Beaf:BD – A Blockchain Enabled Authentication Framework for Big Data
Abstract The widespread utilization of Internet-based applications in our daily routines has resulted in enormous amounts of data being generated every minute. This data is not only produced by humans but also by various machines such as sensors, satellites, CCTV, etc. For many organizations, Apache Hadoop is the solution for handling big data. Big data refers to the extensive set of dissimilar data that can be processed to derive meaningful insights. For its security needs, Hadoop relies on trusted third-party security providers such as Kerberos. Kerberos has several security vulnerabilities. The focus of this paper is to eliminate security issues, particularly dictionary attacks and single points of failure, by proposing a model based on blockchain technology and threshold cryptography.In comparison to other existing schemes, the proposed approach offers superior computational overhead and storage requirements while maintaining the system's security level.
- Referencias
- Cómo citar
- Del mismo autor
- Métricas
Abdullah, N., Hakansson A., & Moradian. E. (2017). Blockchain Based Approach to Enhance Big Data Authentication in Distributed Environment. 9th International Conference on Ubiquitous and Future Networks (ICUFN), 887–892. https://doi.org/10.1109/ICUFN.2017.7993927
Algaradi, T. S., & Rama. B. (2019). Static Knowledge-Based Authentication Mechanism for Hadoop Distributed Platform Using Kerberos. Int. J. Adv. Sci. Eng. Inf. Technol., Vol. 9(3), 772–780. https://doi.org/10.18517/ijaseit.9.3.5721
Algaradi, T. S., & Rama. B. (2022). An authentication key management scheme for securing big data environment. Electrical and Computer Engineering, 12(3), 3238–3248. https://doi.org/10.11591/ijece.v12i3.pp3238-3248
Anisetti, M., Ardagna, C. A., & Berto, F. (2023). An assurance process for Big Data trust worthiness. Future Generation Computer Systems, 146, 34–46, ISSN 0167-739X
Castro, M., & Liskov. B. (1999). Practical Byzantine Fault Tolerance. 3rd Symposium on Operating Systems Design and Implementation, New Orleans, USA, 1–14.
Chandra, S., Ray, S., & Goswami R. T. (2017). Big Data Security: Survey on Frameworks and Algorithms. IEEE 7th International Advance Computing Conference (IACC), 48–54. https://doi.org/10.1109/IACC.2017.0025
Dean, J., & Ghemawat. S. (2008). MapReduce: simplified data processing on large clusters. Communications of the ACM 51(1), 107–113. https://doi.org/10.1145/1327452.1327492
Hena, M., & Jeyanthi, N. (2022). Distributed authentication framework for Hadoop based bigdata environment. J Ambient Intell Human Comput 13, 4397–4414. https://doi.org/10.1007/s12652-021-03522-0
Honar Pajooh, H., Rashid, M.A., Alam, F., et al. (2021). IoT Big Data provenance scheme using blockchain on Hadoop ecosystem. J Big Data 8, 114. https://doi.org/10.1186/s40537-021-00505
Jeong, YS., & Kim, YT. (2015). A token-based authentication security scheme for Hadoop distributed file system using elliptic curve cryptography. J ComputVirol Hack Tech 11, 137–142. https://doi.org/10.1007/s11416-014-0236-5
Kilinc, H. H., & Yanik. T. (2014). A Survey of SIP Authentication and Key Agreement Schemes. IEEE Commun. Surv. Tutorials, 16(2), 1005–1023.
Li, R., Asaeda, H., Li, J., & Fu. X. (2017). A Distributed Authentication and Authorization Scheme for In-Network Big Data Sharing. Digit. Commun. Networks, 3(4), 226–235.
Lin, C., He, D., Huang, X., Choo, K. K. R., & Vasilakos. A. V. (2018). BSeIn: A Blockchain-Based Secure Mutual Authentication with Fine-Grained Access Control System for Industry 4.0. J. Netw. Comput. Appl., 116, 42–52.
Lingappa, R. (2019). What Is Secure Remote Password (SRP) Protocol and How to Use It? The Startup, Medium. Accessed 15 March 2021. https://medium.com/swlh/what-is-secure-remote-password-srp-protocol-and-how-touse-it-70e415b94a76
Rahul, P. K., & GireeshKumar. T. (2015). A Novel Authentication Framework for Hadoop. Advances in Intelligent Systems and Computing, 324, 333–340
Sarvabhatla, M., Chandra, M. R. M., & Vorugunti. C. S. (2015). A Secure and Light Weight Authentication Service in Hadoop Using One Time Pad. Procedia Computer Science, 50, 81–86.
Somu, N., Gangaa, A., & Shankar Sriram. V. S. (2014). Authentication Service in Hadoop Using One Time Pad. Indian J. Sci. Technol., 7, 56–62
Tall, A.M., & Zou, C.C. (2023). A Framework for Attribute-Based Access Control in Processing Big Data with Multiple Sensitivities. Appl. Sci, 13, 1183. https://doi.org/10.3390/app13021183
Wang, K., Yu, J., Liu, X., & Guo. S. (2017). A Pre-Authentication Approach to Proxy Re-Encryption in Big Data Context. IEEE Trans. Big Data, 1–11.
Wu, T-Y., Guo, X., Yang, L., Meng, Q., & Chen, C-M. (2021). A Lightweight Authenticated Key Agreement Protocol Using Fog Nodes in Social Internet of Vehicles. Mobile Information Systems, Article ID 3277113, 14 pages. https://doi.org/10.1155/2021/3277113
Zahednejad B., Teng H., Kosari S., & Xiaojun R. (2023). A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability. International Journal of Intelligent Systems, 48–54. https://doi.org/10.1155/2023/9731239
Algaradi, T. S., & Rama. B. (2019). Static Knowledge-Based Authentication Mechanism for Hadoop Distributed Platform Using Kerberos. Int. J. Adv. Sci. Eng. Inf. Technol., Vol. 9(3), 772–780. https://doi.org/10.18517/ijaseit.9.3.5721
Algaradi, T. S., & Rama. B. (2022). An authentication key management scheme for securing big data environment. Electrical and Computer Engineering, 12(3), 3238–3248. https://doi.org/10.11591/ijece.v12i3.pp3238-3248
Anisetti, M., Ardagna, C. A., & Berto, F. (2023). An assurance process for Big Data trust worthiness. Future Generation Computer Systems, 146, 34–46, ISSN 0167-739X
Castro, M., & Liskov. B. (1999). Practical Byzantine Fault Tolerance. 3rd Symposium on Operating Systems Design and Implementation, New Orleans, USA, 1–14.
Chandra, S., Ray, S., & Goswami R. T. (2017). Big Data Security: Survey on Frameworks and Algorithms. IEEE 7th International Advance Computing Conference (IACC), 48–54. https://doi.org/10.1109/IACC.2017.0025
Dean, J., & Ghemawat. S. (2008). MapReduce: simplified data processing on large clusters. Communications of the ACM 51(1), 107–113. https://doi.org/10.1145/1327452.1327492
Hena, M., & Jeyanthi, N. (2022). Distributed authentication framework for Hadoop based bigdata environment. J Ambient Intell Human Comput 13, 4397–4414. https://doi.org/10.1007/s12652-021-03522-0
Honar Pajooh, H., Rashid, M.A., Alam, F., et al. (2021). IoT Big Data provenance scheme using blockchain on Hadoop ecosystem. J Big Data 8, 114. https://doi.org/10.1186/s40537-021-00505
Jeong, YS., & Kim, YT. (2015). A token-based authentication security scheme for Hadoop distributed file system using elliptic curve cryptography. J ComputVirol Hack Tech 11, 137–142. https://doi.org/10.1007/s11416-014-0236-5
Kilinc, H. H., & Yanik. T. (2014). A Survey of SIP Authentication and Key Agreement Schemes. IEEE Commun. Surv. Tutorials, 16(2), 1005–1023.
Li, R., Asaeda, H., Li, J., & Fu. X. (2017). A Distributed Authentication and Authorization Scheme for In-Network Big Data Sharing. Digit. Commun. Networks, 3(4), 226–235.
Lin, C., He, D., Huang, X., Choo, K. K. R., & Vasilakos. A. V. (2018). BSeIn: A Blockchain-Based Secure Mutual Authentication with Fine-Grained Access Control System for Industry 4.0. J. Netw. Comput. Appl., 116, 42–52.
Lingappa, R. (2019). What Is Secure Remote Password (SRP) Protocol and How to Use It? The Startup, Medium. Accessed 15 March 2021. https://medium.com/swlh/what-is-secure-remote-password-srp-protocol-and-how-touse-it-70e415b94a76
Rahul, P. K., & GireeshKumar. T. (2015). A Novel Authentication Framework for Hadoop. Advances in Intelligent Systems and Computing, 324, 333–340
Sarvabhatla, M., Chandra, M. R. M., & Vorugunti. C. S. (2015). A Secure and Light Weight Authentication Service in Hadoop Using One Time Pad. Procedia Computer Science, 50, 81–86.
Somu, N., Gangaa, A., & Shankar Sriram. V. S. (2014). Authentication Service in Hadoop Using One Time Pad. Indian J. Sci. Technol., 7, 56–62
Tall, A.M., & Zou, C.C. (2023). A Framework for Attribute-Based Access Control in Processing Big Data with Multiple Sensitivities. Appl. Sci, 13, 1183. https://doi.org/10.3390/app13021183
Wang, K., Yu, J., Liu, X., & Guo. S. (2017). A Pre-Authentication Approach to Proxy Re-Encryption in Big Data Context. IEEE Trans. Big Data, 1–11.
Wu, T-Y., Guo, X., Yang, L., Meng, Q., & Chen, C-M. (2021). A Lightweight Authenticated Key Agreement Protocol Using Fog Nodes in Social Internet of Vehicles. Mobile Information Systems, Article ID 3277113, 14 pages. https://doi.org/10.1155/2021/3277113
Zahednejad B., Teng H., Kosari S., & Xiaojun R. (2023). A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability. International Journal of Intelligent Systems, 48–54. https://doi.org/10.1155/2023/9731239
Gupta, M. K., & Dwivedi, R. K. (2023). Beaf:BD – A Blockchain Enabled Authentication Framework for Big Data. ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal, 12(1), e19163. https://doi.org/10.14201/adcaij.19163
Most read articles by the same author(s)
- Manish Kumar Gupta, Rajendra Kumar Dwivedi, Blockchain Enabled Hadoop Distributed File System Framework for Secure and Reliable Traceability , ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal: Vol. 12 (2023)
Downloads
Download data is not yet available.
+
−