SlideShare a Scribd company logo
1 of 4
Download to read offline
2011 Fifth International Conference on Genetic and Evolutionary Computing



             Access Security on Cloud Computing Implemented in Hadoop System

        Bao Rong Chang                    Hsiu Fen Tsai          Zih-Yao Lin                 Chi-Ming Chen
  Dept. of Computer Science and    Dept. of Marketing   Dept. of Computer Science and Dept. of Computer Science and
    Information Engineering           Management          Information Engineering       Information Engineering
     National University of        Sue-Te University,      National University of        National University of
        Kaohsiung, Taiwan                Taiwan               Kaohsiung, Taiwan             Kaohsiung, Taiwan
      brchang@nuk.edu.tw        soenfen@mail.stu.edu.tw   qazwsxee3118@xuite.net        gcsul0725@hotmail.com

 Abstract—In this paper, we introduce a Hadoop cloud                      work into small pieces because it is of the incompetence in a
 computing together with access security by using the                     single computer, and then these pieces are carried out by a
 fingerprint identification and face recognition. Hadoop cloud            number of computers. After that, compiling their findings to
 computing is connected to serve plenty of mobile devices or              complete the work is done. In addition, we have devoted to
 thin clients by the wired or wireless network. In fact a                 connect a variety of different platforms, different
 controller (master) may be linked to several nodes (slavers) to          architectures, different levels of the computer through the
 form a Hadoop cloud computing, where the cloud computing                 network such that all of computers are cooperated with each
 initiates the services like SaaS, PaaS, and/or IaaS. This study
                                                                          other or network makes the computer to do services more far
 employed a way of low-capacity Linux embedded platform
                                                                          and wide in the cyber space, but the difference is that "cloud
 linked to Hadoop via Ethernet, WiFi or 3G. At client side,
 JamVM virtual machine is utilized to form the J2ME
                                                                          computing" has emphasized, even existing the limited
 environment, and GNU Classpath is viewed as Java Class                   resources in a local context, to make use of the Internet to
 Libraries. In order to verify the cloud system effectiveness and         access remote computing resources.
 efficiency in access security, the rapid identification on                   Cloud computing is divided into two categories, namely
 fingerprint and face in Hadoop has been done successfully                "cloud services" and "cloud technology". "Cloud services" is
 within 2.2 seconds to exactly cross-examine the subject identity.        achieved through the network connection to the remote
                                                                          service. Such services provide users installation and use a
 Keywords- Hadoop cloud computing; Access security;                       variety of operating systems, for example Amazon Web
 Fingerprint identification; Face recognition; Linux Embedded             Services (CE2 and S3) services. This type of cloud
 Platform; JamVM Virtual Machine.                                         computing can be viewed as the concepts: "Infrastructure as
                                                                          a Service" (IaaS) "Storage as a service" (StaaS), respectively.
                        I.     INTRODUCTION                               Both of them are derived from the concept of "Software as a
                                                                          Service" (SaaS) that is the biggest area for cloud services in
     Cloud computing is an emerging and increasingly                      demand, while "Platform as a Service" (PaaS) concept is an
 popular computing paradigm, which provides the users                     alternative for cloud computing service. Using these services,
 massive computing, storage, and software resources on                    users can even simply to rely on a cell phone or thin client to
 demand. How to program the efficient distributed parallel                do many of things that can only be done on a personal
 applications is complex and difficult. How to dispatch a                 computer in the past, which means that cloud computing is
 large scale task executed in cloud computing environments                universal. The "cloud technology" is aimed at the use of
 is challenging as well. This is because applications running             virtualization and automation technologies to create and
 in cloud computing environment need to conquer some                      spread computer in a variety of computing resources. This
 problems such as the network bandwidth, the faults                       type can be considered as traditional data centers (Data
 tolerance, and the heterogeneity. Different solutions to                 Center) extension; it does not require external resources
 programming and tasking in cloud computing environments                  provided by third parties and can be utilized throughout the
 have been proposed by several independent software                       company's internal systems, indicating that cloud computing
 vendors (ISV), each has its own strengths and weakness.                  also has the specific expertise. Currently on the market the
 Cloud computing service providers also have their own                    most popular cloud computing services are divided into
 programming model and APIs to be used by users. Here we                  public clouds, private clouds, community/open clouds, and
 will briefly introduce the different cloud computing                     hybrid clouds, where Goggle App Eng [1], Amazon Web
 perspectives and show our approach in this study. Cloud                  Services [2], Microsoft Azure [3] - the public cloud; IBM
 computing currently under development consists of three                  Blue Cloud [4] - the private cloud; Open Nebula [5],
 areas, massive computing, connectivity, and smart terminal.              Eucalyptus [6], Yahoo Hadoop [7] and the NCDM
 The aim of cloud computing is towards low-cost (saving you               Sector/Sphere [8] - open cloud; IBM Blue Cloud [4] - hybrid
 money), green energy (energy efficiency), and the                        cloud.
 ubiquitous (at any time, any place, any device to access any
 of the services).                                                                    II.   MOTIVATION AND BACKGROUND
     Nowadays cloud computing become a popular term with
 high-tech concept. In fact, these technologies are not entirely              From the green energy point of view, cloud computing
 new, probably inherited from the nature of "distributed                  means the following four characteristics: large amounts of
 computing" and "grid computing". That is, we divide a large              data, low cost, efficiency and reliability. The main purpose


978-0-7695-4449-6/11 $26.00 © 2011 IEEE                              77
DOI 10.1109/ICGEC.2011.27
of this study is to build a Hadoop cloud computing [9]. In              environment for Python or Java, an Eclipse IDE [13] is
order to verify the cloud system effectiveness and efficiency           applied to develop the application program (AP) at local site
in access security, the fingerprint identification and face             as shown in Fig. 6. It is noted that please remember to install
recognition by using rapid identification have achieved in              Java JDK [14] before you setup an Eclipse IDE in local site.
this study.                                                             If AP has been done and is waiting for dispatch on Hadoop
    In many applications, embedded devices often require                cloud computing server, we deploy this AP via the path of
huge computing power and storage space, just the opposite               LAN or WiFi. Finally, as shown in Fig. 7, we take a look at
of the hardware of embedded devices. Thus the only way to               HBase in Hadoop server to make sure that the cloud
achieve this goal is that it must be structured in the "cloud           computing is ready for the task.
computing" and operated in "cloud services". The idea is
how to use the limited resources of embedded devices to                 B. Establishing Thin Client
achieve the "cloud computing", in addition to using the                     In terms of thin client, JamVM is treated as the
wired Ethernet connection, and further use of wireless                  framework of programming development; however the
mobile devices IEEE802.3b / g or 3G to connect, as shown                virtual machine JamVM has no way to perform the drawing
in Fig. 1.                                                              even through their core directly, and thus it must call other
    First, we use the standard J2ME [10] environment for                graphics library to achieve the drawing performance. Here
embedded devices, where JamVM [11] virtual machine is                   some options we have are available, for example,
employed to achieve J2ME environment and GNU                            GTK+DirectFB, GTK+X11, QT/Embedded, and so on, as
Classpath [12] is used as the Java Class Libraries. In order to         shown in Figs. 8, 9, and 10 below. The problem we
reduce the amount of data transmission, the acquisition of              encountered is that GTK needs a few packages to work
information processed is done slightly at the front-end                 together required many steps for installation, compiling
embedded devices and then processed data through the                    different packages to build system is also difficult, and it is
network is uploaded to the back-end, private small-cloud                often time-consuming for the integration of a few packages
computing. After the processing at the back-end is                      no guarantee to complete the work. Therefore this study has
completed, the results sent back to the front-end embedded              chosen QT/Embedded framework instead of GTK series, in
devices. As shown in Fig.2, an open source Hadoop                       such a way that achieves GUI interface functions. In Fig. 11,
packages is utilized to establish the private cloud computing           no matter SWT or AWT in JamVM they apply Java Native
easily; in such a way that we can focus on installing the               Interface (JNI) to communicate C- written graphics library.
back-end cluster controllers and cloud controller in order to           Afterward QT/Embedded gets through the kernel driver to
build a private small-cloud computing.                                  achieve graphic function as shown in Fig. 12. According to
    An embedded platform in conjunction with a cloud                    the pictures shown in Fig. 11 and Fig. 12, we can string
computing environment is applied to testing the capabilities            them together to be the structure of a node device as shown
of fingerprint identification and facial recognition as the             in Fig. 10. This part will adopt a low-cost, low-power
access security system. The basic structure of Hadoop cloud             embedded platform to realize a thin client.
computing is developed and has been deployed as well. We                C. Installing Access Security System
will then test the performance of the embedded platform
operating in cloud computing to check whether or not it can                 When establishing a Hadoop cloud computing is done,
achieve immediate and effective response to required                    we will test the cloud employing an embedded platform in a
functions. Meanwhile, we continue to monitor the online                 cloud environment to perform fingerprint identification [15]
operation and evaluate system performance in statistics, such           and face recognition [16] to fulfill the access security system
as the number of files, file size, the total process of MB, the         [17]. Meanwhile the development of basic structure and
number of tasks on each node, and throughput. In a cluster              deployment for Hadoop cloud computing are valid and even
implementation of cloud computing, the statistical                      more we test the service performance for an embedded
assessment by the size of each node is listed. According to             platform collaborated with cloud computing, checking an
the analysis of the results, we will adjust the system                  immediate and effective response to client. The access
functions if changes are required.                                      security system is shown in Fig. 13.

             III.   ACCESS SECURITY IN HADOOP                                 IV.   EXPERIMENTAL RESULTS AND DISCUSSIONS
                                                                            In order to verify the cloud system effectiveness and
A. Deploying Hadoop Cloud Computing                                     efficiency in access security, the experiment on fingerprint
    Once a Hadoop cloud computing server has been                       identification and face recognition by using rapid
established in server site, we have to test the functionality of        identification in Hadoop cloud computing has been done
cloud computing in Hadoop system. As shown in Fig. 3, we                successfully within 2.2 seconds in average access
first test the Hadoop Administration Interface at the website           identification to exactly cross-examine the subject identity.
http://hadoop1:50030. Next, Task Tracker Status at                      As a result the proposed Hadoop cloud computing has been
http://hadoop1:50060 will be examined as shown in Fig. 4.               performed very well when it has deployed in local area.
After that we move on to check Hadoop Distributed File                  Steps are as follows: (a) the operation for face recognition is
System (HDFS) Status, as shown in Fig. 5, at                            quickly to open the video camera for the first, and then press
http://hadoop1:50070. In order to setup a programming                   the capture button, the program will execute binarization



                                                                   78
automatically as shown in Fig. 14; (b) the rapid fingerprint
identification is first to turn on device, then press the deal
button for feature extraction that reduces the amount of
information as shown in Fig. 15; (c) at first the terminal
device test the connection if Internet is working properly,
and then we press the identify button and information sent to
the cloud, and at last the cloud will return the identification
results as shown in Fig. 16.
                          V.     CONCLUSIONS
    In this study Hadoop cloud computing together with
access security by applying the rapid identification on
fingerprint and face has been realized so that cloud
computing initiates the services like SaaS, PaaS, and/or IaaS.
The connection between client and server has employed a
way of low-capacity Linux embedded platform linked to
Hadoop via Ethernet, WiFi or 3G. At client side, JamVM
virtual machine is utilized to form the J2ME environment,
and GNU Classpath is viewed as Java Class Libraries. In                         Figure 1. Cloud computing server connected Figure 2. Hadoop server linked to mobile devices over
                                                                                with mobile device, PC, and notebook.      WiFi.
order to verify the cloud system effectiveness and efficiency
in access security, the rapid identification on fingerprint and
face in Hadoop has been done successfully within 2.2
seconds to exactly cross-examine the subject identity.
                         ACKNOWLEDGMENT
   This work is fully supported by the National Science
Council, Taiwan, Republic of China, under grant number:
NSC99-2218--E-390-002.
                               REFERENCES
[1]    Google App Engine, 2010. http://groups.google.com/group/google-
       appengine
[2]    Amazon Web Services (AWS), 2010. http://aws.amazon.com/                     Figure 3. Testing Hadoop Administration IF at http://hadoop1:50030.
[3]    Windows Azure- A Microsoft Solution to Cloud, 2010.
       http://tech.cipper.com/index.php/archives/332
[4]    IBM Cloud Compputing, 2010. http://www.ibm.com/ibm/cloud/
[5]    OpenNebula, 2010. http://www.opennebula.org/
[6]    Eucalyptus, 2010. http://open.eucalyptus.com/
[7]    Welcome to Apache Hadoop, 2010. http://hadoop.apache.org/
[8]    Sector/Sphere, National Center for Data Mining, 2009.
       http://sector.sourceforge.net/
[9]    Welcome to Apache Hadoop, 2010. http://hadoop.apache.org/
[10]   Java 2 Platform, Micro Edition (J2ME), 2010.
       http://www.java.com/zh_TW/download/faq/whatis_j2me.xml
[11]   JamVM -- A compact Java Virtual Machine, 2010.
       http://jamvm.sourceforge.net/
[12]   GNU Classpath , GNU Classpath, Essential Libraries for Java, in                 Figure 4. Testing Task Tracker Status at http://hadoop1:50060.
       2010. http://www.gnu.org/software/classpath/
[13]   Eclipse Summit, 2011. http://www.eclipse.org/dowload/
[14]   Java JDK, 2011.
       http://www.oracle.com/technetwork/java/javase/downloads/jdk6-jsp-
       136632.html
[15]   VeriFinger SDK, Neuro Technology, 2010.
       http://www.neurotechnology.com/verifinger.html
[16]   VeriLook SDK, Neuro Technology, 2010.
       http://www.neurotechnology.com/verilook.html
[17]   opencv (open source), 2010.
       http://www.opencv.org.cn/index.php?title=%E9%A6%96%E9%A1
       %B5&variant=zh-tw


                                                                                           Figure 5. Testing HDFS Status at http://hadoop1:50070.




                                                                           79
Figure 6. A Snapshot of Eclipse IDE.



                                                                                                                                                                (b)
                                                                                                                                                  Figure 13. System architecture.




Figure 7. Key in commend “hbase shell” under Linux Environment.

  Java Apps           SWT               AWT      Java Apps          SWT            AWT   Java Apps      SWT        AWT

                     CDC+PP                                         CDC+PP

                      GTK                                            GTK                             QT/Embedded
              Clib    Pango     Atk                          Clib    Pango   Atk

                     DirectFB                                        X11

                                                                OS(kernel)                            OS(kernel)
                 OS(kernel)




Figure 8. Terminal node with Figure 9. Terminal node Figure 10. Terminal node                                                 Figure 14. Binarization processing automatically running in program.
GTK + DirectFB.              with GTK + X11.         with QT / Embedded.




Figure 11. Communication between SWT/AWT and QT/Embedded.




                                                                                                                                Figure 15. Processing fingerprint features to reduce the amount of
                                                                                                                                                             information.



Figure 12. QT/embedded communicates with the Linux Framebuffer.




                                                             (a)                                                              Figure 16. Information sent to the cloud and cloud returns the results of
                                                                                                                                                       recognition to the consol.




                                                                                                                         80

More Related Content

What's hot

ClassCloud: switch your PC Classroom into Cloud Testbed
ClassCloud: switch your PC Classroom into Cloud TestbedClassCloud: switch your PC Classroom into Cloud Testbed
ClassCloud: switch your PC Classroom into Cloud Testbed
Jazz Yao-Tsung Wang
 
Business implementation of Cloud Computing
Business implementation of Cloud ComputingBusiness implementation of Cloud Computing
Business implementation of Cloud Computing
Quaid Sodawala
 
Synopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaSynopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant upta
Prashant Gupta
 

What's hot (18)

Cloud computing applicatio
Cloud  computing  applicatioCloud  computing  applicatio
Cloud computing applicatio
 
Cloud Computing: On the Air or Down to Earth - Beneficios para la Empresa
Cloud Computing: On the Air or Down to Earth - Beneficios para la EmpresaCloud Computing: On the Air or Down to Earth - Beneficios para la Empresa
Cloud Computing: On the Air or Down to Earth - Beneficios para la Empresa
 
Cloud Technology_Concepts
Cloud Technology_ConceptsCloud Technology_Concepts
Cloud Technology_Concepts
 
Cloud Computing By Pankaj Sharma
Cloud Computing By Pankaj SharmaCloud Computing By Pankaj Sharma
Cloud Computing By Pankaj Sharma
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
 
ClassCloud: switch your PC Classroom into Cloud Testbed
ClassCloud: switch your PC Classroom into Cloud TestbedClassCloud: switch your PC Classroom into Cloud Testbed
ClassCloud: switch your PC Classroom into Cloud Testbed
 
cloud computing based its solutions term paper
cloud computing based its solutions term papercloud computing based its solutions term paper
cloud computing based its solutions term paper
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computing
 
Cloud management
Cloud managementCloud management
Cloud management
 
Introduction of cloud By Pawan Thakur
Introduction of cloud By Pawan ThakurIntroduction of cloud By Pawan Thakur
Introduction of cloud By Pawan Thakur
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
cloud computing
cloud computingcloud computing
cloud computing
 
Business implementation of Cloud Computing
Business implementation of Cloud ComputingBusiness implementation of Cloud Computing
Business implementation of Cloud Computing
 
Synopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant uptaSynopsis on cloud computing by Prashant upta
Synopsis on cloud computing by Prashant upta
 
Cloud computing course and tutorials
Cloud computing course and tutorialsCloud computing course and tutorials
Cloud computing course and tutorials
 
Cc unit 3 updated version
Cc unit 3 updated versionCc unit 3 updated version
Cc unit 3 updated version
 
Cloud Computing and It's Types in Mobile Network
Cloud Computing and It's Types in Mobile NetworkCloud Computing and It's Types in Mobile Network
Cloud Computing and It's Types in Mobile Network
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 

Similar to Access security on cloud computing implemented in hadoop system

Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
Vivek Maurya
 
Presentations on cloud computing
Presentations on cloud computing Presentations on cloud computing
Presentations on cloud computing
Sajol Mondal
 
cloudcomputingppt-170825044254.pdf
cloudcomputingppt-170825044254.pdfcloudcomputingppt-170825044254.pdf
cloudcomputingppt-170825044254.pdf
SANDY4772
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
Abhijit Kundu
 

Similar to Access security on cloud computing implemented in hadoop system (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Computing Essay
Cloud Computing EssayCloud Computing Essay
Cloud Computing Essay
 
cloud computing by satwik
cloud computing by satwikcloud computing by satwik
cloud computing by satwik
 
Cloud computing 1
Cloud computing 1Cloud computing 1
Cloud computing 1
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Efficient and reliable hybrid cloud architecture for big database
Efficient and reliable hybrid cloud architecture for big databaseEfficient and reliable hybrid cloud architecture for big database
Efficient and reliable hybrid cloud architecture for big database
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
Presentations on cloud computing
Presentations on cloud computing Presentations on cloud computing
Presentations on cloud computing
 
cloudcomputingppt-170825044254.pdf
cloudcomputingppt-170825044254.pdfcloudcomputingppt-170825044254.pdf
cloudcomputingppt-170825044254.pdf
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud Computing ppt
Cloud Computing pptCloud Computing ppt
Cloud Computing ppt
 
akashgupta(2).pptx
akashgupta(2).pptxakashgupta(2).pptx
akashgupta(2).pptx
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
 

More from João Gabriel Lima

More from João Gabriel Lima (20)

Cooking with data
Cooking with dataCooking with data
Cooking with data
 
Deep marketing - Indoor Customer Segmentation
Deep marketing - Indoor Customer SegmentationDeep marketing - Indoor Customer Segmentation
Deep marketing - Indoor Customer Segmentation
 
Aplicações de Alto Desempenho com JHipster Full Stack
Aplicações de Alto Desempenho com JHipster Full StackAplicações de Alto Desempenho com JHipster Full Stack
Aplicações de Alto Desempenho com JHipster Full Stack
 
Realidade aumentada com react native e ARKit
Realidade aumentada com react native e ARKitRealidade aumentada com react native e ARKit
Realidade aumentada com react native e ARKit
 
JS - IA
JS - IAJS - IA
JS - IA
 
Big data e Inteligência Artificial
Big data e Inteligência ArtificialBig data e Inteligência Artificial
Big data e Inteligência Artificial
 
Mineração de Dados no Weka - Regressão Linear
Mineração de Dados no Weka -  Regressão LinearMineração de Dados no Weka -  Regressão Linear
Mineração de Dados no Weka - Regressão Linear
 
Segurança na Internet - Estudos de caso
Segurança na Internet - Estudos de casoSegurança na Internet - Estudos de caso
Segurança na Internet - Estudos de caso
 
Segurança na Internet - Google Hacking
Segurança na Internet - Google  HackingSegurança na Internet - Google  Hacking
Segurança na Internet - Google Hacking
 
Segurança na Internet - Conceitos fundamentais
Segurança na Internet - Conceitos fundamentaisSegurança na Internet - Conceitos fundamentais
Segurança na Internet - Conceitos fundamentais
 
Web Machine Learning
Web Machine LearningWeb Machine Learning
Web Machine Learning
 
Mineração de Dados com RapidMiner - Um Estudo de caso sobre o Churn Rate em...
Mineração de Dados com RapidMiner - Um Estudo de caso sobre o Churn Rate em...Mineração de Dados com RapidMiner - Um Estudo de caso sobre o Churn Rate em...
Mineração de Dados com RapidMiner - Um Estudo de caso sobre o Churn Rate em...
 
Mineração de dados com RapidMiner + WEKA - Clusterização
Mineração de dados com RapidMiner + WEKA - ClusterizaçãoMineração de dados com RapidMiner + WEKA - Clusterização
Mineração de dados com RapidMiner + WEKA - Clusterização
 
Mineração de dados na prática com RapidMiner e Weka
Mineração de dados na prática com RapidMiner e WekaMineração de dados na prática com RapidMiner e Weka
Mineração de dados na prática com RapidMiner e Weka
 
Visualizacao de dados - Come to the dark side
Visualizacao de dados - Come to the dark sideVisualizacao de dados - Come to the dark side
Visualizacao de dados - Come to the dark side
 
REST x SOAP : Qual abordagem escolher?
REST x SOAP : Qual abordagem escolher?REST x SOAP : Qual abordagem escolher?
REST x SOAP : Qual abordagem escolher?
 
Game of data - Predição e Análise da série Game Of Thrones a partir do uso de...
Game of data - Predição e Análise da série Game Of Thrones a partir do uso de...Game of data - Predição e Análise da série Game Of Thrones a partir do uso de...
Game of data - Predição e Análise da série Game Of Thrones a partir do uso de...
 
E-trânsito cidadão - IPVA em suas mãos
E-trânsito cidadão - IPVA em suas mãosE-trânsito cidadão - IPVA em suas mãos
E-trânsito cidadão - IPVA em suas mãos
 
[Estácio - IESAM] Automatizando Tarefas com Gulp.js
[Estácio - IESAM] Automatizando Tarefas com Gulp.js[Estácio - IESAM] Automatizando Tarefas com Gulp.js
[Estácio - IESAM] Automatizando Tarefas com Gulp.js
 
Hackeando a Internet das Coisas com Javascript
Hackeando a Internet das Coisas com JavascriptHackeando a Internet das Coisas com Javascript
Hackeando a Internet das Coisas com Javascript
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Access security on cloud computing implemented in hadoop system

  • 1. 2011 Fifth International Conference on Genetic and Evolutionary Computing Access Security on Cloud Computing Implemented in Hadoop System Bao Rong Chang Hsiu Fen Tsai Zih-Yao Lin Chi-Ming Chen Dept. of Computer Science and Dept. of Marketing Dept. of Computer Science and Dept. of Computer Science and Information Engineering Management Information Engineering Information Engineering National University of Sue-Te University, National University of National University of Kaohsiung, Taiwan Taiwan Kaohsiung, Taiwan Kaohsiung, Taiwan brchang@nuk.edu.tw soenfen@mail.stu.edu.tw qazwsxee3118@xuite.net gcsul0725@hotmail.com Abstract—In this paper, we introduce a Hadoop cloud work into small pieces because it is of the incompetence in a computing together with access security by using the single computer, and then these pieces are carried out by a fingerprint identification and face recognition. Hadoop cloud number of computers. After that, compiling their findings to computing is connected to serve plenty of mobile devices or complete the work is done. In addition, we have devoted to thin clients by the wired or wireless network. In fact a connect a variety of different platforms, different controller (master) may be linked to several nodes (slavers) to architectures, different levels of the computer through the form a Hadoop cloud computing, where the cloud computing network such that all of computers are cooperated with each initiates the services like SaaS, PaaS, and/or IaaS. This study other or network makes the computer to do services more far employed a way of low-capacity Linux embedded platform and wide in the cyber space, but the difference is that "cloud linked to Hadoop via Ethernet, WiFi or 3G. At client side, JamVM virtual machine is utilized to form the J2ME computing" has emphasized, even existing the limited environment, and GNU Classpath is viewed as Java Class resources in a local context, to make use of the Internet to Libraries. In order to verify the cloud system effectiveness and access remote computing resources. efficiency in access security, the rapid identification on Cloud computing is divided into two categories, namely fingerprint and face in Hadoop has been done successfully "cloud services" and "cloud technology". "Cloud services" is within 2.2 seconds to exactly cross-examine the subject identity. achieved through the network connection to the remote service. Such services provide users installation and use a Keywords- Hadoop cloud computing; Access security; variety of operating systems, for example Amazon Web Fingerprint identification; Face recognition; Linux Embedded Services (CE2 and S3) services. This type of cloud Platform; JamVM Virtual Machine. computing can be viewed as the concepts: "Infrastructure as a Service" (IaaS) "Storage as a service" (StaaS), respectively. I. INTRODUCTION Both of them are derived from the concept of "Software as a Service" (SaaS) that is the biggest area for cloud services in Cloud computing is an emerging and increasingly demand, while "Platform as a Service" (PaaS) concept is an popular computing paradigm, which provides the users alternative for cloud computing service. Using these services, massive computing, storage, and software resources on users can even simply to rely on a cell phone or thin client to demand. How to program the efficient distributed parallel do many of things that can only be done on a personal applications is complex and difficult. How to dispatch a computer in the past, which means that cloud computing is large scale task executed in cloud computing environments universal. The "cloud technology" is aimed at the use of is challenging as well. This is because applications running virtualization and automation technologies to create and in cloud computing environment need to conquer some spread computer in a variety of computing resources. This problems such as the network bandwidth, the faults type can be considered as traditional data centers (Data tolerance, and the heterogeneity. Different solutions to Center) extension; it does not require external resources programming and tasking in cloud computing environments provided by third parties and can be utilized throughout the have been proposed by several independent software company's internal systems, indicating that cloud computing vendors (ISV), each has its own strengths and weakness. also has the specific expertise. Currently on the market the Cloud computing service providers also have their own most popular cloud computing services are divided into programming model and APIs to be used by users. Here we public clouds, private clouds, community/open clouds, and will briefly introduce the different cloud computing hybrid clouds, where Goggle App Eng [1], Amazon Web perspectives and show our approach in this study. Cloud Services [2], Microsoft Azure [3] - the public cloud; IBM computing currently under development consists of three Blue Cloud [4] - the private cloud; Open Nebula [5], areas, massive computing, connectivity, and smart terminal. Eucalyptus [6], Yahoo Hadoop [7] and the NCDM The aim of cloud computing is towards low-cost (saving you Sector/Sphere [8] - open cloud; IBM Blue Cloud [4] - hybrid money), green energy (energy efficiency), and the cloud. ubiquitous (at any time, any place, any device to access any of the services). II. MOTIVATION AND BACKGROUND Nowadays cloud computing become a popular term with high-tech concept. In fact, these technologies are not entirely From the green energy point of view, cloud computing new, probably inherited from the nature of "distributed means the following four characteristics: large amounts of computing" and "grid computing". That is, we divide a large data, low cost, efficiency and reliability. The main purpose 978-0-7695-4449-6/11 $26.00 © 2011 IEEE 77 DOI 10.1109/ICGEC.2011.27
  • 2. of this study is to build a Hadoop cloud computing [9]. In environment for Python or Java, an Eclipse IDE [13] is order to verify the cloud system effectiveness and efficiency applied to develop the application program (AP) at local site in access security, the fingerprint identification and face as shown in Fig. 6. It is noted that please remember to install recognition by using rapid identification have achieved in Java JDK [14] before you setup an Eclipse IDE in local site. this study. If AP has been done and is waiting for dispatch on Hadoop In many applications, embedded devices often require cloud computing server, we deploy this AP via the path of huge computing power and storage space, just the opposite LAN or WiFi. Finally, as shown in Fig. 7, we take a look at of the hardware of embedded devices. Thus the only way to HBase in Hadoop server to make sure that the cloud achieve this goal is that it must be structured in the "cloud computing is ready for the task. computing" and operated in "cloud services". The idea is how to use the limited resources of embedded devices to B. Establishing Thin Client achieve the "cloud computing", in addition to using the In terms of thin client, JamVM is treated as the wired Ethernet connection, and further use of wireless framework of programming development; however the mobile devices IEEE802.3b / g or 3G to connect, as shown virtual machine JamVM has no way to perform the drawing in Fig. 1. even through their core directly, and thus it must call other First, we use the standard J2ME [10] environment for graphics library to achieve the drawing performance. Here embedded devices, where JamVM [11] virtual machine is some options we have are available, for example, employed to achieve J2ME environment and GNU GTK+DirectFB, GTK+X11, QT/Embedded, and so on, as Classpath [12] is used as the Java Class Libraries. In order to shown in Figs. 8, 9, and 10 below. The problem we reduce the amount of data transmission, the acquisition of encountered is that GTK needs a few packages to work information processed is done slightly at the front-end together required many steps for installation, compiling embedded devices and then processed data through the different packages to build system is also difficult, and it is network is uploaded to the back-end, private small-cloud often time-consuming for the integration of a few packages computing. After the processing at the back-end is no guarantee to complete the work. Therefore this study has completed, the results sent back to the front-end embedded chosen QT/Embedded framework instead of GTK series, in devices. As shown in Fig.2, an open source Hadoop such a way that achieves GUI interface functions. In Fig. 11, packages is utilized to establish the private cloud computing no matter SWT or AWT in JamVM they apply Java Native easily; in such a way that we can focus on installing the Interface (JNI) to communicate C- written graphics library. back-end cluster controllers and cloud controller in order to Afterward QT/Embedded gets through the kernel driver to build a private small-cloud computing. achieve graphic function as shown in Fig. 12. According to An embedded platform in conjunction with a cloud the pictures shown in Fig. 11 and Fig. 12, we can string computing environment is applied to testing the capabilities them together to be the structure of a node device as shown of fingerprint identification and facial recognition as the in Fig. 10. This part will adopt a low-cost, low-power access security system. The basic structure of Hadoop cloud embedded platform to realize a thin client. computing is developed and has been deployed as well. We C. Installing Access Security System will then test the performance of the embedded platform operating in cloud computing to check whether or not it can When establishing a Hadoop cloud computing is done, achieve immediate and effective response to required we will test the cloud employing an embedded platform in a functions. Meanwhile, we continue to monitor the online cloud environment to perform fingerprint identification [15] operation and evaluate system performance in statistics, such and face recognition [16] to fulfill the access security system as the number of files, file size, the total process of MB, the [17]. Meanwhile the development of basic structure and number of tasks on each node, and throughput. In a cluster deployment for Hadoop cloud computing are valid and even implementation of cloud computing, the statistical more we test the service performance for an embedded assessment by the size of each node is listed. According to platform collaborated with cloud computing, checking an the analysis of the results, we will adjust the system immediate and effective response to client. The access functions if changes are required. security system is shown in Fig. 13. III. ACCESS SECURITY IN HADOOP IV. EXPERIMENTAL RESULTS AND DISCUSSIONS In order to verify the cloud system effectiveness and A. Deploying Hadoop Cloud Computing efficiency in access security, the experiment on fingerprint Once a Hadoop cloud computing server has been identification and face recognition by using rapid established in server site, we have to test the functionality of identification in Hadoop cloud computing has been done cloud computing in Hadoop system. As shown in Fig. 3, we successfully within 2.2 seconds in average access first test the Hadoop Administration Interface at the website identification to exactly cross-examine the subject identity. http://hadoop1:50030. Next, Task Tracker Status at As a result the proposed Hadoop cloud computing has been http://hadoop1:50060 will be examined as shown in Fig. 4. performed very well when it has deployed in local area. After that we move on to check Hadoop Distributed File Steps are as follows: (a) the operation for face recognition is System (HDFS) Status, as shown in Fig. 5, at quickly to open the video camera for the first, and then press http://hadoop1:50070. In order to setup a programming the capture button, the program will execute binarization 78
  • 3. automatically as shown in Fig. 14; (b) the rapid fingerprint identification is first to turn on device, then press the deal button for feature extraction that reduces the amount of information as shown in Fig. 15; (c) at first the terminal device test the connection if Internet is working properly, and then we press the identify button and information sent to the cloud, and at last the cloud will return the identification results as shown in Fig. 16. V. CONCLUSIONS In this study Hadoop cloud computing together with access security by applying the rapid identification on fingerprint and face has been realized so that cloud computing initiates the services like SaaS, PaaS, and/or IaaS. The connection between client and server has employed a way of low-capacity Linux embedded platform linked to Hadoop via Ethernet, WiFi or 3G. At client side, JamVM virtual machine is utilized to form the J2ME environment, and GNU Classpath is viewed as Java Class Libraries. In Figure 1. Cloud computing server connected Figure 2. Hadoop server linked to mobile devices over with mobile device, PC, and notebook. WiFi. order to verify the cloud system effectiveness and efficiency in access security, the rapid identification on fingerprint and face in Hadoop has been done successfully within 2.2 seconds to exactly cross-examine the subject identity. ACKNOWLEDGMENT This work is fully supported by the National Science Council, Taiwan, Republic of China, under grant number: NSC99-2218--E-390-002. REFERENCES [1] Google App Engine, 2010. http://groups.google.com/group/google- appengine [2] Amazon Web Services (AWS), 2010. http://aws.amazon.com/ Figure 3. Testing Hadoop Administration IF at http://hadoop1:50030. [3] Windows Azure- A Microsoft Solution to Cloud, 2010. http://tech.cipper.com/index.php/archives/332 [4] IBM Cloud Compputing, 2010. http://www.ibm.com/ibm/cloud/ [5] OpenNebula, 2010. http://www.opennebula.org/ [6] Eucalyptus, 2010. http://open.eucalyptus.com/ [7] Welcome to Apache Hadoop, 2010. http://hadoop.apache.org/ [8] Sector/Sphere, National Center for Data Mining, 2009. http://sector.sourceforge.net/ [9] Welcome to Apache Hadoop, 2010. http://hadoop.apache.org/ [10] Java 2 Platform, Micro Edition (J2ME), 2010. http://www.java.com/zh_TW/download/faq/whatis_j2me.xml [11] JamVM -- A compact Java Virtual Machine, 2010. http://jamvm.sourceforge.net/ [12] GNU Classpath , GNU Classpath, Essential Libraries for Java, in Figure 4. Testing Task Tracker Status at http://hadoop1:50060. 2010. http://www.gnu.org/software/classpath/ [13] Eclipse Summit, 2011. http://www.eclipse.org/dowload/ [14] Java JDK, 2011. http://www.oracle.com/technetwork/java/javase/downloads/jdk6-jsp- 136632.html [15] VeriFinger SDK, Neuro Technology, 2010. http://www.neurotechnology.com/verifinger.html [16] VeriLook SDK, Neuro Technology, 2010. http://www.neurotechnology.com/verilook.html [17] opencv (open source), 2010. http://www.opencv.org.cn/index.php?title=%E9%A6%96%E9%A1 %B5&variant=zh-tw Figure 5. Testing HDFS Status at http://hadoop1:50070. 79
  • 4. Figure 6. A Snapshot of Eclipse IDE. (b) Figure 13. System architecture. Figure 7. Key in commend “hbase shell” under Linux Environment. Java Apps SWT AWT Java Apps SWT AWT Java Apps SWT AWT CDC+PP CDC+PP GTK GTK QT/Embedded Clib Pango Atk Clib Pango Atk DirectFB X11 OS(kernel) OS(kernel) OS(kernel) Figure 8. Terminal node with Figure 9. Terminal node Figure 10. Terminal node Figure 14. Binarization processing automatically running in program. GTK + DirectFB. with GTK + X11. with QT / Embedded. Figure 11. Communication between SWT/AWT and QT/Embedded. Figure 15. Processing fingerprint features to reduce the amount of information. Figure 12. QT/embedded communicates with the Linux Framebuffer. (a) Figure 16. Information sent to the cloud and cloud returns the results of recognition to the consol. 80