<p id="nxp5x"><big id="nxp5x"><noframes id="nxp5x">

    <var id="nxp5x"><video id="nxp5x"></video></var>

          <em id="nxp5x"></em>

              首 頁 本刊概況 出 版 人 發行統計 在線訂閱 歡迎投稿 市場分析 1 組織交流 1 關于我們
             
            1
               通信短波
            1
               新品之窗
            1
               優秀論文
            1
               通信趨勢
            1
               特別企劃
            1
               運營商動態
            1
               技術前沿
            1
               市場聚焦
            1
               通信視點
            1
               信息化論壇
            1
            當前位置:首頁 > 優秀論文
            The Research of PKI in the Application of Hadoop Security
            作者:ZHANG Xue-Jiao*,LIUPei-Shun
            來源:本站原創
            更新時間:2013/3/15 9:32:00
            正文:

                                  Ocean University of China, Qingdao 266100, China


            Abstract: As an open-source cloud computing framework, Hadoop does well in dealing with the flood of data, which takes it increasingly attention in the business world, while its weakness in security mechanism becomes one of the main problems stunting its development. This paper presents the work model of Hadoop framework first, and then by studying the security mechanism of Hadoop, the security risks are analyzed, and the solution that the PKI is used in the application of Hadoop security is proposed. This solution implements Hadoop cloud computing platform authentication and access control mechanisms, strengthens the security of the Hadoop platform, and can meet the demand for cloud security.
            Keywords:Hadoop, Security Mechanism, PKI

             

             

            References
            (1)Chuck Lam. Hadoop in action[M]. Manning Publications, (2010).
            (2)DhrubaBorthakur. HDFS Architecture Guide [OL].http://hadoop.apache.org/docs/hdfs/current/hdfs_design.html, (2010).
            (3)MapReduce[OL].http://wiki.apache.org/hadoop/MapReduce, (2011).
            (4)JobTracker[OL].http://wiki.apache.org/hadoop/JobTracker, (2010).
            (5)TaskTracker[OL].http://wiki.apache.org/hadoop/TaskTracker, (2009).
            (6)Owen O’Malley, Kan Zhang, Sanjay Radia, Ram Marti, and Christopher Harrell. Hadoop Security Design [OL], (2009).
            (7)Tom White. Hadoop: The Definitive Guide, Second Edition [M]. O’Reilly Media, Inc., (2011).
            (8)Service Level Authorization Guide [OL]. http://hadoop.apache.org/docs/stable/service_level_auth.html, (2008).
            (9)LI Ming-Zhu. PKI Technology and Application Development Guide [OL]. http://www.ibm.com/developerworks/cn/security/se-pkiusing/index.html#author1, (2002).
            (10)FENG Deng-Guo, ZHANG Min, ZHANG Yan, XU Zhen. Study on Cloud Computing Security [J]. Journal of Software, 22, 1. 71− 83, (2011).

             

            Foundation item: The national natural science fund project (60970129)
            Scientific research item: Marine public welfare industry research special funds for the project (201105033)

             


            ZHANG Xue-Jiaoholds a B.SE. in Computer Science and Technology, and is pursuing a M.SE. in Computer Technology at the Ocean University of China. She has been involving the Cloud Computing project and studying the source code of Hadoop. Her current research is ciphertext retrieval.

             
             
               
            《通信市場》 中國·北京·復興路49號通信市場(100036) 點擊查看具體位置
            電話:86-10-6820 7724, 6820 7726
            京ICP備05037146號-8
            建議使用 Microsoft IE4.0 以上版本 800*600瀏覽 如果您有什么建議和意見請與管理員聯系
            欧美成人观看免费全部欧美老妇0