Public key algorithm and SSL (security socket layer) protocol based method of optimizing security of multi-cluster Hadoop system

A system security, public key algorithm technology, applied in the field of multi-cluster Hadoop system security optimization, can solve problems such as tediousness and low efficiency

Active Publication Date: 2015-06-24
STATE GRID CORP OF CHINA +2
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This is tedious and inefficient for users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Public key algorithm and SSL (security socket layer) protocol based method of optimizing security of multi-cluster Hadoop system
  • Public key algorithm and SSL (security socket layer) protocol based method of optimizing security of multi-cluster Hadoop system
  • Public key algorithm and SSL (security socket layer) protocol based method of optimizing security of multi-cluster Hadoop system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0142] The security optimization method proposed by the present invention is implemented as a single plug-in in a multi-cluster Hadoop system in a single-sign-on manner, and can be started by a SHELL device of the multi-cluster Hadoop system. The developed prototype system can be flexibly integrated into or offloaded from the multi-cluster Hadoop system according to the needs of users. The prototype system of the safety optimization method proposed by the present invention includes six main modules: a general module, a security module, a user management module, a CA node module, a master node module and a slave node module. Figure 5 The interaction between the various modules is shown. Each module provides specific functionality, among them:

[0143] (1) The general module is the function library of the security optimization method, which provides the required basic interfaces for other modules, including event listeners, event processors and random message generators, etc.;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a public key algorithm and SSL (security socket layer) protocol based method of optimizing security of a multi-cluster Hadoop system. The method includes the steps of authenticating identity of a user when the user logs in to a master node; allowing the master node to submit a request to a CA (certificate authority) server to acquire a proxy certificate; allowing the master node to create a slave node list and determine identity of the master node; allowing bidirectional authentication between the master node and slave nodes; allowing the multi-cluster Hadoop system to execute a task submitted by the user; stopping the user from submitting tasks. The method has the advantages that user authentication and network attack protection are effectively achieved for the Hadoop system running across multiple cluster environments, the defect of the original security mechanism of the single-cluster Hadoop system running in the multiple cluster environments is made up, and the network attack protection with the original security mechanism of the single-cluster Hadoop system forms complete security protection for the multi-cluster Hadoop system.

Description

technical field [0001] The invention relates to an optimization method, in particular to a multi-cluster Hadoop system security optimization method based on a public key algorithm and an SSL protocol. Background technique [0002] Hadoop system is an effective tool for big data processing. The early Hadoop system mainly ran in a single cluster environment, and later versions began to support running in multiple cluster environments. A multi-cluster Hadoop system is an extended version that runs across multiple cluster environments, such as figure 1 shown. JobTracker is the main server of the MapReduce framework, responsible for managing the control flow of the MapReduce framework to execute jobs, monitoring the health status of all executing tasks, detecting and rescheduling failed tasks until all tasks of a job are completed. The JobTracker receives new jobs from its user side, divides the jobs into smaller tasks and sends them to the TaskTracker. TaskTracker is the pow...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/30
CPCH04L9/321H04L63/0869
Inventor 蒋诚智余勇石聪聪范杰李尼格叶云郭骞俞庚申冯谷高鹏曹宛恬
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products