Beaf:BD – A Blockchain Enabled Authentication Framework for Big Data

  • Manish Kumar Gupta
    Department of Information Technology & Computer Application, Madan Mohan Malaviya University of Technology, Gorakhpur, U.P., India, 273010. manish.testing09[at]gmail.com
  • Rajendra Kumar Dwivedi
    Department of Information Technology & Computer Application, Madan Mohan Malaviya University of Technology, Gorakhpur, U.P., India, 273010.

Abstract

The widespread utilization of Internet-based applications in our daily routines has resulted in enormous amounts of data being generated every minute. This data is not only produced by humans but also by various machines such as sensors, satellites, CCTV, etc. For many organizations, Apache Hadoop is the solution for handling big data. Big data refers to the extensive set of dissimilar data that can be processed to derive meaningful insights. For its security needs, Hadoop relies on trusted third-party security providers such as Kerberos. Kerberos has several security vulnerabilities. The focus of this paper is to eliminate security issues, particularly dictionary attacks and single points of failure, by proposing a model based on blockchain technology and threshold cryptography.In comparison to other existing schemes, the proposed approach offers superior computational overhead and storage requirements while maintaining the system's security level.
  • Referencias
  • Cómo citar
  • Del mismo autor
  • Métricas
Abdullah, N., Hakansson A., & Moradian. E. (2017). Blockchain Based Approach to Enhance Big Data Authentication in Distributed Environment. 9th International Conference on Ubiquitous and Future Networks (ICUFN), 887–892. https://doi.org/10.1109/ICUFN.2017.7993927

Algaradi, T. S., & Rama. B. (2019). Static Knowledge-Based Authentication Mechanism for Hadoop Distributed Platform Using Kerberos. Int. J. Adv. Sci. Eng. Inf. Technol., Vol. 9(3), 772–780. https://doi.org/10.18517/ijaseit.9.3.5721

Algaradi, T. S., & Rama. B. (2022). An authentication key management scheme for securing big data environment. Electrical and Computer Engineering, 12(3), 3238–3248. https://doi.org/10.11591/ijece.v12i3.pp3238-3248

Anisetti, M., Ardagna, C. A., & Berto, F. (2023). An assurance process for Big Data trust worthiness. Future Generation Computer Systems, 146, 34–46, ISSN 0167-739X

Castro, M., & Liskov. B. (1999). Practical Byzantine Fault Tolerance. 3rd Symposium on Operating Systems Design and Implementation, New Orleans, USA, 1–14.

Chandra, S., Ray, S., & Goswami R. T. (2017). Big Data Security: Survey on Frameworks and Algorithms. IEEE 7th International Advance Computing Conference (IACC), 48–54. https://doi.org/10.1109/IACC.2017.0025

Dean, J., & Ghemawat. S. (2008). MapReduce: simplified data processing on large clusters. Communications of the ACM 51(1), 107–113. https://doi.org/10.1145/1327452.1327492

Hena, M., & Jeyanthi, N. (2022). Distributed authentication framework for Hadoop based bigdata environment. J Ambient Intell Human Comput 13, 4397–4414. https://doi.org/10.1007/s12652-021-03522-0

Honar Pajooh, H., Rashid, M.A., Alam, F., et al. (2021). IoT Big Data provenance scheme using blockchain on Hadoop ecosystem. J Big Data 8, 114. https://doi.org/10.1186/s40537-021-00505

Jeong, YS., & Kim, YT. (2015). A token-based authentication security scheme for Hadoop distributed file system using elliptic curve cryptography. J ComputVirol Hack Tech 11, 137–142. https://doi.org/10.1007/s11416-014-0236-5

Kilinc, H. H., & Yanik. T. (2014). A Survey of SIP Authentication and Key Agreement Schemes. IEEE Commun. Surv. Tutorials, 16(2), 1005–1023.

Li, R., Asaeda, H., Li, J., & Fu. X. (2017). A Distributed Authentication and Authorization Scheme for In-Network Big Data Sharing. Digit. Commun. Networks, 3(4), 226–235.

Lin, C., He, D., Huang, X., Choo, K. K. R., & Vasilakos. A. V. (2018). BSeIn: A Blockchain-Based Secure Mutual Authentication with Fine-Grained Access Control System for Industry 4.0. J. Netw. Comput. Appl., 116, 42–52.

Lingappa, R. (2019). What Is Secure Remote Password (SRP) Protocol and How to Use It? The Startup, Medium. Accessed 15 March 2021. https://medium.com/swlh/what-is-secure-remote-password-srp-protocol-and-how-touse-it-70e415b94a76

Rahul, P. K., & GireeshKumar. T. (2015). A Novel Authentication Framework for Hadoop. Advances in Intelligent Systems and Computing, 324, 333–340

Sarvabhatla, M., Chandra, M. R. M., & Vorugunti. C. S. (2015). A Secure and Light Weight Authentication Service in Hadoop Using One Time Pad. Procedia Computer Science, 50, 81–86.

Somu, N., Gangaa, A., & Shankar Sriram. V. S. (2014). Authentication Service in Hadoop Using One Time Pad. Indian J. Sci. Technol., 7, 56–62

Tall, A.M., & Zou, C.C. (2023). A Framework for Attribute-Based Access Control in Processing Big Data with Multiple Sensitivities. Appl. Sci, 13, 1183. https://doi.org/10.3390/app13021183

Wang, K., Yu, J., Liu, X., & Guo. S. (2017). A Pre-Authentication Approach to Proxy Re-Encryption in Big Data Context. IEEE Trans. Big Data, 1–11.

Wu, T-Y., Guo, X., Yang, L., Meng, Q., & Chen, C-M. (2021). A Lightweight Authenticated Key Agreement Protocol Using Fog Nodes in Social Internet of Vehicles. Mobile Information Systems, Article ID 3277113, 14 pages. https://doi.org/10.1155/2021/3277113

Zahednejad B., Teng H., Kosari S., & Xiaojun R. (2023). A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability. International Journal of Intelligent Systems, 48–54. https://doi.org/10.1155/2023/9731239
Gupta, M. K., & Dwivedi, R. K. (2023). Beaf:BD – A Blockchain Enabled Authentication Framework for Big Data. ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal, 12(1), e19163. https://doi.org/10.14201/adcaij.19163

Downloads

Download data is not yet available.
+