Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for security reinforcement based on Hadhoop module

A security and component technology, applied in the field of big data, to achieve the effect of improving security, improving security performance, and guaranteeing restrictions

Active Publication Date: 2019-01-18
STATE GRID FUJIAN ELECTRIC POWER CO LTD +1
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For most companies, this simple user authentication method does not meet their requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In the following, the technical solution of the present invention will be described in detail.

[0020] The present invention provides a method based on hadoop component security reinforcement, comprising the following steps:

[0021] Step S1, the Kerberos server is used as an external repository for the user, and Kerberos is used as the verification protocol to verify the password of the user;

[0022] Step S2, for the user license ticket successfully passed through Kerberos verification in step S1, classify the user, and verify that the service in Hadoop can be used when the ticket is valid;

[0023] Step S3, the user management module is set, the upload data in Kerberos is divided into a plurality of data blocks according to the sensitivity of the data, and the block access authority is implemented to users of different levels in the step S2;

[0024] Step S4, performing data encryption and hiding on part of the data blocks in step S3 to ensure safe access to sensit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for the security reinforcement based on a Hadhoop module. The method comprises the steps: taking a Kerberos server as a user external memory pool, and taking Kerberosas a verification protocol for the password verification of a user; permitting a user who successfully passes through the Kerberos verification to have a bill, and grading the user, using the servicein Hadhoop when the bill is verified to be effective, and dividing the uploaded data in the Kerberos into a plurality of data blocks according to the sensitivity of the data; executing the partitioned access authority for the users at different levels at step 2, performing the data encryption and hiding of the data blocks so as to guarantee the safety access of the authorized user to the sensitive data, and performing the data incoming and outgoing control for an unauthorized network; and isolating a big data system from other enterprise information systems through the network topology. According to the invention, the Hadhoop introduces the support for the Kerberos, and the method improves the safety of user access, guarantees the restriction on the access to various types of data throughthe encrypted dividing of the levels of data and users, and improves the safety performances.

Description

technical field [0001] The invention belongs to the field of big data, and in particular relates to a security reinforcement method based on hadoop components. Background technique [0002] Hadoop consists of multiple components, so the security of Hadoop cluster means ensuring the security of each component, which makes Hadoop cluster security a complex task. [0003] Hadoop's initial design is to run in a trusted environment, which assumes that all cluster users are trusted, they can correctly identify themselves and will not try to obtain more permissions. This enables a simple security model, which is the default authentication system in Hadoop. In simple security mode, Hadoop trusts the user identity provided by the operating system. Unlike most relational databases, Hadoop does not have any centralized user and privilege storage mechanism. There is no concept of authenticating a user via username and password in Hadoop. Hadoop accepts and trusts the user name provi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06H04L29/06H04L29/08
CPCH04L9/0643H04L63/0428H04L63/0807H04L63/083H04L63/105H04L67/10H04L67/1097
Inventor 何金栋唐志军吴丹罗富财赵志超谢新志吴丽进林承华
Owner STATE GRID FUJIAN ELECTRIC POWER CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products