skip to main content
10.1145/3093241.3093265acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccdaConference Proceedingsconference-collections
research-article

Social Login and Data Storage in the Big Data File System HDFS

Authors Info & Claims
Published:19 May 2017Publication History

ABSTRACT

Studies have shown that the registration forms on Websites are ineffective because many people give false data, forget their login information to the site or just refuse to register, to overcome these problems a new type of authentication is born is the social authentication or social login which is a type of SSO(Single Sign-On),due to this type of authentication enrollment increases to a platform because the user registered to the platform with a simple click of a button authentication without passing by the step of filling a form, choose a username and a secure password. In this article, we will study the social authentication how it works, and how after the authorization of the user we can Retrieve personal data to complete registration, we can also use its social authorization on our facebook application to register its data on HDFS in a Big data system to analyze them and personalize its member space in the platform, using the Hadoop framework based on the MapReduce programming.

References

  1. Alexandre Marguerite, AAA: Authentication Authorization [1] Accounting,2014Google ScholarGoogle Scholar
  2. Payal Sharma & Vikas Kumar Sihag Hybrid Single Sign-On Protocol For Lightweight Devices, 2016 IEEE 6th International Conference on Advanced Computing.Google ScholarGoogle Scholar
  3. D. Ganesh & V. V. RamaPrasad, Protection of Shared Data Among Multiple Users for Online Social Networks, International Conference on Contemporary Computing and Informatics (IC3I), 2014Google ScholarGoogle Scholar
  4. Yoann Gini --- iNig-Services: "http://inig-services.com", authentification: state of the art,2013Google ScholarGoogle Scholar
  5. I. Indu & P. M. Rubesh Anand,Hybrid Authentication and Authorization Model for Web based Applications, IEEE WiSPNET 2016 conference,2016Google ScholarGoogle Scholar
  6. Lanjing Wang, and Baoyi Wang, "Attribute-Based Access Control Model for Web Services in Multi-Domain Environment," Proceedings of the IEEE International Conference on Management and Service Science (MASS), pp, 1--4. 24--26 Aug. 2010, Wuhan, China. Google ScholarGoogle ScholarCross RefCross Ref
  7. Yonghe Wei, Chunjing Shi, and Weiping Shao, "An attribute and role based access control model for serviceoriented environment," Proceedings of the IEEE Control and Decision Conference (CCDC), pp, 4451--4455. 26--28 May 2010, Xuzhou, China.Google ScholarGoogle Scholar
  8. Art Friedman & Vincent C. Hu, Attribute Assurance for Attribute Based Access Control,National Institute of Standards and Technology (NIST), USA, 2014Google ScholarGoogle Scholar
  9. http://www.gigya.com/ The Landscape of Social Login, 2014Google ScholarGoogle Scholar
  10. Vaibhav Rastogi; Ankit Agrawal, "All your Google and Facebook logins are belong to us: A case for single signoff", 2015 Eighth International Conference on Contemporary Computing (IC3),2015Google ScholarGoogle Scholar
  11. documentation facebook of facebook login https://developers.facebook.com/docs/facebookloginGoogle ScholarGoogle Scholar
  12. Watters,Audrey,visualize big data with folowing media, readwrite web,15 avril 2010Google ScholarGoogle Scholar
  13. Benjamin Renaut,Université nice sophia antipolis, Hadoop / Big Data,2014Google ScholarGoogle Scholar

Index Terms

  1. Social Login and Data Storage in the Big Data File System HDFS

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCDA '17: Proceedings of the International Conference on Compute and Data Analysis
      May 2017
      307 pages
      ISBN:9781450352413
      DOI:10.1145/3093241

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 19 May 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader