Hadoop Auth

One of the factors for the reliability of the services is authentication, which decides who can access what services. Since big data offers a wide variety of services, authentication becomes one of the main criteria for consideration. This chapter outlines the features of the security services in terms of the requirements and the issues in the business services. This chapter also gives a little background about the services in the cloud and the interaction between clients and services in the cloud, emphasizing the security services. The authentication procedure with the authentication protocol, Kerberos SPNEGO, which is offered as a security service in Hadoop, is introduced. The configuration details in a typical browser (Mozilla Firefox) are detailed. The usage of the Linux command curl is introduced in this chapter. The command to key distribution center “kinit” is outlined. Also, the procedure for accessing the server within the Java code is given. A section on server-side configuration speaks about the Maven repository, which holds all the necessary library Jar files organized as local, central, and remote. The explanation for the configuration is given with a typical XML file. Also, the usage of Simple Logging Facade for Java is introduced. The configuration has many parameters with its values and they are tabulated for better perception. The use of LDAP server, which is one of the lightweight directory access protocols, is introduced. Also, the provision for multi-scheme configuration is outlined with an example configuration file. The facilities available to provide advanced security features using signer secret provide are highlighted with appropriate examples for the parameter name and parameter value.

Istoriya ◽  
2021 ◽  
Vol 12 (8 (106)) ◽  
pp. 0
Author(s):  
Tatiana Vagramenko

This article reconstructs the history of one KGB operation against the Jehovah’s Witnesses in Ukraine, launched by the Ukrainian security services in 1951. The operation aimed to infiltrate the Jehovah’s Witness underground organization in Ukraine and to organize a Witness country committee as a covert operation. The plan was designed such that the Soviet security service became the head of the Jehovah’s Witnesses organization, and the headquarters of the official Watch Tower Bible and Tract Society became a channel in their counter-intelligence operations. This article tells about the failures and unexpected side-effects of the secret operation caused by internal conflicts within the Soviet politics of religion. Paradoxically, in the context of a disintegrated Witness underground network, caused by the post-war deportations and mass arrests, severed communication channels with the Watch Tower Society and the absence of religious literature, the Soviet security service became an alternative communication channel between the faith communities and a source of religious reproduction (including the source of the production of Watch Tower literature). This study dwells upon historical materials from recently opened SBU (former KGB) archives in Ukraine.


Author(s):  
Bobomurod Juraevich Abdullaev ◽  

This article provides insights into the existing and politically important security system in the Central Asian khanates. The khanates of Bukhara, Khiva and Kokand had their own military power and were divided into different parts. The security departments of the khanates also played an important role in the development of the state and the security of the people. During the years of independence, as in any other field, significant changes have taken place in the field of security services. In particular, the President of the Republic of Uzbekistan Shavkat Mirziyoyev has improved the security service in the National Guard.


Author(s):  
Ahmet Artu Yıldırım ◽  
Cem Özdoğan ◽  
Dan Watson

Data reduction is perhaps the most critical component in retrieving information from big data (i.e., petascale-sized data) in many data-mining processes. The central issue of these data reduction techniques is to save time and bandwidth in enabling the user to deal with larger datasets even in minimal resource environments, such as in desktop or small cluster systems. In this chapter, the authors examine the motivations behind why these reduction techniques are important in the analysis of big datasets. Then they present several basic reduction techniques in detail, stressing the advantages and disadvantages of each. The authors also consider signal processing techniques for mining big data by the use of discrete wavelet transformation and server-side data reduction techniques. Lastly, they include a general discussion on parallel algorithms for data reduction, with special emphasis given to parallel wavelet-based multi-resolution data reduction techniques on distributed memory systems using MPI and shared memory architectures on GPUs along with a demonstration of the improvement of performance and scalability for one case study.


When designing a security protocol, it is important firstly to define its security goals. These goals are generally referred to as security services. It is also important to identify the mechanisms which can provide each security service. In this chapter, therefore, we first defined the security services of relevance to this chapter and after that the security mechanisms, which can be used to provide the security services are then examined. In next chapter gives the brief details about Attacks and Authentication for Mobile Banking.


Author(s):  
Dr. Eng. Syed Naqvi

Virtualization technologies are emerging as a promising solution for managing the rapidly growing complexities of modern distributed ICT infrastructures. However, a mainstream operational concern for these virtualization oriented architectures is to provide efficient security services. Establishment of in-depth security services and trust relationships are the most desirable features for the effective functioning of these systems. This chapter presents a security architecture to address the comprehensive security needs of today’s virtualization oriented architectures. The concept of virtualization of security services is introduced so as to have absolute freedom to choose the underlying security mechanisms. This concept of virtualization of security services is realized through distributed virtual engines that enable unification of security service calls according to requirements and not according to the underlying technologies. A configurable mechanism for the invocation of security services is proposed to address the security needs of different kinds of users. This approach permits the evolution of efficient security infrastructure with minimal impact on the resource management functionalities. In this way, users and resource providers can configure the security services according to their requirements and satisfaction level. The resulting extensible set of security services include both core security services and contemporary security services required for the modern virtualization oriented infrastructures.


Author(s):  
Hany F. EL Yamany ◽  
David S. Allison ◽  
Miriam A.M. Capretz

Security is one of the largest challenges facing the development of a Service-Oriented Architecture (SOA). This is due to the fact that SOA security is the responsibility of both the service consumer and service provider. In recent years, many solutions have been implemented, such as the Web Services Security Standards, including WS-Security and WS-SecurityPolicy. However, those standards are insufficient for the promising new generations of Web 2.0 applications. In this research, we describe an Intelligent SOA Security (ISOAS) framework and introduce four of its services: Authentication and Security Service (NSS), the Authorization Service (AS), the Privacy Service (PS) and the Service of Quality of Security Service (SQoSS). Furthermore, a case study is presented to examine the behavior of the described security services inside a market SOA environment.


In our country’s industrial growth many services have grown by leaps and bounds with advent of growing competition, de regulations, technological advancement and growing needs of FDI in different sectors. Many service sectors have grown phenomenally catering to the demanding needs of customers of different profiles. One such service is Private Industrial security services where the growth rate is approximately 30% annually. Growth and Demand in the security services are inherently accompanied by the challenges and issues all over to different stake holders like Organisations, end users, lakhs of practicing security personnel, Govt agencies, Training organizations, HR Practitioners and Administrators. A FICCI study estimates that the private security industry’s Turn over is pegged at Rs. 15,000/- crores with employment to 15 lakh people. It is expected to cross 22,000 crores with 75 lakh workforce by 2020. Yet Security industry is not properly regulated by any statutory or industry bodies in real sense to bring it on par with any other organized sector for the common good of the industry. Security needs are varied and different, given the security climate and perception in diversified industrial segments in economy. So are the equally daunting challenges, concerns, issues faced by the corporate while engaging the security personnel for safeguarding and protecting their physical and human assets. Undoubtedly this service is required in almost all walks of our lives, all through 365 days and 24X7 days. Complexities apart, the security service has to come stay irrespective of industry growth rate in any given sector. Corporates are completely aware of the necessity of the service in different business conditions. Yet by nature the same complexities themselves create new challenges and perceptions within and outside this industry. The scope of the performance and accompanying challenges are far reaching to foresee the road ahead of this industry.


2018 ◽  
Vol 5 (59) ◽  
Author(s):  
Stanislav Dadelo

It is actual to elucidate the contribution of each factor to the professional competence of guards and the infl uence of these factors on their superior’s appraisal. Therefore we hypothesize that assessment of the contribution of the guard’s personal features into his professional competence and their infl uence on their appraisal by superiors will be helpful in staffi ng private security services and improving their working qualities. The object of the current study was the psychobiological and professional factors determining the professional competence of a security worker. The aim of the work was to establish the role of separate factors determining the professional competence of security workers, as well as to study the professional competence of security workers in formativeness of superior’s appraisal and psychobiological factors, qualitative indices and their analysis. The study subject was 118 security workers and their four direct superiors.Factor analysis applied for competence assessment of security workers has shown that in internal appraisal (of summarized identifi ed variables) the highest value belongs to psychic qualities (22%) as well as age and physical development (20%), followed by physical preparedness (16%), professional activity (15%), theoretical and practical preparedness (14%) and fi ghting abilities (13%). The (external) appraisal by security service superiors, when only the observation and questioning methods are applied, are not suffi ciently informative and reliable. The factor of the-oretical and practical preparedness has been found to have a similar weight both in external and internal appraisal, however, a number of factors, such as psychic qualities, physical preparedness and fi ghting abilities, in internal and external appraisal have a cardinally opposite value.Keywords: security service, competence, factors.


Big Data ◽  
2016 ◽  
pp. 734-756 ◽  
Author(s):  
Ahmet Artu Yıldırım ◽  
Cem Özdoğan ◽  
Dan Watson

Data reduction is perhaps the most critical component in retrieving information from big data (i.e., petascale-sized data) in many data-mining processes. The central issue of these data reduction techniques is to save time and bandwidth in enabling the user to deal with larger datasets even in minimal resource environments, such as in desktop or small cluster systems. In this chapter, the authors examine the motivations behind why these reduction techniques are important in the analysis of big datasets. Then they present several basic reduction techniques in detail, stressing the advantages and disadvantages of each. The authors also consider signal processing techniques for mining big data by the use of discrete wavelet transformation and server-side data reduction techniques. Lastly, they include a general discussion on parallel algorithms for data reduction, with special emphasis given to parallel wavelet-based multi-resolution data reduction techniques on distributed memory systems using MPI and shared memory architectures on GPUs along with a demonstration of the improvement of performance and scalability for one case study.


Sign in / Sign up

Export Citation Format

Share Document