Security Mechanism Analysis and Research of Hadoop Cloud Computing Cluster

被引:0
|
作者
Xue, Hong-ye [1 ]
Zhai, Rui-tao [1 ]
机构
[1] Xian Univ Sci & Technol, Xian, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Hadoop; Cloud computing frame; Cluster; Security mechanism;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we studied and proposed solutions to the hidden dangers in the security mechanism of Hadoop cloud computing cluster. By analyzing the security mechanism of Hadoop cluster, the paper identifies several security vulnerabilities as such user authentication and certification, and proposes the several solutions to improve the security mechanism of the Hadoop cloud computing. Regarding the data leak that users experience during download or upload, we present a digital envelope technology to encrypt the data transmitted. Additionally, a cryptographic algorithm is adopted to encrypt the virtual disk in cloud disk to prevent data lost. The improvement to the dispatcher in the cluster can enhance the stability of the host node and avoid the system dysfunction. Experimental results demonstrate the effectiveness of the proposed strategy.
引用
收藏
页码:366 / 371
页数:6
相关论文
共 50 条
  • [1] The Research on Cloud computing data security mechanism
    Xu Xiaoping
    Yan Junhu
    Liu Lan
    [J]. ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1595 - 1599
  • [2] The Research of Data Security Mechanism Based on Cloud Computing
    Guo, Changyou
    Zheng, Xuefeng
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 363 - 370
  • [3] Research on the security mechanism of cloud computing service model
    Zhang Y.
    [J]. Automatic Control and Computer Sciences, 2016, 50 (2) : 98 - 106
  • [4] Research on a security mechanism for cloud computing based on virtualization
    Du, Ye
    Zhang, Ruhui
    Li, Meihong
    [J]. TELECOMMUNICATION SYSTEMS, 2013, 53 (01) : 19 - 24
  • [5] Research on a security mechanism for cloud computing based on virtualization
    Ye Du
    Ruhui Zhang
    Meihong Li
    [J]. Telecommunication Systems, 2013, 53 : 19 - 24
  • [6] Hadoop: Analysis of Cloud Computing Infrastructure
    Zhang, Weifeng
    Wang, Tin
    [J]. SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS II, PTS 1 AND 2, 2014, 475-476 : 1201 - 1206
  • [8] Research On Cloud Computing And Security
    Yu, Ting-ting
    Zhu, Ying-Guo
    [J]. 2012 11TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING & SCIENCE (DCABES), 2012, : 314 - 316
  • [9] A Research on Cloud Computing Security
    Zhang, Ni
    Liu, Di
    Zhang, Yun-Yong
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA), 2013, : 370 - 373
  • [10] Security Mechanism for Android Cloud Computing
    Archana, R.
    Mythili, C.
    Kalyani, S. Nithya
    [J]. 2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), 2015, : 133 - 138