Kerberos is a solid validation strategy where verification depends on cryptography and this technique is suitable for unstable situations as it protects passwords efficiently (Neuman & Ts, 1994). According to Bethencourt et al. (2007), the user was only allowed to access data in a distribution if he/she possessed some credentials. This strategy could be applied by providing a trusted server keeping in mind the end goal to store the information. This was the one conceivable strategy. Most cell phones are served either through wired or through remote medium by hadoop cloud computing. Furthermore, most of slave nodes are controlled and connected by a master node which is located in the architecture defining Hadoop system where services such as PaaS, SaaS and IaaS are provided (Chang & Tsai, 2008).In this paper, cloud framework's efficiency and effectiveness towards access security is effectively checked in 2. 2 seconds using finger print identification and face recognition strategies in h...
Hadoop Security Issues & Remedies
This might be interesting
Can’t find the right project?
Our experts can help you get one from scratch.
Sign Up Studybay