Analysis of Big Data Security Practices

被引:0
作者
Revathy, P.
Mukesh, Rajeswari
机构
来源
PROCEEDINGS OF THE 2017 3RD INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT) | 2017年
关键词
Big Data; Hadoop; Security Measures; Hadoop Security Tools; Hadoop Tools-Security Comparision;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In modern world, huge amount of data is common across all businesses which aim to unlock new economy from these sources. Hadoop was developed to analyze large scale data repository in a parallel computing architecture. The main task in this process is to handle this "Big Data" by applying proper strategies. So, present industry is focusing on the methods in which this "Big Data" can be used for their business growth. There's no suspicion that the setup of Data Lake on hadoop can provide a new way of analytics and intuition analysis. Beyond experimentations and POCs, today Hadoop is considered more into production. As we are moving towards the stage where Hadoop is considered for real-time production scenarios and major chunk of the production data is normally sensitive, or subject to many control measures, it becomes high priority to consider the security aspects in hadoop before deciding on Hadoop installation for any enterprise. This paper evaluates various issues in Hadoop ecosystem and its popular distributions by top big data players in the market. It further intends to investigate and compare the current security features being provided in those big data distributions along with other open source big data security solutions to help in building secure big data environment.
引用
收藏
页码:264 / 267
页数:4
相关论文
共 17 条
  • [1] [Anonymous], WELC AP HAD
  • [2] Cloud Security Alliance, 2012, TOP 10 BIG DAT SEC P
  • [3] Cloud Security Alliance, 2014, BIG DAT TAX
  • [4] Cloud Security Alliance, 2013, BIG DAT AN SEC INT
  • [5] Cloudera, 2016, TECHNICAL REPORT
  • [6] Gao Yun, 2015, HADDLE FRAMEWORK INV
  • [7] Gupta Varun, 2009, CHINESE WALL SECURIT
  • [8] Keerthi B., 2012, IRESIGN IMPLEMENTATI, V335, P408, DOI [10.1007/978-3-642-34135-9_40, DOI 10.1007/978-3-642-34135-9_40]
  • [9] Kim Su-Hyun, 2015 10 INT C BROADB
  • [10] Li H., 2009, TECHNICAL REPORT