About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
sis 25(1):

Research Article

JWTAMH: JSON Web Tokens Based Authentication Mechanism for HADOOP.

Download66 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/eetsis.5429,
        author={Manish Gupta and Anish Gupta and Britto Raj S. and Annu Sharma},
        title={JWTAMH: JSON Web Tokens Based Authentication Mechanism for HADOOP.},
        journal={EAI Endorsed Transactions on Scalable Information Systems},
        volume={12},
        number={1},
        publisher={EAI},
        journal_a={SIS},
        year={2025},
        month={4},
        keywords={Hadoop, Token-based Authentication, Kerberos, JWT, Security, Access Control},
        doi={10.4108/eetsis.5429}
    }
    
  • Manish Gupta
    Anish Gupta
    Britto Raj S.
    Annu Sharma
    Year: 2025
    JWTAMH: JSON Web Tokens Based Authentication Mechanism for HADOOP.
    SIS
    EAI
    DOI: 10.4108/eetsis.5429
Manish Gupta1,*, Anish Gupta2, Britto Raj S.3, Annu Sharma4
  • 1: Madan Mohan Malaviya University of Technology
  • 2: Chandigarh Engineering College
  • 3: Rajarajeswari College of Engineering
  • 4: RRASE College of Engineering
*Contact email: manishresearch2@gmail.com

Abstract

The Hadoop platform has become a widely adopted distributed computing platform for handling large-scale data processing tasks. However, the security of the Hadoop platform has become a major concern due to the increased risk of cyber-attacks. To address this concern, various security mechanisms have been proposed for the Hadoop platform, including authentication and access control. This research paper proposes a token-based authentication mechanism to enhance the security of the Hadoop platform. The proposed mechanism utilizes a combination of Kerberos and JSON Web Tokens (JWT) for secure communication between Hadoop components. The experimental results demonstrate the effectiveness of the Single point of failure, Guessing attack, Replay Attack, Brute force attack, and Dictionary attack. The proposed model has better performance in terms of average processing time and accuracy of authentication than other models.

Keywords
Hadoop, Token-based Authentication, Kerberos, JWT, Security, Access Control
Received
2025-04-11
Accepted
2025-04-11
Published
2025-04-11
Publisher
EAI
http://dx.doi.org/10.4108/eetsis.5429

Copyright © 2024 Gupta et al., licensed to EAI. This is an open access article distributed under the terms of the CC BY-NCSA 4.0, which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL