Phase I: User authentication. From the view of users the way to submit a job to the G-Hadoop system with the security framework is not different from the submission process of the initial G-Hadoop implementation. However, with the security model a user does not need log on to each slave node. Instead, a single log-on to the master node with his user name and password pair {U , P } is sufficient.