•Privacy of user information: The user information, such as authentication information, is invisible at the side of the slave nodes. Slave nodes take tasks, which are assigned by the master node, without being aware of user information,
including the user name and password.