{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T11:10:40Z","timestamp":1767093040240,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811680588"},{"type":"electronic","value":"9789811680595"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-8059-5_4","type":"book-chapter","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:03:12Z","timestamp":1638450192000},"page":"47-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Implementation of Robust User Authentication Technique for Big Data Platform"],"prefix":"10.1007","author":[{"given":"Galal A.","family":"AL-Rummana","sequence":"first","affiliation":[]},{"given":"Abdulrazzaq H. A.","family":"Al-Ahdal","sequence":"additional","affiliation":[]},{"given":"G. N.","family":"Shinde","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Shvachko, K., Kuang, H., Radia, S., Chansler, R.: The hadoop distributed file system. In: 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), pp. 1\u201310. IEEE May 2010","DOI":"10.1109\/MSST.2010.5496972"},{"key":"4_CR2","first-page":"1","volume":"5","author":"S Priya","year":"2015","unstructured":"Priya, S., Navdeti, C.: Securing big data hadoop\u202f: a review of security issues, threats and solution. Int. J. Comput. Sci. Inf. Technol. 5, 1 (2015)","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"4_CR3","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1007\/978-3-642-35795-4_85","volume-title":"Trustworthy Computing and Services","author":"S Jin","year":"2013","unstructured":"Jin, S., Yang, S., Zhu, X., Yin, H.: Design of a trusted file system based on hadoop. In: Yuan, Y., Wu, X., Lu, Y. (eds.) ISCTCS 2012. CCIS, vol. 320, pp. 673\u2013680. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-35795-4_85"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Zhou, H., Wen, Q.: A new solution of data security accessing for Hadoop based on CP-ABE. In: 2014 IEEE 5th International Conference on Software Engineering and Service Science, pp. 525\u2013528. IEEE (2014)","DOI":"10.1109\/ICSESS.2014.6933621"},{"key":"4_CR5","unstructured":"O\u2019Malley, O.: Integrating kerberos into apache hadoop. In: Kerberos Conference, pp. 26\u201327 (2010)"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Sadasivam, G.S., Kumari, K.A., Rubika, S.: A novel authentication service for hadoop in cloud environment. In: 2012 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), pp. 1\u20136. IEEE (2012)","DOI":"10.1109\/CCEM.2012.6354591"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Suresh, L.P., Dash, S.S., Panigrahi, B.K.: Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, vol. 2 (2015)","DOI":"10.1007\/978-81-322-2126-5"},{"key":"4_CR8","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.procs.2015.04.064","volume":"50","author":"M Sarvabhatla","year":"2015","unstructured":"Sarvabhatla, M., Chandra, M.R.M., Vorugunti, C.S.: A secure and light weight authentication service in hadoop using one time pad. Procedia Comput. Sci. 50, 81\u201386 (2015). https:\/\/doi.org\/10.1016\/j.procs.2015.04.064","journal-title":"Procedia Comput. Sci."},{"key":"4_CR9","doi-asserted-by":"publisher","first-page":"56","DOI":"10.17485\/ijst\/2014\/v7sp4.16","volume":"7","author":"N Somu","year":"2014","unstructured":"Somu, N., Gangaa, A., Shankar Sriram, V.S.: Authentication service in hadoop using one time pad. Indian J. Sci. Technol. 7, 56\u201362 (2014). https:\/\/doi.org\/10.17485\/ijst\/2014\/v7sp4.16","journal-title":"Indian J. Sci. Technol."},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MCOM.2018.1700379","volume":"56","author":"GS Aujla","year":"2018","unstructured":"Aujla, G.S., Chaudhary, R., Kumar, N., Das, A.K., Rodrigues, J.J.P.C.: SecSVA: secure storage, verification, and auditing of big data in the cloud environment. IEEE Commun. Mag. 56, 78\u201385 (2018). https:\/\/doi.org\/10.1109\/MCOM.2018.1700379","journal-title":"IEEE Commun. Mag."},{"issue":"7","key":"4_CR11","doi-asserted-by":"publisher","first-page":"4772","DOI":"10.1007\/s11227-018-2605-1","volume":"76","author":"J Srinivas","year":"2018","unstructured":"Srinivas, J., Das, A.K., Rodrigues, J.J.P.C.: 2PBDC: privacy-preserving bigdata collection in cloud environment. J. Supercomput. 76(7), 4772\u20134801 (2018). https:\/\/doi.org\/10.1007\/s11227-018-2605-1","journal-title":"J. Supercomput."},{"key":"4_CR12","unstructured":"Neuman, C., Kohl, J.: The Kerberos Network Authentication Service (V5), pp. 1\u2013139 (1993)"},{"key":"4_CR13","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/381906.381946","volume":"20","author":"SM Bellovin","year":"1990","unstructured":"Bellovin, S.M., Merritt, M.: Limitations of the Kerberos authentication system. ACM SIGCOMM Comput. Commun. Rev. 20, 119\u2013132 (1990). https:\/\/doi.org\/10.1145\/381906.381946","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"4_CR14","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.comnet.2017.12.007","volume":"131","author":"D Chattaraj","year":"2018","unstructured":"Chattaraj, D., Sarma, M., Das, A.K.: A new two-server authentication and key agreement protocol for accessing secure cloud services. Comput. Netw. 131, 144\u2013164 (2018). https:\/\/doi.org\/10.1016\/j.comnet.2017.12.007","journal-title":"Comput. Netw."},{"key":"4_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-8737-0","volume-title":"Novel Algorithms and Techniques in Telecommunications, Automation and Industrial Electronics","author":"T Sobh","year":"2008","unstructured":"Sobh, T., Elleithy, K., Mahmood, A., Karim, M.A.: Novel Algorithms and Techniques in Telecommunications, Automation and Industrial Electronics. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-1-4020-8737-0"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Abdelmajid, N.T., Hossain, M.A., Shepherd, S., Mahmoud, K.: Location-based kerberos authentication protocol. In: 2010 IEEE Second International Conference on Social Computing, pp. 1099\u20131104. IEEE (2010)","DOI":"10.1109\/SocialCom.2010.163"},{"key":"4_CR17","unstructured":"Zhu, L., Tung, B.: Public Key Cryptography for Initial Authentication in Kerberos (PKINIT). https:\/\/www.hjp.atdocrfcrfc4556.html"},{"key":"4_CR18","doi-asserted-by":"publisher","first-page":"75342","DOI":"10.1109\/ACCESS.2018.2883105","volume":"6","author":"D Chattaraj","year":"2018","unstructured":"Chattaraj, D., Sarma, M., Das, A.K., Kumar, N., Rodrigues, J.J.P.C., Park, Y.: HEAP: an efficient and fault-tolerant authentication and key exchange protocol for hadoop-assisted big data platform. IEEE Access 6, 75342\u201375382 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2883105","journal-title":"IEEE Access"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Al-Rummana, G.A., Al Ahdal, A.H.A., Shinde, G.N.: A robust user authentication framework for bigdata. In: 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), pp. 1256\u20131261. IEEE (2021)","DOI":"10.1109\/ICICV50876.2021.9388505"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Choudhury, A.J., Kumar, P., Sain, M., Lim, H., Jae-Lee, H.: A strong user authentication framework for cloud computing. In: 2011 IEEE Asia-Pacific Services Computing Conference, pp. 110\u2013115. IEEE (2011)","DOI":"10.1109\/APSCC.2011.14"},{"key":"4_CR21","doi-asserted-by":"publisher","first-page":"772","DOI":"10.18517\/ijaseit.9.3.5721","volume":"9","author":"TS Algaradi","year":"2019","unstructured":"Algaradi, T.S., Rama, B.: Static knowledge-based authentication mechanism for hadoop distributed platform using kerberos. Int. J. Adv. Sci. Eng. Inf. Technol. 9, 772\u2013780 (2019). https:\/\/doi.org\/10.18517\/ijaseit.9.3.5721","journal-title":"Int. J. Adv. Sci. Eng. Inf. Technol."},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Jiang, L., Li, X., Cheng, L.L., Guo, D.: Identity authentication scheme of cloud storage for user anonymity via USB token. In: 2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID), pp. 1\u20136. IEEE (2013)","DOI":"10.1109\/ICASID.2013.6825270"},{"key":"4_CR23","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.adhoc.2015.05.014","volume":"36","author":"MS Farash","year":"2016","unstructured":"Farash, M.S., Turkanovi\u0107, M., Kumari, S., H\u00f6lbl, M.: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Netw. 36, 152\u2013176 (2016). https:\/\/doi.org\/10.1016\/j.adhoc.2015.05.014","journal-title":"Ad Hoc Netw."},{"key":"4_CR24","doi-asserted-by":"publisher","unstructured":"Mehra, P.S., Doja, M.N., Alam, B.: Codeword Authenticated Key Exchange (CAKE) light weight secure routing protocol for WSN. Int. J. Commun. Syst. 32 (2019). https:\/\/doi.org\/10.1002\/dac.3879","DOI":"10.1002\/dac.3879"}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-8059-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:12:29Z","timestamp":1638450749000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-8059-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811680588","9789811680595"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-8059-5_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"92","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}