I
nd
o
ne
s
ia
n J
o
urna
l o
f
E
lect
rica
l En
g
ineering
a
nd
Co
m
p
u
t
er
Science
Vo
l.
1
2
,
No
.
1
,
Octo
b
er
201
8
,
p
p
.
1
0
7
~
1
1
6
I
SS
N:
2502
-
4752
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ee
cs
.
v
1
2
.i
1
.
p
p
107
-
1
1
6
107
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ia
e
s
co
r
e.
co
m/jo
u
r
n
a
ls
/in
d
ex
.
p
h
p
/
ijeec
s
H
a
do
o
p Securi
ty
Cha
lleng
es
a
nd
It
s So
lution Usin
g
K
N
O
X
Siris
ha
. N
1
,
K
ira
n
K
.
V.
D
2
,
R.
K
a
rt
hik
3
1,
2
K L
Un
iv
e
rsit
y
,
In
d
ia
3
M
L
R
In
stit
u
te
o
f
T
e
c
h
n
o
lo
g
y
,
In
d
ia
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
J
u
n
1
,
2
0
1
8
R
ev
i
s
ed
J
u
l 1
0
,
2
0
1
8
A
cc
ep
ted
Ju
l 2
5
,
2
0
1
8
B
ig
Data
is
a
n
e
w
tec
h
n
o
lo
g
y
an
d
ar
ch
itect
u
r
e.
I
t
ca
n
w
o
r
k
o
n
a
v
er
y
lar
g
e
v
o
lu
m
e
o
f
a
v
ar
iet
y
o
f
d
ata
w
it
h
h
i
g
h
-
v
elo
cit
y
,
d
is
co
v
er
y
,
an
d
/o
r
an
al
y
s
is
.
B
ig
Data
is
ab
o
u
t
th
e
f
ast
-
g
r
o
w
in
g
s
o
u
r
c
es
o
f
d
ata
s
u
c
h
as
w
eb
lo
g
ics,
Se
n
s
o
r
n
e
t
w
o
r
k
s
,
So
cial
m
ed
ia,
I
n
t
er
n
et
tex
t
a
n
d
d
o
cu
m
en
ts
,
I
n
ter
n
e
t
p
ag
e
s
,
Se
ar
ch
I
n
d
e
x
d
ata,
s
cien
ti
f
ic
r
ese
ar
ch
.
B
i
g
d
ata
also
f
o
r
m
all
y
i
n
tr
o
d
u
ce
s
a
co
m
p
lex
r
a
n
g
e
o
f
an
al
y
s
i
s
.
B
ig
d
ata
ca
n
e
v
alu
a
te
m
ix
ed
d
ata
(
s
tr
u
ctu
r
ed
an
d
u
n
s
tr
u
c
tu
r
ed
)
f
r
o
m
m
u
ltip
le
s
o
u
r
ce
s
.
As
t
h
er
e
ar
e
s
o
m
e
s
ec
u
r
it
y
is
s
u
e
s
i
n
b
ig
d
ata
w
h
i
ch
ar
e
n
o
lo
n
g
er
s
o
lv
ed
u
s
in
g
th
e
h
a
s
h
i
n
g
tec
h
n
iq
u
es
o
n
lar
g
e
a
m
o
u
n
t
o
f
d
ata,
th
is
p
ap
er
s
h
o
w
s
a
n
id
ea
o
f
n
e
w
ap
p
r
o
ac
h
o
f
d
es
ig
n
i
n
g
a
Kn
o
x
‟
i
f
ied
Had
o
o
p
clu
s
ter
.
K
ey
w
o
r
d
s
:
Ker
b
er
o
s
HDFS
Kn
o
x
SS
L
L
D
A
P
R
E
ST
A
P
I
Co
p
y
rig
h
t
©
2
0
1
8
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts
re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Siris
h
a.
N
,
K.
L
.
u
n
i
v
er
s
i
t
y
,
I
n
d
ia
.
E
m
ail:
r
a
y
a
m
1
6
@
g
m
ail.
co
m
1.
I
NT
RO
D
UCT
I
O
N
An
e
x
te
n
s
i
v
e
v
ar
iet
y
o
f
tec
h
n
i
q
u
es
a
n
d
tech
n
o
lo
g
ie
s
h
as
b
ee
n
d
ev
elo
p
ed
to
s
eize
d
ata,
d
ata
s
to
r
ag
e,
d
ata
an
al
y
s
is
,
s
ea
r
c
h
,
s
h
ar
i
n
g
,
tr
an
s
f
er
,
v
is
u
aliza
tio
n
,
q
u
er
y
in
g
,
u
p
d
atin
g
an
d
i
n
f
o
r
m
atio
n
p
r
iv
ac
y
.
I
n
th
is
p
ap
er
,
th
e
b
i
g
d
ata
is
s
u
es
ar
e
m
o
r
e
f
o
cu
s
ed
i
n
ter
m
s
o
f
s
ec
u
r
it
y
is
s
u
e
s
t
h
at
r
aised
i
n
Had
o
o
p
A
r
c
h
itect
u
r
e
[
1
]
b
ase
lay
er
ca
lled
Had
o
o
p
Dis
tr
ib
u
ted
Fil
e
Sy
s
te
m
(
HDF
S)
r
ep
r
esen
ted
in
Fig
u
r
e
1
.
T
h
e
n
e
w
Had
o
o
p
s
ec
u
r
it
y
d
esig
n
r
elies
o
n
th
e
u
s
e
o
f
K
n
o
x
[
2
]
an
d
R
a
n
g
er
.
Fig
u
r
e
1
.
Ov
er
v
ie
w
o
f
Had
o
o
p
Dis
tr
i
b
u
ted
Fil
e
S
y
s
te
m
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l
.
1
2
,
No
.
1
,
Octo
b
er
201
8
:
1
0
7
–
116
108
2.
SE
CUR
I
T
Y
RO
ADM
AP
T
h
e
Had
o
o
p
[
1
]
s
u
p
p
o
r
ts
f
e
w
o
f
t
h
e
s
ec
u
r
it
y
f
ea
tu
r
es
u
s
i
n
g
Ker
b
er
o
s
,
f
ir
e
w
all
s
,
AC
L
S,
L
D
A
P
etc.
,
As
Had
o
o
p
clu
s
ter
[
1
]
in
s
tal
latio
n
,
Ker
b
er
o
s
in
s
tallatio
n
s
ar
e
v
er
y
to
u
g
h
en
o
u
g
h
,
p
r
o
v
id
in
g
s
ec
u
r
it
y
to
Had
o
o
p
is
also
a
m
aj
o
r
p
r
o
b
le
m
in
t
h
e
c
u
r
r
en
t si
tu
atio
n
.
Secu
r
it
y
R
o
ad
m
ap
s
h
o
w
s
t
h
e
d
etails
o
f
d
if
f
er
en
t
tech
n
o
lo
g
i
es
th
at
ar
e
e
m
er
g
ed
w
ith
Had
o
o
p
to
d
ay
an
d
ar
e
r
ep
r
esen
ted
in
T
ab
le
1.
T
ab
le
1
.
Su
r
v
e
y
o
f
a
s
ec
u
r
it
y
a
n
d
its
s
o
l
u
tio
n
i
n
B
ig
Data
M
a
p
-
R
e
d
u
c
e
[
2
]
H
D
F
S
[
2
]
H
b
a
se
[
3
]
H
i
v
e
[
4
]
H
u
e
[
5
]
O
o
z
i
e
[
5
]
Z
o
o
k
e
e
p
e
r
[
6
]
P
i
g
[
7
]
A
u
t
h
e
n
t
i
c
a
t
i
o
n
[8
]
M
D
5
-
D
i
g
e
st
,
G
S
S
A
P
I
(
K
e
r
b
e
r
o
s)
,
D
e
l
e
g
a
t
i
o
n
t
o
k
e
n
s
S
A
S
L
f
r
a
mew
o
r
k
,
D
e
l
e
g
a
t
i
o
n
t
o
k
e
n
s
K
e
r
b
e
r
o
s,
S
A
S
L
(
se
c
u
r
e
c
l
i
e
n
t
a
u
t
h
e
n
t
i
c
a
t
i
o
n
)
A
p
a
c
h
e
K
n
o
x
,
L
D
A
P
a
u
t
h
e
n
t
i
c
a
t
i
on
K
e
r
b
e
r
o
s
(
P
l
u
g
g
a
b
l
e)
D
e
l
e
g
a
t
i
o
n
t
o
k
e
n
s,
K
e
r
b
e
r
o
s
K
e
r
b
e
r
o
s
a
u
t
h
e
n
t
i
c
a
t
i
o
n
a
t
R
P
C
l
a
y
e
r
U
se
r
l
e
v
e
l
p
e
r
mi
ssi
o
n
s
A
u
t
h
o
r
i
z
a
t
i
o
n
[
8
]
Jo
b
&
Q
u
e
u
e
A
C
L
(
r
e
so
u
r
c
e
l
e
v
e
l
)
P
O
S
I
X
p
e
r
mi
ssi
o
n
s
,
A
B
A
C
H
B
a
se
a
c
c
e
ss
c
o
n
t
r
o
l
l
i
st
o
n
t
a
b
l
e
s,
c
o
l
u
mn
s.
A
p
a
c
h
e
K
n
o
x
,
L
i
g
h
t
w
e
i
g
h
t
D
i
r
e
c
t
o
r
y
A
c
c
e
ss
P
r
o
t
o
c
o
l
a
u
t
h
e
n
t
i
c
a
t
i
on
A
C
L
s
a
n
d
F
S
p
e
r
mi
ssi
o
ns
A
C
L
s
[
1
0
]
a
n
d
F
S
p
e
r
mi
ssi
o
n
s
A
C
L
s
A
C
L
s,
A
p
a
c
h
e
S
e
n
t
r
y
En
c
r
y
p
t
i
o
n
o
f
d
a
t
a
a
t
r
e
st
[
8
]
---
A
d
v
a
n
c
e
d
e
n
c
r
y
p
t
i
o
n
st
a
n
d
a
r
d
,
O
S
l
e
v
e
l
A
r
b
i
t
e
r
so
l
u
t
i
o
n
A
r
b
i
t
e
r
so
l
u
t
i
o
n
A
r
b
i
t
e
r
so
l
u
t
i
o
n
A
r
b
i
t
e
r
so
l
u
t
i
o
n
N
/
A
A
r
b
i
t
e
r
so
l
u
t
i
o
n
En
c
r
y
p
t
i
o
n
o
f
d
a
t
a
a
t
T
r
a
n
s
i
t
[
8
]
R
P
C
–
S
i
mp
l
e
A
u
t
h
e
n
t
i
c
a
t
i
o
n
a
n
d
S
e
c
u
r
i
t
y
L
a
y
e
r
,
H
TT
P
S
R
P
C
–
S
i
mp
l
e
A
u
t
h
e
n
t
i
c
a
t
i
o
n
a
n
d
S
e
c
u
r
i
t
y
L
a
y
e
r
,
D
a
t
a
t
r
a
n
sf
e
r
p
r
o
t
o
c
o
l
S
i
mp
l
e
A
u
t
h
e
n
t
i
c
a
t
i
o
n
a
n
d
S
e
c
u
r
i
t
y
L
a
y
e
r
(
se
c
u
r
e
R
P
C
)
T
h
i
r
d
p
a
r
t
y
so
l
u
t
i
o
n
H
TT
P
S
S
e
c
u
r
e
S
o
c
k
e
t
L
a
y
e
r
/
T
r
a
n
sp
o
r
t
l
a
y
e
r
se
c
u
r
i
t
y
A
r
b
i
t
e
r
so
l
u
t
i
o
n
S
i
mp
l
e
A
u
t
h
e
n
t
i
c
a
t
i
o
n
a
n
d
S
e
c
u
r
i
t
y
L
a
y
e
r
A
u
d
i
t
T
r
i
a
l
s
[
9
]
Y
e
s
Y
e
s
N
o
(
B
u
t
A
r
b
i
t
e
r
so
l
u
t
i
o
n
c
a
n
b
e
u
se
d
)
Y
e
s
Y
e
s
Y
e
s
A
r
b
i
t
e
r
so
l
u
t
i
o
n
A
r
b
i
t
e
r
so
l
u
t
i
o
n
T
ab
le
2
s
h
o
w
s
th
e
Sec
u
r
it
y
i
n
h
ad
o
o
p
to
d
ay
w
it
h
f
i
v
e
s
ec
u
r
it
y
p
illar
s
A
d
m
i
n
is
tr
ato
r
,
Au
t
h
e
n
ticatio
n
,
Au
t
h
o
r
izatio
n
,
A
u
d
it,
Data
p
r
o
tectio
n
.
T
h
e
cu
r
r
en
t
s
o
lu
ti
o
n
s
ar
e
A
p
ac
h
e
K
n
o
x
,
Nati
v
e
Ker
b
er
o
s
,
A
u
d
it,
E
n
cr
y
p
tio
n
s
ar
e
th
e
f
e
w
s
o
lu
tio
n
s
c
u
r
r
en
tl
y
u
n
d
er
w
o
r
k
.
Fro
m
th
e
s
e
s
o
l
u
tio
n
s
K
n
o
x
i
s
d
escr
ib
ed
in
n
e
x
t
s
ec
tio
n
.
T
ab
le
2
.
Secu
r
it
y
in
Had
o
o
p
to
d
ay
S
.
N
O
.
S
EC
U
R
I
T
Y
P
I
L
LA
R
S
C
U
R
R
EN
T
S
O
L
U
TI
O
N
S
1.
A
d
mi
n
i
s
t
r
a
t
o
r
•
C
e
n
t
r
a
l
M
a
n
a
g
e
me
n
t
&
C
o
n
s
i
st
e
n
t
se
c
u
r
i
t
y
A
p
a
c
h
e
K
n
o
x
2.
A
u
t
h
e
n
t
i
c
a
t
i
o
n
•
A
u
t
h
e
n
t
i
c
a
t
e
u
se
r
s
a
n
d
sy
st
e
ms
A
p
a
c
h
e
K
n
o
x
,
N
a
t
i
v
e
K
e
r
b
e
r
o
s
3.
A
u
t
h
o
r
i
z
a
t
i
o
n
•
P
r
o
v
i
si
o
n
a
c
c
e
ss t
o
d
a
t
a
A
p
a
c
h
e
K
n
o
x
4.
A
u
d
i
t
•
M
a
i
n
t
a
i
n
a
r
e
c
o
r
d
o
f
d
a
t
a
a
c
c
e
ss
A
p
a
c
h
e
K
n
o
x
,
H
a
d
o
o
p
n
a
t
i
v
e
a
u
d
i
t
5.
D
a
t
a
P
r
o
t
e
c
t
i
o
n
•
P
r
o
t
e
c
t
d
a
t
a
a
t
r
e
st
&
i
n
mo
t
i
o
n
H
D
F
S
t
r
a
n
sp
a
r
e
n
t
,
H
B
a
se
e
n
c
r
y
p
t
i
o
n
,
V
e
n
d
o
r
so
l
u
t
i
o
n
s
3.
K
NO
X
KNOX
i
s
d
ev
elo
p
ed
b
y
Ho
r
to
n
W
o
r
k
s
.
K
n
o
x
i
s
a
R
E
ST
R
ep
r
esen
ta
tio
n
al
State
T
r
an
s
f
er
(
I
t
i
s
s
o
m
eti
m
es
s
p
elled
"
ReST
"
.
)
A
P
I
g
ate
w
a
y
f
o
r
in
ter
ac
tin
g
with
h
ad
o
o
p
s
er
v
ices
[1
1
]
.
A
p
a
ch
e
Kn
o
x
Gate
w
a
y
is
a
s
y
s
te
m
t
h
at
p
r
o
v
id
es
a
s
in
g
le
p
o
in
t
o
f
a
u
t
h
en
tica
tio
n
an
d
ac
ce
s
s
f
o
r
ap
ac
h
e
Ha
d
o
o
p
s
er
v
ices
in
a
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
Ha
d
o
o
p
S
ec
u
r
ity
C
h
a
llen
g
es
A
n
d
I
ts
S
o
l
u
tio
n
Usi
n
g
K
N
OX
(
S
ir
i
s
h
a
.
N
)
109
clu
s
ter
[
1
2
]
.
T
h
e
aim
i
s
to
s
i
m
p
li
f
y
Had
o
o
p
s
ec
u
r
it
y
f
o
r
b
o
th
u
s
er
s
an
d
o
p
er
ato
r
s
.
T
h
e
g
ate
w
a
y
r
u
n
s
as
a
s
er
v
er
(
o
r
clu
s
ter
o
f
s
er
v
e
r
s
)
t
h
at
p
r
o
v
id
e
ce
n
tr
alize
d
ac
ce
s
s
to
o
n
e
o
r
m
o
r
e
Had
o
o
p
clu
s
t
er
s
.
I
t
is
d
es
ig
n
ed
to
o
b
s
cu
r
e
h
ad
o
o
p
clu
s
ter
to
p
o
lo
g
y
f
r
o
m
o
u
ts
id
e
w
o
r
ld
.
P
lu
g
in
s
f
o
r
h
ad
o
o
p
s
er
v
ices i
n
clu
d
e
s
W
eb
HDFS,
Oo
zie,
Hiv
e,
Hb
ase,
HC
a
talo
g
.
K
n
o
x
[
1
3
]
s
u
p
p
o
r
ts
L
D
A
P
/
A
ct
iv
e
Dir
ec
to
r
y
in
t
eg
r
atio
n
.
I
t
a
u
d
it
s
all
Kn
o
x
-
m
a
n
a
g
ed
g
ate
w
a
y
tr
af
f
ic.
I
t
al
s
o
p
r
o
v
id
es
Ser
v
ice
–
lev
el
a
u
t
h
o
r
izati
o
n
to
h
ad
o
o
p
s
er
v
ices.
I
t
h
as
an
E
n
d
-
to
-
E
n
d
w
ir
e
en
cr
y
p
tio
n
v
ia
S
S
L
.
B
y
d
ef
a
u
lt
Kn
o
x
o
f
f
er
s
SS
L
en
cr
y
p
tio
n
f
r
o
m
t
h
e
clie
n
t
to
th
e
K
n
o
x
g
at
e
w
a
y
[
1
4
]
.
A
SS
L
s
etu
p
is
al
s
o
p
o
s
s
ib
le
b
et
w
ee
n
Kn
o
x
a
n
d
h
ad
o
o
p
s
er
v
ices
[1
5
].
3
.
1
.
K
no
x
-
Arc
hite
cht
ure
T
h
is
s
ec
tio
n
i
n
t
h
e
p
ap
er
s
h
o
w
s
th
e
ar
ch
itect
u
r
e
o
f
Kn
o
x
wh
ich
co
n
s
i
s
ts
o
f
o
n
e
o
r
m
o
r
e
s
er
v
er
s
th
a
t
s
it
o
u
ts
id
e
t
h
e
h
ad
o
o
p
clu
s
ter
.
I
t
is
d
es
ig
n
ed
to
r
ep
lace
SS
H
“
ed
g
e
-
n
o
d
e”
f
o
r
ac
ce
s
s
i
n
g
h
a
d
o
o
p
.
I
t
p
r
o
v
id
es
a
s
in
g
le
p
o
r
t
to
ac
ce
s
s
Had
o
o
p
[
1
6
]
s
er
v
ices
w
it
h
a
d
ef
au
lt
p
o
r
t:
8
4
4
3
.
I
t
is
d
esig
n
ed
to
in
teg
r
ate
w
it
h
Ker
b
er
o
s
&
L
D
A
P
(
L
i
g
h
t
w
ei
g
h
t
Dir
ec
t
o
r
y
A
cc
es
s
P
r
o
to
c
o
l
)
to
h
an
d
le
au
th
e
n
ticatio
n
s
er
v
ice
s
[
2
5
-
27]
.
A
Kn
o
x
‟
i
f
ied
Had
o
o
p
is
s
h
o
w
n
in
Fig
u
r
e
2.
F
ig
u
r
e
3
.
E
x
ten
d
Had
o
o
p
A
P
I
R
ea
ch
w
i
th
KN
OX
3
.
2
.
G
o
a
ls
o
f
K
no
x
[
12
]
Kn
o
x
p
r
o
v
id
es,
a)
p
er
im
e
ter
s
ec
u
r
it
y
[
1
7
]
f
o
r
Had
o
o
p
R
E
ST
A
P
I
‟
s
to
m
a
k
e
Ha
d
o
o
p
s
ec
u
r
ity
ea
s
ier
to
s
et
u
p
an
d
u
s
e.
i.e
.
,
cu
r
l
–
I
–
k
–
u
g
u
e
s
t:
g
u
e
s
t
–
p
as
s
w
o
r
d
–
x
GE
T
\
‟
h
ttp
s
://
lo
ca
lh
o
s
t:8
4
4
3
/g
ate
w
a
y
/
s
an
d
b
o
x
/
w
eb
h
d
f
s
/v
s
/t
m
p
/
L
I
SC
E
N
C
E
?
o
p
=O
P
E
N
„
.
b)
Au
t
h
en
t
icatio
n
[
1
8
]
an
d
to
k
e
n
v
er
i
f
icatio
n
at
th
e
p
er
i
m
eter
b
y
en
ab
li
n
g
a
u
t
h
en
tica
tio
n
in
t
eg
r
atio
n
w
it
h
en
ter
p
r
is
e
an
d
clo
u
d
id
en
tit
y
m
an
a
g
e
m
e
n
t s
y
s
te
m
s
.
c)
Ser
v
ice
le
v
el
au
t
h
o
r
izatio
n
at
t
h
e
p
er
i
m
eter
.
d)
I
t e
x
p
o
s
es a
s
i
n
g
le
U
R
L
h
ier
ar
ch
y
t
h
at
a
g
g
r
e
g
ates
R
E
ST
A
P
I
s
o
f
a
Had
o
o
p
clu
s
ter
.
e)
Kn
o
x
s
ec
u
r
el
y
ex
te
n
d
s
t
h
e
r
ea
ch
o
f
Had
o
o
p
[
1
9
]
A
P
I
S to
an
y
o
n
e
o
n
an
y
d
ev
ice.
f)
Ser
v
es
a
s
a
g
ate
w
a
y
f
o
r
Had
o
o
p
‟
s
R
E
ST
A
P
I
.
Dif
f
er
en
t
R
est
A
P
I
s
v
ar
y
i
n
g
le
v
el
s
o
f
a
u
th
e
n
tica
tio
n
,
au
th
o
r
izatio
n
,
SS
L
an
d
S
SO c
ap
ab
ilit
ies.
g)
I
t a
v
o
id
s
ex
p
o
s
in
g
t
h
e
clu
s
ter
p
o
r
t a
n
d
h
o
s
t n
a
m
e
s
to
all
u
s
er
s
.
Ne
w
A
p
ac
h
e
Kn
o
x
Feat
u
r
es i
n
HDP
2
.
2
:
a)
Kn
o
x
ca
n
b
e
in
s
ta
lled
b
y
u
s
in
g
Am
b
ar
i.
I
t c
an
s
tar
t a
n
d
s
to
p
a
co
n
f
i
g
u
r
atio
n
.
b)
I
t
p
r
o
v
id
es
a
n
e
w
s
u
p
p
o
r
t
f
o
r
:
YARN
R
E
ST
A
P
I
,
HDFS
HA
,
S
S
L
to
H
A
DOOP
[
2
0
]
cl
u
s
ter
s
er
v
ice
s
(
W
E
B
HDFS,
HB
A
SE,
HI
VE
,
OOZ
I
E
)
.
c)
I
t h
as K
n
o
x
Ma
n
a
g
e
m
e
n
t RES
T
A
P
I
.
d)
I
n
teg
r
ate
s
w
it
h
A
p
ac
h
e
R
a
n
g
e
r
f
o
r
s
er
v
ice
lev
el
Au
t
h
o
r
izati
o
n
.
3
.
3
.
K
no
x
-
Rest
H
iera
rc
hies
I
t
p
r
o
v
id
es
a
s
in
g
le
R
E
ST
h
ier
ar
ch
y
f
o
r
all
Had
o
o
p
s
er
v
ices.
No
r
m
al
H
ADOO
P
[
2
1
]
h
a
s
d
i
f
f
er
e
n
t
HOST
S,
d
if
f
er
e
n
t
P
OR
T
S
an
d
e
x
p
o
s
es
t
h
e
d
etails
ab
o
u
t
t
h
e
cl
u
s
ter
to
p
o
lo
g
y
v
iz.
,
h
ttp
://
n
a
m
en
o
d
e:5
0
0
7
0
/w
eb
h
d
f
s
/,"
h
ttp
://
n
a
m
en
o
d
e:5
0
0
7
0
/
w
eb
h
d
f
s
/..
,
h
ttp
://
h
iv
e
n
o
d
e:1
0
0
0
1
/clis
er
v
ice"
.
.
,
"
h
ttp
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l
.
1
2
,
No
.
1
,
Octo
b
er
201
8
:
1
0
7
–
116
110
://n
a
m
e
n
o
d
e:5
0
0
7
0
/
w
eb
h
d
f
s
/..
,
h
ttp
://
h
iv
e
n
o
d
e:1
0
0
0
1
/clis
er
v
ice"
h
ttp
://h
i
v
en
o
d
e:1
0
0
0
1
/clis
er
v
ice
,
h
ttp
://l
o
ca
l
h
o
s
t:1
1
0
0
0
/o
o
zie
.
W
h
er
ea
s
K
n
o
x
h
a
s
o
n
e
H
OST
,
o
n
e
P
OR
T
,
C
o
n
s
i
s
te
n
t
Stru
ct
u
r
e
v
iz.
,
h
ttp
s
:/
/k
n
o
x
:8
4
4
3
/
w
eb
h
d
f
s
,
h
ttp
s
://
k
n
o
x
:8
4
4
3
/h
iv
e
,
h
ttp
s
:
//
k
n
o
x
:8
4
4
3
/o
o
zie
.
Kn
o
x
is
o
n
l
y
e
f
f
ec
t
iv
e
w
it
h
p
r
o
p
er
p
er
im
eter
s
ec
u
r
it
y
[
2
2
]
co
n
f
i
g
u
r
ed
.
Kn
o
x
‟
i
f
ied
Had
o
o
p
clu
s
ter
is
i
n
Fi
g
u
r
e
3.
Fig
u
r
e
4
.
Kn
o
x
A
r
ch
it
ec
t
u
r
e
s
h
o
w
in
g
R
E
ST
h
ier
ar
ch
ies
Step
s
to
h
av
e
A
p
ac
h
e
Kn
o
x
u
p
an
d
r
u
n
n
in
g
ag
a
in
s
t a
Had
o
o
p
clu
s
ter
:
1.
Ver
if
y
s
y
s
te
m
r
eq
u
ir
e
m
e
n
t
s
.
2.
Do
w
n
lo
ad
a
v
ir
tu
al
m
ac
h
i
n
e
(
VM
)
w
it
h
Had
o
o
p
.
3.
Do
w
n
lo
ad
ap
ac
h
e
Kn
o
x
g
ate
w
a
y
.
4.
Star
t th
e
v
ir
tu
al
m
ac
h
i
n
e
w
it
h
Had
o
o
p
.
5.
I
n
s
tall K
n
o
x
.
6.
Star
t th
e
L
D
A
P
e
m
b
ed
d
ed
w
it
h
in
Kn
o
x
.
7.
Star
t th
e
K
n
o
x
g
ate
w
a
y
.
8.
Do
Had
o
o
p
w
it
h
Kn
o
x
.
T
o
g
et
a
f
ile
i
n
HDF
S v
ia
KN
OX
w
e
u
s
e,
C
u
r
l
–
I
–
k
–
u
g
u
es
t:g
u
es
t
–
p
ass
w
o
r
d
–
x
GE
T
\
„
h
ttp
s
://l
o
ca
l
h
o
s
t:8
4
4
3
/g
ate
w
a
y
/s
a
n
d
b
o
x
/
w
eb
h
d
f
s
/
v
1
/t
m
p
/L
I
C
E
NSE
o
p
=O
P
E
N‟
.
W
h
en
c
u
r
l c
o
m
m
a
n
d
is
u
s
ed
Ker
b
er
o
s
[
2
3
]
,
L
D
A
P
s
er
v
ices
[
2
4
]
ca
n
b
e
in
teg
r
ated
with
KNO
X.
3
.
4
.
K
no
x
Co
nfig
ura
t
io
n Usin
g
A
m
ba
ri
Go
to
Am
b
ar
i,
clic
k
o
n
A
d
d
s
er
v
ice
a
n
d
s
et
u
p
K
n
o
x
b
y
s
e
le
ctin
g
K
n
o
x
&
clic
k
o
n
n
e
x
t
a
s
s
h
o
w
n
i
n
Fig
u
r
e
5
.
Fig
u
r
e
5
.
Star
tin
g
Kn
o
x
Gate
w
a
y
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
Ha
d
o
o
p
S
ec
u
r
ity
C
h
a
llen
g
es
A
n
d
I
ts
S
o
l
u
tio
n
Usi
n
g
K
N
OX
(
S
ir
i
s
h
a
.
N
)
111
T
h
er
e
w
ill
b
e
a
ce
n
tr
alize
d
m
aster
s
er
v
er
i.e
.
,
K
n
o
x
Gate
wa
y
,
s
elec
t
it
a
n
d
m
o
r
e
g
ate
w
a
y
s
ca
n
al
s
o
b
e
s
elec
ted
if
r
eq
u
ir
ed
b
y
s
ele
ctin
g
th
e
d
r
o
p
d
o
w
n
lis
t a
s
s
h
o
w
n
i
n
th
e
F
ig
u
r
e
6
.
Fig
u
r
e
6
.
A
s
s
i
g
n
i
n
g
Kn
o
x
Gat
e
w
a
y
No
w
,
g
o
to
cu
s
to
m
ized
s
er
v
ic
e
s
w
h
er
e
u
s
er
h
as
to
g
i
v
e
a
Kn
o
x
Ma
s
ter
s
ec
r
et
i
n
p
u
t
as
s
h
o
w
n
in
Fig
u
r
e
7
.
Fig
u
r
e
7
.
Kn
o
x
Ma
s
ter
s
ec
r
et
I
n
A
d
d
s
er
v
ices
W
izar
d
,
s
el
ec
t
th
e
co
n
f
i
g
u
r
e
id
e
n
titi
e
s
w
h
er
e
w
e
h
a
v
e
to
co
n
f
i
g
u
r
e
Kn
o
x
b
y
s
elec
ti
n
g
t
h
e
ch
ec
k
b
o
x
K
n
o
x
a
s
s
h
o
w
n
i
n
Fi
g
u
r
e
8
.
Fig
u
r
e
8
.
Kn
o
x
s
er
v
ice
w
izar
d
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l
.
1
2
,
No
.
1
,
Octo
b
er
201
8
:
1
0
7
–
116
112
I
n
th
i
s
co
n
f
ig
u
r
atio
n
s
w
i
n
d
o
w
j
u
s
t selec
t p
r
o
ce
ed
an
y
w
a
y
to
d
ep
lo
y
K
n
o
x
as s
h
o
w
n
in
F
ig
u
r
e
9
.
Fig
u
r
e
9
.
C
o
n
f
ig
u
r
atio
n
o
f
d
if
f
er
en
t ser
v
ice
s
No
w
,
K
n
o
x
w
ill b
e
d
ep
lo
y
ed
o
n
ce
click
i
n
g
o
n
d
ep
lo
y
b
u
tto
n
as s
h
o
w
n
i
n
Fi
g
u
r
e
10
.
Fig
u
r
e
10
.
Dep
lo
y
i
n
g
t
h
e
s
er
v
i
ce
s
On
ce
d
ep
lo
y
ed
n
o
w
,
it
ta
k
e
s
s
o
m
e
ti
m
e
to
i
n
s
tall
all
t
h
e
s
e
r
v
ices
a
n
d
its
co
m
p
o
n
en
ts
o
n
th
e
cl
u
s
ter
as sh
o
w
n
i
n
Fi
g
u
r
e
1
1
.
Fig
u
r
e
1
1
.
Kn
o
x
co
m
p
o
n
e
n
ts
Af
ter
d
ep
lo
y
i
n
g
all
t
h
e
s
er
v
ice
s
ar
e
n
o
w
co
n
f
i
g
u
r
ed
u
s
in
g
A
m
b
ar
i
.
I
n
s
tallatio
n
i
s
s
u
cc
e
s
s
a
f
ter
d
o
in
g
all
th
e
ab
o
v
e
s
aid
p
r
o
ce
s
s
as s
h
o
w
n
i
n
Fi
g
u
r
e
1
2
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
Ha
d
o
o
p
S
ec
u
r
ity
C
h
a
llen
g
es
A
n
d
I
ts
S
o
l
u
tio
n
Usi
n
g
K
N
OX
(
S
ir
i
s
h
a
.
N
)
113
Fig
u
r
e
1
2
.
I
n
s
tallatio
n
s
u
cc
e
s
s
3
.
5
.
Rest
a
r
t
ing
s
er
v
ices in
K
no
x
us
i
ng
a
m
ba
ri
Un
les
s
all
t
h
e
s
er
v
ice
s
ar
e
r
est
ar
ted
,
d
esire
d
r
esu
lts
ca
n
n
o
t
b
e
o
b
tain
ed
.
I
f
it
s
h
o
w
s
a
n
o
r
an
g
e
c
y
cles
n
ea
r
th
e
s
er
v
ice
s
m
e
n
u
,
th
en
e
n
s
u
r
e
th
at
all
th
e
s
er
v
ices
h
as
t
o
b
e
r
estar
ted
.
T
o
d
o
th
at
click
o
n
o
r
an
g
e
cy
c
les
-
>r
estar
t
-
>r
estar
t
all
Af
f
ec
ted
-
>c
o
n
f
ir
m
r
estar
t
A
ll.
So
th
at,
all
th
e
s
er
v
ice
s
w
ill
g
et
r
esta
r
ted
.
On
ce
Kn
o
x
i
s
in
s
ta
lled
,
lo
g
i
n
to
t
h
e
h
o
s
t
wh
er
e
K
n
o
x
i
s
b
ee
n
s
et
u
p
.
I
t
s
h
o
w
s
t
h
e
$
i.e
.
,
[
ec
2
-
u
s
er
@
ip
-
172
-
31
-
53
-
3
7
~]
$
.
Af
ter
th
is
u
s
e
t
h
e
f
o
llo
w
i
n
g
co
m
m
an
d
s
to
s
ee
t
h
e
d
ef
i
n
ed
p
r
o
p
er
ties
f
o
r
th
e
Kn
o
x
Gate
w
a
y
.
$
C
d
/etc/k
n
o
x
/co
n
f
$
ls
–
ltr
T
h
ese
co
m
m
a
n
d
s
s
h
o
w
s
g
ate
w
a
y
-
s
ite.
x
m
l,
w
h
ic
h
i
s
r
ep
r
esen
ted
in
Fi
g
u
r
e
.1
3
,1
4
.
Kn
o
x
to
p
o
lo
g
ies
Fig
u
r
e
1
3
.
Kn
o
x
co
n
f
ig
u
r
atio
n
s
g
ate
w
a
y
s
ite.
x
m
l,
ad
m
i
n
.
x
m
l,
d
ef
au
lt.
x
m
l
Fig
u
r
e
1
4
.
Kn
o
x
-
g
ate
w
a
y
s
ite.
x
m
l
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l
.
1
2
,
No
.
1
,
Octo
b
er
201
8
:
1
0
7
–
116
114
Fig
u
r
e
1
5
.
Kn
o
x
-
ad
m
i
n
.
x
m
l
Fig
u
r
e
1
6
.
Def
au
lt.
x
m
l
Fig
u
r
e
1
7
.
Kn
o
x
-
Am
b
ar
i
3
.
6
.
Va
lid
a
t
ing
t
he
Serv
ices
t
ha
t
a
re
Su
pp
o
rt
ed
b
y
K
no
x
Valid
atio
n
ca
n
b
e
d
o
n
e
u
s
in
g
C
d
/etc/k
n
o
x
/co
n
f
f
o
r
g
ate
w
a
y
.
s
ite.
x
m
l
an
d
to
p
o
lo
g
ies
h
as
to
b
e
u
s
ed
f
o
r
v
alid
ati
n
g
ad
m
in
.
x
m
l a
n
d
d
ef
au
lt.
x
m
l.
T
h
en
ex
ec
u
te
t
h
e
co
m
m
a
n
d
Vie
w
u
s
er
s
.
ld
if
,
a
n
d
th
e
n
C
u
r
l
–
I
–
v
–
k
ad
m
i
n
:ad
m
in
–
p
ass
w
o
r
d
–
x
GE
T
„
h
ttp
s
://i
p
-
172
-
31
-
53
-
3
7
.
ec
2
.
in
ter
n
al:8
4
4
3
/g
ate
w
a
y
/
h
d
p
2
3
/OOZ
I
E
/v
1
/ad
m
in
/b
u
ild
-
v
er
s
io
n
‟
.
B
y
u
s
i
n
g
cu
r
l c
o
m
m
a
n
d
all
th
e
s
er
v
ices o
f
Kn
o
x
h
as to
b
e
v
alid
ated
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
Ha
d
o
o
p
S
ec
u
r
ity
C
h
a
llen
g
es
A
n
d
I
ts
S
o
l
u
tio
n
Usi
n
g
K
N
OX
(
S
ir
i
s
h
a
.
N
)
115
4
.
CO
NCLUS
I
O
N
T
h
is
p
ap
er
s
h
o
w
s
t
h
at
t
h
e
s
ec
u
r
it
y
r
is
k
s
s
u
ch
as
i
n
s
u
f
f
icie
n
t
au
t
h
e
n
ti
ca
tio
n
,
No
p
r
iv
ac
y
,
N
o
in
te
g
r
it
y
,
ar
b
itra
r
y
co
d
e
e
x
ec
u
tio
n
ar
e
a
ll
t
h
e
p
ar
t
o
f
Ker
b
er
o
s
.
So
,
K
n
o
x
is
in
tr
o
d
u
ce
d
in
t
h
is
p
ap
er
to
o
v
er
co
m
e
th
e
s
e
s
ec
u
r
it
y
r
is
k
s
.
So
f
t
w
ar
e‟
s
s
u
c
h
as
Am
b
ar
i,
R
s
i
n
g
h
,
P
u
p
p
et,
C
h
e
f
ar
e
th
e
au
to
m
ated
s
o
f
t
w
ar
e
‟
s
f
o
r
w
o
r
k
i
n
g
w
it
h
1
5
0
n
o
d
es
o
r
m
o
r
e.
4
0
0
0
to
6
0
0
0
n
a
m
e
n
o
d
e
clu
s
ter
s
ca
n
b
e
f
o
r
m
ed
u
s
in
g
th
e
s
e
s
o
f
t
w
ar
e
‟
s
a
n
d
1
0
0
0
0
n
a
m
e
n
o
d
es
ca
n
b
e
f
o
r
m
ed
u
s
in
g
p
u
p
p
et.
I
n
s
tallatio
n
o
f
am
b
ar
i
i
s
s
h
o
w
n
i
n
v
er
y
d
etai
l
in
th
i
s
p
ap
er
an
d
w
o
r
k
i
n
g
w
ill b
e
s
h
o
w
n
i
n
f
u
t
u
r
e
w
o
r
k
.
RE
F
E
R
E
NC
E
S
[1
]
N.S
iri
sh
a
,
K.
V
.
D.Kiran
,
“
P
ro
tec
ti
o
n
Of
En
c
ro
a
c
h
m
e
n
t
On
Big
d
a
ta
As
p
e
c
ts”
,
In
tern
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
M
e
c
h
a
n
ica
l
En
g
in
e
e
rin
g
a
n
d
T
e
c
h
n
o
lo
g
y
(IJ
M
ET
)
,
Vo
lu
m
e
8
,
Iss
u
e
7
,
Ju
ly
2
0
1
7
,
p
p
.
5
5
0
–
5
5
8
.
[2
]
P
riy
a
P
.
S
h
a
rm
a
,
Ch
a
n
d
ra
k
a
n
t
P
.
Na
v
d
e
ti
,
“
S
e
c
u
rin
g
Big
Da
ta
H
a
d
o
o
p
:
A
Re
v
ie
w
o
f
S
e
c
u
rit
y
Is
s
u
e
s,
T
h
re
a
ts
a
n
d
S
o
lu
ti
o
n
”
,
(IJCSIT
)
In
tern
a
ti
o
n
a
l
Jo
u
rn
a
l
o
f
Co
m
p
u
ter
S
c
ien
c
e
a
n
d
In
f
o
rm
a
ti
o
n
T
e
c
h
n
o
lo
g
ies
,
Vo
l.
5
(
2
)
,
2
0
1
4
,
2
1
2
6
-
2
1
3
1
,
IS
S
N:
0
9
7
5
-
9
6
4
6
.
[3
]
T
.
K.Da
s
,
P
.
M
o
h
a
n
Ku
m
a
r,
"
BI
G
Da
ta
A
n
a
l
y
ti
c
s:
A
F
ra
m
e
w
o
r
k
f
o
r
Un
stru
c
tu
re
d
Da
ta
A
n
a
ly
sis
",
In
tern
a
ti
o
n
a
l
Jo
u
rn
a
l
o
f
En
g
in
e
e
rin
g
a
n
d
T
e
c
h
n
o
lo
g
y
(IJET
)
,
IS
S
N :
0
9
7
5
-
4
0
2
4
V
o
l
5
N
o
1
F
e
b
-
M
a
r
2
0
1
3
.
[4
]
S
a
n
jay
Ra
th
e
e
,"
Big
Da
ta
a
n
d
Ha
d
o
o
p
w
it
h
c
o
m
p
o
n
e
n
ts
li
k
e
F
lu
m
e
,
P
ig
,
Hi
v
e
a
n
d
Ja
q
l
”,
In
ter
n
a
t
io
n
a
l
C
o
n
f
e
re
n
c
e
o
n
Cl
o
u
d
,
Big
Da
ta an
d
T
ru
st 2
0
1
3
,
No
v
1
3
-
15
.
[5
]
P
riy
a
P
.
S
h
a
rm
a
,
Ch
a
n
d
ra
k
a
n
t
P
.
Na
v
d
e
ti
,
"
S
e
c
u
rin
g
Big
Da
ta
Ha
d
o
o
p
:
A
Re
v
ie
w
o
f
S
e
c
u
rit
y
Iss
u
e
s,
T
h
re
a
ts
a
n
d
S
o
lu
ti
o
n
",
(IJCSIT
)
In
tern
a
ti
o
n
a
l
Jo
u
rn
a
l
o
f
Co
m
p
u
ter
S
c
ien
c
e
a
n
d
In
f
o
rm
a
ti
o
n
T
e
c
h
n
o
lo
g
ies
,
Vo
l.
5
(
2
)
,
2
0
1
4
,
2
1
2
6
-
2
1
3
1
.
[6
]
V
a
rsh
a
B.
Bo
b
a
d
e
,
"
S
u
rv
e
y
P
a
p
e
r
o
n
Big
Da
ta
a
n
d
Ha
d
o
o
p
",
In
t
e
rn
a
ti
o
n
a
l
Re
se
a
rc
h
Jo
u
rn
a
l
o
f
En
g
in
e
e
rin
g
a
n
d
T
e
c
h
n
o
lo
g
y
(IRJE
T
)
e
-
IS
S
N:
2
3
9
5
-
0
0
5
6
V
o
l
u
m
e
:
0
3
Iss
u
e
:
0
1
|
Ja
n
-
2
0
1
6
[7
]
S
a
n
jay
R
a
th
e
e
,
"
Big
Da
ta
a
n
d
H
a
d
o
o
p
w
it
h
c
o
m
p
o
n
e
n
ts
li
k
e
F
lu
m
e
,
P
ig
,
Hiv
e
a
n
d
Ja
q
l"
,
In
tern
a
t
io
n
a
l
Co
n
f
e
re
n
c
e
o
n
Cl
o
u
d
,
Big
Da
ta an
d
T
ru
st 2
0
1
3
,
No
v
1
3
-
1
5
,
RG
P
V
.
[8
]
S
a
ra
n
y
a
,
S
.
,
”
D
y
n
a
m
ic
P
re
c
lu
sio
n
o
f
En
c
ro
a
c
h
m
e
n
t
in
Ha
d
o
o
p
Distrib
u
ted
F
il
e
S
y
ste
m
”
,
P
ro
c
e
d
ia
Co
m
p
u
ter
S
c
ien
c
e
5
0
(
2
0
1
5
):
5
3
1
-
5
3
6
.
[9
]
Dr.
M
d
.
T
a
b
re
z
Qu
a
sim
a
n
d
M
o
h
a
m
m
a
d
.
M
e
ra
j,
“
Big
Da
ta
S
e
c
u
rit
y
a
n
d
P
riv
a
c
y
:
A
S
h
o
rt
Re
v
iew
”
,
In
tern
a
ti
o
n
a
l
Jo
u
rn
a
l
o
f
M
e
c
h
a
n
ica
l
En
g
in
e
e
ri
n
g
a
n
d
T
e
c
h
n
o
lo
g
y
,
8
(4
),
2
0
1
7
,
p
p
.
4
0
8
-
4
1
2
.
[1
0
]
V
in
a
y
S
h
u
k
la,
“
Ha
d
o
o
p
S
e
c
u
rit
y
:
T
o
d
a
y
a
n
d
T
o
m
o
rro
w”
,
h
tt
p
s:
//
h
o
rto
n
w
o
rk
s.co
m
/b
lo
g
/h
a
d
o
o
p
-
se
c
u
rit
y
-
to
d
a
y
-
a
n
d
-
to
m
o
rro
w
,
De
c
e
m
b
e
r
0
9
,
2
0
1
3
.
[1
1
]
P
ra
c
h
i
R.
G
a
wa
li
,
Ro
sh
a
n
i
T
a
lma
le,
Ra
jes
h
Ba
b
u
,
"
Ha
d
o
o
p
S
e
c
u
rit
y
-
A
Re
v
ie
w"
,
In
tern
a
ti
o
n
a
l
Jo
u
r
n
a
l
o
f
In
n
o
v
a
ti
v
e
Re
se
a
rc
h
in
Co
m
p
u
ter an
d
Co
m
m
u
n
ica
ti
o
n
E
n
g
in
e
e
rin
g
,
V
o
l.
3
,
Iss
u
e
1
0
,
Oc
to
b
e
r
2
0
1
5
.
[1
2
]
Ho
rto
n
w
o
rk
s “Te
c
h
n
ica
l
P
re
v
iew
f
o
r
A
p
a
c
h
e
Kn
o
x
G
a
te
w
a
y
”
[1
3
]
"
KN
OX
"
,
A
p
a
c
h
e
Kn
o
x
G
a
te
wa
y
0
.
9
.
x
Us
e
r‟s G
u
id
e
,
h
tt
p
s:
//
k
n
o
x
.
a
p
a
c
h
e
.
o
rg
/b
o
o
k
s/k
n
o
x
-
0
-
9
-
0
/u
se
r
-
g
u
id
e
.
h
tm
l.
[1
4
]
"
HD
P
Do
c
u
m
e
n
tatio
n
"
,
h
tt
p
s://
d
o
c
s.h
o
rto
n
w
o
rk
s.co
m
/HDP
Do
c
u
m
e
n
ts/HDP2
/HD
P
-
2
.
3
.
0
/
b
k
-
k
n
o
w
-
G
a
t
e
w
a
y
-
A
d
m
in
-
G
u
id
e
/co
n
ten
t.
[1
5
]
Ib
ra
h
imA
b
a
k
e
r,
T
a
r
g
io
Ha
sh
e
m
a
I
b
ra
r,
Ya
q
o
o
b
,
No
rBa
d
r
u
lA
n
u
a
r,
S
a
li
m
a
h
M
o
k
h
tar,
A
b
d
u
ll
a
h
G
a
n
ia,
S
a
m
e
e
Ullah
Kh
a
n
,
"
T
h
e
rise
o
f
“
b
ig
d
a
ta”
o
n
c
lo
u
d
c
o
m
p
u
ti
n
g
:
Re
v
ie
w
a
n
d
o
p
e
n
re
se
a
rc
h
issu
e
s"
In
f
o
r
m
a
ti
o
n
S
y
ste
m
s
4
7
(2
0
1
5
)
9
8
–
1
1
5
.
[1
6
]
S
e
re
f
sa
g
iro
g
lu
a
n
d
D
u
y
g
u
S
INA
NC
,
“
Big
D
a
ta:
A
Re
v
ie
w
Co
ll
a
b
o
ra
ti
o
n
T
e
c
h
n
o
l
o
g
ies
a
n
d
S
y
st
e
m
s
(CT
S
),
2
0
1
3
In
tern
a
ti
o
n
a
l
C
o
n
f
e
re
n
c
e
,
M
a
y
2
0
1
3
“
[1
7
]
V
icto
r
L
.
Vo
y
d
o
c
k
a
n
d
S
te
p
h
e
n
T
.
Ke
n
t
“
S
e
c
u
rit
y
m
e
c
h
a
n
is
m
s
in
h
ig
h
-
lev
e
l
n
e
tw
o
rk
p
ro
t
o
c
o
ls.
A
CM
Co
m
p
u
t.
S
u
rv
.
1
9
8
3
”
.
[1
8
]
S
u
ji
th
a
,
G
.
,
e
t
a
l.
Im
p
ro
v
in
g
se
c
u
rit
y
o
f
p
a
ra
ll
e
l
a
l
g
o
rit
h
m
u
sin
g
k
e
y
e
n
c
r
y
p
ti
o
n
tec
h
n
iq
u
e
.
In
f
o
rm
a
ti
o
n
T
e
c
h
n
o
l
o
g
y
Jo
u
rn
a
l
1
2
.
1
2
(2
0
1
3
):
2
3
9
8
.
[1
9
]
Co
h
e
n
,
Ja
so
n
C
.
,
a
n
d
S
u
b
ra
ta
Ac
h
a
r
y
a
.
”
To
w
a
rd
s
a
tru
ste
d
HD
F
S
sto
ra
g
e
p
latf
o
rm
:
M
it
ig
a
ti
n
g
th
re
a
ts
to
Ha
d
o
o
p
in
f
ra
stru
c
tu
re
s
u
sin
g
h
a
rd
w
a
r
e
-
a
c
c
e
lera
ted
e
n
c
r
y
p
ti
o
n
w
it
h
T
P
M
-
ro
o
ted
k
e
y
p
ro
tec
ti
o
n
”
.
Jo
u
rn
a
l
o
f
In
f
o
r
m
a
ti
o
n
S
e
c
u
rit
y
a
n
d
A
p
p
li
c
a
ti
o
n
s
1
9
.
3
(
2
0
1
4
):
2
2
4
-
2
4
4
.
[2
0
]
Ha
sh
e
m
,
Ib
ra
h
im
A
b
a
k
e
r
T
a
rg
io
,
e
t
a
l.
T
h
e
rise
o
f
“
b
ig
d
a
ta”
o
n
c
l
o
u
d
c
o
m
p
u
ti
n
g
:
Re
v
iew
a
n
d
o
p
e
n
re
se
a
rc
h
issu
e
s.
In
f
o
rm
a
ti
o
n
S
y
ste
m
s 4
7
(2
0
1
5
)
:
9
8
-
1
1
5
.
[2
1
]
Je
o
n
g
,
Yo
o
n
-
S
u
,
a
n
d
Yo
n
g
-
T
a
e
Kim
.
A
to
k
e
n
-
b
a
se
d
a
u
th
e
n
ti
c
a
ti
o
n
se
c
u
rit
y
sc
h
e
m
e
f
o
r
Ha
d
o
o
p
d
istri
b
u
ted
f
il
e
s
y
ste
m
u
sin
g
e
ll
ip
ti
c
c
u
rv
e
c
r
y
p
to
g
ra
p
h
y
.
Jo
u
rn
a
l
o
f
Co
m
p
u
ter
V
ir
o
lo
g
y
a
n
d
Ha
c
k
in
g
Tec
h
n
iq
u
e
s
1
1
.
3
(
2
0
1
5
):
1
3
7
-
1
4
2
.
[2
2
]
Je
o
n
g
,
Yo
o
n
-
S
u
,
S
e
u
n
g
-
S
o
o
S
h
i
n
,
a
n
d
Ku
n
-
He
e
Ha
n
.
Hig
h
-
d
im
e
n
ti
o
n
a
l
d
a
ta
a
u
t
h
e
n
ti
c
a
ti
o
n
p
ro
t
o
c
o
l
b
a
se
d
o
n
h
a
sh
c
h
a
in
f
o
r
Ha
d
o
o
p
sy
ste
m
s.
Clu
ste
r
Co
m
p
u
ti
n
g
1
9
.
1
(2
0
1
6
):
4
7
5
-
4
8
4
.
[2
3
]
S
a
ra
lad
e
v
i,
B.
,
e
t
a
l.
Bi
g
D
a
ta
a
n
d
Ha
d
o
o
p
-
A
stu
d
y
in
se
c
u
rit
y
p
e
rsp
e
c
ti
v
e
.
P
ro
c
e
d
ia
c
o
m
p
u
ter
sc
i
e
n
c
e
5
0
(2
0
1
5
):
596
-
6
0
1
.
[2
4
]
Dr.
M
d
.
T
a
b
re
z
Qu
a
si
m
a
n
d
M
o
h
a
m
m
a
d
.
M
e
ra
j,
Bi
g
Da
t
a
S
e
c
u
rit
y
a
n
d
P
riv
a
c
y
:
A
S
h
o
rt
Re
v
iew
,
In
tern
a
ti
o
n
a
l
Jo
u
rn
a
l
o
f
M
e
c
h
a
n
ica
l
En
g
in
e
e
ri
n
g
a
n
d
T
e
c
h
n
o
lo
g
y
,
8
(4
),
2
0
1
7
,
p
p
.
4
0
8
-
4
1
2
.
[2
5
]
S
u
b
a
sh
i
n
i,
M
.
M
.
,
Da
s,
S
.
,
He
b
le,
S
.
,
Ra
j,
U.
,
Ka
rth
ik
,
R.
,
“
In
tern
e
t
o
f
th
i
n
g
s
b
a
se
d
w
irele
ss
p
lan
t
se
n
so
r
f
o
r
sm
a
rt
f
a
r
m
in
g
”
,
In
d
o
n
e
sia
n
J
o
u
r
n
a
l
o
f
El
e
c
tri
c
a
l
En
g
in
e
e
rin
g
a
n
d
Co
m
p
u
ter
S
c
ien
c
e
,
Vo
l.
1
0
,
Iss
u
e
2
,
p
p
.
4
5
6
-
4
6
8
,
(2
0
1
8
).
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l
.
1
2
,
No
.
1
,
Octo
b
er
201
8
:
1
0
7
–
116
116
[2
6
]
Na
g
a
r
a
ju
,
J.,
J
y
o
th
i,
K.,
Ka
rth
ik
,
R.
,
Bh
a
sk
a
ra
R
e
d
d
y
,
P
.
,
V
u
c
h
a
,
M
.
,
“
Distrib
u
te
d
o
p
t
im
a
l
r
e
la
y
se
l
e
c
ti
o
n
in
w
irele
ss
se
n
so
r
n
e
tw
o
rk
s”
,
In
d
o
n
e
sia
n
Jo
u
rn
a
l
o
f
El
e
c
tri
c
a
l
En
g
in
e
e
rin
g
a
n
d
Co
m
p
u
ter
S
c
ien
c
e
,
V
o
l
.
7
,
Iss
u
e
1
,
p
p
.
71
-
7
4
,
(2
0
1
7
).
[2
7
]
Ra
n
ji
th
,
S
.
,
S
h
re
y
a
s,
P
ra
d
e
e
p
Ku
m
a
r,
K.,
Ka
rth
ik
,
R.
,
“
A
u
to
m
a
ti
c
b
o
rd
e
r
a
lert
s
y
ste
m
f
o
r
f
ish
e
r
m
e
n
u
sin
g
G
P
S
a
n
d
G
S
M
tec
h
n
iq
u
e
s”
,
In
d
o
n
e
sia
n
Jo
u
rn
a
l
o
f
El
e
c
tri
c
a
l
En
g
in
e
e
rin
g
a
n
d
Co
m
p
u
ter
S
c
ien
c
e
,
V
o
l.
7
,
Iss
u
e
1
,
p
p
.
8
4
-
8
9
,
(2
0
1
7
).
Evaluation Warning : The document was created with Spire.PDF for Python.