2019
DOI: 10.18517/ijaseit.9.3.5721
|View full text |Cite
|
Sign up to set email alerts
|

Static Knowledge-Based Authentication Mechanism for Hadoop Distributed Platform using Kerberos

Abstract: With the quickened phenomenal expansion of data, storing massive data has become important and increasingly growing day by day. Thus, big data came to express this large data and handling it properly under three important characteristics such as volume, veracity, and Variety. One practical of big data problems is user and services authentication. Kerberos v5 protocol provided a new solution to such this problem in the Hadoop-distributed platform (HDP). In this paper, we suggest a credible scheme by adding one … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…From here comes the importance of getting a unique secret key agreed between the user and the server to use it during communication, where each user will have its own agreed secret key to deal with the server, which symbolized it for the user-A as 𝐾 𝐴,𝑠 . This key is mainly obtained by A and B as a corresponding public key between the user and the server and can by using them calculate the right key, where the following formulas (3) to (6) shows how:…”
Section: Generate a Corresponding Public Key (A B) And 𝑲 𝑨𝒔mentioning
confidence: 99%
See 4 more Smart Citations
“…From here comes the importance of getting a unique secret key agreed between the user and the server to use it during communication, where each user will have its own agreed secret key to deal with the server, which symbolized it for the user-A as 𝐾 𝐴,𝑠 . This key is mainly obtained by A and B as a corresponding public key between the user and the server and can by using them calculate the right key, where the following formulas (3) to (6) shows how:…”
Section: Generate a Corresponding Public Key (A B) And 𝑲 𝑨𝒔mentioning
confidence: 99%
“…Table 4 shows the results of the computation cost for AKMS scheme and the works related static knowledge-based authentication mechanism (SKAM) [6], A token-based authentication security (TASS) [25], and A novel authentication framework for Hadoop (NAFH) [23] as well as give a relative comparison regarding the registration phase, Table 5 will do the same for both the login and communication phases. The total computation cost of the registration phase that represents the user and server is 2T H + T E .…”
Section: Computation Costmentioning
confidence: 99%
See 3 more Smart Citations