SEHadoop Delegation Token
We designed SEHadoop Delegation Token to fix the lack
of fine-grained access control vulnerability. SEHadoop Delegation
Token must include fine-grained access control to allow a
Name Node to restrict the content that the process can access
when a Delegation Token is used. A Name Node creates a
Delegation Token but does not know the fine-grained access
control information. Therefore we propose to create SEHadoop
Delegation Token in two steps. First, SEHadoop Delegation
Token is created by a Name Node without fine-grained access
control information. It carries data access authorization information
and can be used then to generate fine-grained access
control SEHadoop Delegation Tokens in the next step. Second,
a process, which has fine-grained access control information
(e.g. Job Client), uses the SEHadoop Delegation Token to
create multiple Delegation Tokens and adds fine-grained access
control information into them. At the end, the Name Node must
be able to verify all SEHadoop Delegation Tokens regardless