Access Security on Cloud Computing Implemented in Hadoop System

  • Authors:
  • Bao Rong Chang;Hsiu Fen Tsai;Zih-Yao Lin;Chi-Ming Chen

  • Affiliations:
  • -;-;-;-

  • Venue:
  • ICGEC '11 Proceedings of the 2011 Fifth International Conference on Genetic and Evolutionary Computing
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we introduce a Hadoop cloud computing together with access security by using the fingerprint identification and face recognition. Hadoop cloud computing is connected to serve plenty of mobile devices or thin clients by the wired or wireless network. In fact a controller (master) may be linked to several nodes (slavers) to form a Hadoop cloud computing, where the cloud computing initiates the services like SaaS, PaaS, and/or IaaS. This study employed a way of low-capacity Linux embedded platform linked to Hadoop via Ethernet, WiFi or 3G. At client side, JamVM virtual machine is utilized to form the J2ME environment, and GNU Class path is viewed as Java Class Libraries. In order to verify the cloud system effectiveness and efficiency in access security, the rapid identification on fingerprint and face in Hadoop has been done successfully within 2.2 seconds to exactly cross-examine the subject identity.