Beaf:BD – A Blockchain Enabled Authentication Framework for Big Data

  • Manish Kumar Gupta
    Department of Information Technology & Computer Application, Madan Mohan Malaviya University of Technology, Gorakhpur, U.P., India, 273010. manish.testing09[at]
  • Rajendra Kumar Dwivedi
    Department of Information Technology & Computer Application, Madan Mohan Malaviya University of Technology, Gorakhpur, U.P., India, 273010.


The widespread utilization of Internet-based applications in our daily routines has resulted in enormous amounts of data being generated every minute. This data is not only produced by humans but also by various machines such as sensors, satellites, CCTV, etc. For many organizations, Apache Hadoop is the solution for handling big data. Big data refers to the extensive set of dissimilar data that can be processed to derive meaningful insights. For its security needs, Hadoop relies on trusted third-party security providers such as Kerberos. Kerberos has several security vulnerabilities. The focus of this paper is to eliminate security issues, particularly dictionary attacks and single points of failure, by proposing a model based on blockchain technology and threshold cryptography.In comparison to other existing schemes, the proposed approach offers superior computational overhead and storage requirements while maintaining the system's security level.
  • Referencias
  • Cómo citar
  • Del mismo autor
  • Métricas
Abdullah, N., Hakansson A., & Moradian. E. (2017). Blockchain Based Approach to Enhance Big Data Authentication in Distributed Environment. 9th International Conference on Ubiquitous and Future Networks (ICUFN), 887–892.

Algaradi, T. S., & Rama. B. (2019). Static Knowledge-Based Authentication Mechanism for Hadoop Distributed Platform Using Kerberos. Int. J. Adv. Sci. Eng. Inf. Technol., Vol. 9(3), 772–780.

Algaradi, T. S., & Rama. B. (2022). An authentication key management scheme for securing big data environment. Electrical and Computer Engineering, 12(3), 3238–3248.

Anisetti, M., Ardagna, C. A., & Berto, F. (2023). An assurance process for Big Data trust worthiness. Future Generation Computer Systems, 146, 34–46, ISSN 0167-739X

Castro, M., & Liskov. B. (1999). Practical Byzantine Fault Tolerance. 3rd Symposium on Operating Systems Design and Implementation, New Orleans, USA, 1–14.

Chandra, S., Ray, S., & Goswami R. T. (2017). Big Data Security: Survey on Frameworks and Algorithms. IEEE 7th International Advance Computing Conference (IACC), 48–54.

Dean, J., & Ghemawat. S. (2008). MapReduce: simplified data processing on large clusters. Communications of the ACM 51(1), 107–113.

Hena, M., & Jeyanthi, N. (2022). Distributed authentication framework for Hadoop based bigdata environment. J Ambient Intell Human Comput 13, 4397–4414.

Honar Pajooh, H., Rashid, M.A., Alam, F., et al. (2021). IoT Big Data provenance scheme using blockchain on Hadoop ecosystem. J Big Data 8, 114.

Jeong, YS., & Kim, YT. (2015). A token-based authentication security scheme for Hadoop distributed file system using elliptic curve cryptography. J ComputVirol Hack Tech 11, 137–142.

Kilinc, H. H., & Yanik. T. (2014). A Survey of SIP Authentication and Key Agreement Schemes. IEEE Commun. Surv. Tutorials, 16(2), 1005–1023.

Li, R., Asaeda, H., Li, J., & Fu. X. (2017). A Distributed Authentication and Authorization Scheme for In-Network Big Data Sharing. Digit. Commun. Networks, 3(4), 226–235.

Lin, C., He, D., Huang, X., Choo, K. K. R., & Vasilakos. A. V. (2018). BSeIn: A Blockchain-Based Secure Mutual Authentication with Fine-Grained Access Control System for Industry 4.0. J. Netw. Comput. Appl., 116, 42–52.

Lingappa, R. (2019). What Is Secure Remote Password (SRP) Protocol and How to Use It? The Startup, Medium. Accessed 15 March 2021.

Rahul, P. K., & GireeshKumar. T. (2015). A Novel Authentication Framework for Hadoop. Advances in Intelligent Systems and Computing, 324, 333–340

Sarvabhatla, M., Chandra, M. R. M., & Vorugunti. C. S. (2015). A Secure and Light Weight Authentication Service in Hadoop Using One Time Pad. Procedia Computer Science, 50, 81–86.

Somu, N., Gangaa, A., & Shankar Sriram. V. S. (2014). Authentication Service in Hadoop Using One Time Pad. Indian J. Sci. Technol., 7, 56–62

Tall, A.M., & Zou, C.C. (2023). A Framework for Attribute-Based Access Control in Processing Big Data with Multiple Sensitivities. Appl. Sci, 13, 1183.

Wang, K., Yu, J., Liu, X., & Guo. S. (2017). A Pre-Authentication Approach to Proxy Re-Encryption in Big Data Context. IEEE Trans. Big Data, 1–11.

Wu, T-Y., Guo, X., Yang, L., Meng, Q., & Chen, C-M. (2021). A Lightweight Authenticated Key Agreement Protocol Using Fog Nodes in Social Internet of Vehicles. Mobile Information Systems, Article ID 3277113, 14 pages.

Zahednejad B., Teng H., Kosari S., & Xiaojun R. (2023). A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability. International Journal of Intelligent Systems, 48–54.
Gupta, M. K., & Dwivedi, R. K. (2023). Beaf:BD – A Blockchain Enabled Authentication Framework for Big Data. ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal, 12(1), e19163.


Download data is not yet available.