The G-Hadoop prototype currently uses the Secure Shell (SSH) protocol to establish a secure connection between a user and the target cluster.
This approach requires a single connection to each participating cluster, and users have to log on to each cluster for being authenticated. Therefore, we designed a novel security framework for G-Hadoop.