One of the primary goal of this security framework is to supply users with the single-sign-on process to submit a job to G-Hadoop. It has to be noted that G-Hadoop covers a distributed system and its components are physically distributed across resource centers connected with a public network. A user may not have any accessing right to one or more slave nodes. If a simple user database that only stores the user name and password is used, the master node could not be aware of the accessing right, which will cause the break of rights control on the slave nodes. Therefore, in our security framework, the user database also stores the accessing right of slave nodes for each user, in addition to the user login information. During the execution of a user’s jobs, the master node only tries to connect with the slave nodes that can be found in the corresponding user’s item in the database. In this case, the master node is able to avoid abusing of the resources in G-Hadoop.