236/ijcns.2019.124005

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133