Ocean University of China, Qingdao 266100, China
Abstract: As an open-source cloud computing framework, Hadoop does well in dealing with the flood of data, which takes it increasingly attention in the business world, while its weakness in security mechanism becomes one of the main problems stunting its development. This paper presents the work model of Hadoop framework first, and then by studying the security mechanism of Hadoop, the security risks are analyzed, and the solution that the PKI is used in the application of Hadoop security is proposed. This solution implements Hadoop cloud computing platform authentication and access control mechanisms, strengthens the security of the Hadoop platform, and can meet the demand for cloud security.
Keywords:Hadoop, Security Mechanism, PKI
References
(1)Chuck Lam. Hadoop in action[M]. Manning Publications, (2010).
(2)DhrubaBorthakur. HDFS Architecture Guide [OL].http://hadoop.apache.org/docs/hdfs/current/hdfs_design.html, (2010).
(3)MapReduce[OL].http://wiki.apache.org/hadoop/MapReduce, (2011).
(4)JobTracker[OL].http://wiki.apache.org/hadoop/JobTracker, (2010).
(5)TaskTracker[OL].http://wiki.apache.org/hadoop/TaskTracker, (2009).
(6)Owen O’Malley, Kan Zhang, Sanjay Radia, Ram Marti, and Christopher Harrell. Hadoop Security Design [OL], (2009).
(7)Tom White. Hadoop: The Definitive Guide, Second Edition [M]. O’Reilly Media, Inc., (2011).
(8)Service Level Authorization Guide [OL]. http://hadoop.apache.org/docs/stable/service_level_auth.html, (2008).
(9)LI Ming-Zhu. PKI Technology and Application Development Guide [OL]. http://www.ibm.com/developerworks/cn/security/se-pkiusing/index.html#author1, (2002).
(10)FENG Deng-Guo, ZHANG Min, ZHANG Yan, XU Zhen. Study on Cloud Computing Security [J]. Journal of Software, 22, 1. 71− 83, (2011).
Foundation item: The national natural science fund project (60970129)
Scientific research item: Marine public welfare industry research special funds for the project (201105033)
ZHANG Xue-Jiaoholds a B.SE. in Computer Science and Technology, and is pursuing a M.SE. in Computer Technology at the Ocean University of China. She has been involving the Cloud Computing project and studying the source code of Hadoop. Her current research is ciphertext retrieval.