Design and implementation of a Hadoop-basedsecure cloud computing architecture
碩士 === 國立中山大學 === 資訊工程學系研究所 === 99 === The goal in this research is to design and implement a secure Hadoop cluster. The cloud computing is a type of network computing, where most data is transmitted through network. To develop a secure cloud architecture, we need to validate users first, and guaran...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2011
|
Online Access: | http://ndltd.ncl.edu.tw/handle/07012261269563399440 |
id |
ndltd-TW-099NSYS5392004 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-099NSYS53920042015-10-19T04:03:17Z http://ndltd.ncl.edu.tw/handle/07012261269563399440 Design and implementation of a Hadoop-basedsecure cloud computing architecture 設計與實作一個具安全性的Hadoop雲端計算結構 Sheng-Lun Cheng 鄭聖倫 碩士 國立中山大學 資訊工程學系研究所 99 The goal in this research is to design and implement a secure Hadoop cluster. The cloud computing is a type of network computing, where most data is transmitted through network. To develop a secure cloud architecture, we need to validate users first, and guarantee transmitting data against stealing and falsification. In case of someone steals the data, he is still hard to know content. Therefore, we focus on the following points: I. Authorization: First, we investigate the user authorization problem in Hadoop system, and then, propose two solutions: SOCKS Authorization and Service Level Authorization. SOCKS Authorization is a external authorization in Hadoop System, and uses username/password to identify users. Service Level Authorization is a new authorization mechanism in Hadoop 0.20. This mechanism to ensure clients connecting to a particular Hadoop service have the necessary, pre-configured, permissions and are authorized to access the given service. II. Transmission Encryption: To keep important data, such as Block ID, Job ID, username, etc, away from exposedness in non-trusted networks, we examine Hadoop transmissions in practice, and point out possible security problems. Subsequently, we use IPSec to implement transmission encryption and packet verification for Hadoop. III. Architecture Design: Based on the implementation framework of Hadoop mentioned above, we propose a secure architecture of Hadoop cluster to solve the security problems. In addition, we also evaluate the performances of HDFS and MapRduce in this architecture. CHUN-HUNG RICHARD LIN 林俊宏 2011 學位論文 ; thesis 68 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中山大學 === 資訊工程學系研究所 === 99 === The goal in this research is to design and implement a secure Hadoop cluster. The
cloud computing is a type of network computing, where most data is transmitted through
network. To develop a secure cloud architecture, we need to validate users first, and
guarantee transmitting data against stealing and falsification. In case of someone steals the
data, he is still hard to know content. Therefore, we focus on the following points:
I. Authorization: First, we investigate the user authorization problem in Hadoop
system, and then, propose two solutions: SOCKS Authorization and Service Level
Authorization. SOCKS Authorization is a external authorization in Hadoop System,
and uses username/password to identify users. Service Level Authorization is a new
authorization mechanism in Hadoop 0.20. This mechanism to ensure clients connecting
to a particular Hadoop service have the necessary, pre-configured, permissions and are
authorized to access the given service.
II. Transmission Encryption: To keep important data, such as Block ID, Job ID,
username, etc, away from exposedness in non-trusted networks, we examine Hadoop
transmissions in practice, and point out possible security problems. Subsequently, we
use IPSec to implement transmission encryption and packet verification for Hadoop.
III. Architecture Design: Based on the implementation framework of Hadoop mentioned
above, we propose a secure architecture of Hadoop cluster to solve the security
problems. In addition, we also evaluate the performances of HDFS and MapRduce in
this architecture.
|
author2 |
CHUN-HUNG RICHARD LIN |
author_facet |
CHUN-HUNG RICHARD LIN Sheng-Lun Cheng 鄭聖倫 |
author |
Sheng-Lun Cheng 鄭聖倫 |
spellingShingle |
Sheng-Lun Cheng 鄭聖倫 Design and implementation of a Hadoop-basedsecure cloud computing architecture |
author_sort |
Sheng-Lun Cheng |
title |
Design and implementation of a Hadoop-basedsecure cloud computing architecture |
title_short |
Design and implementation of a Hadoop-basedsecure cloud computing architecture |
title_full |
Design and implementation of a Hadoop-basedsecure cloud computing architecture |
title_fullStr |
Design and implementation of a Hadoop-basedsecure cloud computing architecture |
title_full_unstemmed |
Design and implementation of a Hadoop-basedsecure cloud computing architecture |
title_sort |
design and implementation of a hadoop-basedsecure cloud computing architecture |
publishDate |
2011 |
url |
http://ndltd.ncl.edu.tw/handle/07012261269563399440 |
work_keys_str_mv |
AT shengluncheng designandimplementationofahadoopbasedsecurecloudcomputingarchitecture AT zhèngshènglún designandimplementationofahadoopbasedsecurecloudcomputingarchitecture AT shengluncheng shèjìyǔshízuòyīgèjùānquánxìngdehadoopyúnduānjìsuànjiégòu AT zhèngshènglún shèjìyǔshízuòyīgèjùānquánxìngdehadoopyúnduānjìsuànjiégòu |
_version_ |
1718093456383934464 |