•Privacy of user information: The user information, such as authentication information, is invisible at the side of the
slave nodes. Slave nodes take tasks, which are assigned by the master node, without being aware of user information,
including the user name and password.