By Topic

Access Security on Cloud Computing Implemented in Hadoop System

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Bao Rong Chang ; Dept. of Comput. Sci. & Inf. Eng., Nat. Univ. of Kaohsiung, Kaohsiung, Taiwan ; Hsiu Fen Tsai ; Zih-Yao Lin ; Chi-Ming Chen

In this paper, we introduce a Hadoop cloud computing together with access security by using the fingerprint identification and face recognition. Hadoop cloud computing is connected to serve plenty of mobile devices or thin clients by the wired or wireless network. In fact a controller (master) may be linked to several nodes (slavers) to form a Hadoop cloud computing, where the cloud computing initiates the services like SaaS, PaaS, and/or IaaS. This study employed a way of low-capacity Linux embedded platform linked to Hadoop via Ethernet, WiFi or 3G. At client side, JamVM virtual machine is utilized to form the J2ME environment, and GNU Class path is viewed as Java Class Libraries. In order to verify the cloud system effectiveness and efficiency in access security, the rapid identification on fingerprint and face in Hadoop has been done successfully within 2.2 seconds to exactly cross-examine the subject identity.

Published in:

Genetic and Evolutionary Computing (ICGEC), 2011 Fifth International Conference on

Date of Conference:

Aug. 29 2011-Sept. 1 2011