Security Process in Hadoop Using Diverse Approach

Authors

  • Dr. A. Antony Prakash  Department of Information Technology, St. Joseph’s college, Trichy, Tamilnadu, India

DOI:

https://doi.org//10.32628/CSEIT239023

Keywords:

Encryption, Decryption, Knox, Ranger, Kerberos, Apache sentry

Abstract

Today, data is one of the most important assets for nearly every sector of industry. Advances in information technology and widespread growth in various fields such as business, engineering, medicine, and scientific research have resulted in an explosion of data. This data explosion presents new challenges that traditional methods cannot handle. One of the biggest concerns of our time concerns the security and protection of sensitive information. In today's Big Data era, where organizations collect, analyse, and make decisions based on analysis of massive datasets from various sources, security in this process becomes more and more important. At the same time, more and more organizations need to enforce access controls and privacy restrictions on these records to meet regulatory requirements such as HIPAA and other privacy laws. Network security breaches by internal and external attackers are on the rise, often taking months to discover, and those affected pay the price. Organizations that fail to properly control access to records face lawsuits, negative publicity, and fines.

References

  1. R. Dontha, “The origins of big data “, February 2017 , Accessed 2nd Jan 2019.
  2. I.A.T. Hashem, et al. “The rise of "big data" on cloud computing”, review and open research issues Inf Syst (2015), pp. 98-115.
  3. J.S. Hurwitz, A. Nugent, F. Halper, M. Kaufman, “Big data for dummies wiley” , USA (2013).
  4. S. Sharma “Vulnerability introducing V of big data”,july 2017, Accessed 2nd Jan 2019.
  5. H. Ye, X. Cheng, M. Yuan, L. Xu, J. Gao, C. Cheng, “A survey of security and privacy in big data”. 2016
  6. Pradeep Adluru, Srikari Sindhoori Datla, Xiaowen Zhang, “Hadoop Eco System for Big Data Security and Privacy” 978-1- 4577-1343-9/12/$26.00 ©2015 IEEE.
  7. Youssef Gahi, Mouhcine Guennoun, and Hussein T. Mouftah “Big Data Analytics: Security and Privacy Challenges” IEEE  Symposium on Computers and Communication (ISCC), 2016.
  8. Chao YANG, Weiwei LIN, Mingqi LIU “A Novel Triple  Encryption Scheme for Hadoop-based Cloud Data Security” Fourth  International Conference on Emerging Intelligent Data and Web Technologies, IEEE 2013 DOI 10.1109/EIDWT.2013.
  9. Owen O‘Malley, Kan Zhang, Sanjay Radia, Ram Marti, and Christopher Harrell Hadoop Security Design‖, Yahoo, 2009.
  10. Rachna Arora, Anshu Parashar, "Secure User Data in Cloud Computing Using Encryption Algorithms" International Journal of Engineering Research and Applications (IJERA) Vol. 3, Issue 4, Jul- Aug 2013, pp.1922-1926.
  11. C.B. Raj Samani “ McAfee threats report 2018”, accessed 2nd Feb  2019.
  12. Duygu Sinanc Terzi; Ramazan Terzi; Seref Sagiroglu, “A survey on security and privacy issues in big data”, 10th International Conference for Internet Technology and Secured Transactions (ICITST), December 2015.
  13. Regha, S., Manimekalai M. “Approval of Data in Hadoop Using Apache Sentry”, International Journal of Computer Sciences and Engineering, Vol.-7, Issue-1, Jan 2019.
  14. Chao YANG, Weiwei LIN, Mingqi LIU, "A Novel Triple Encryption Scheme for Hadoop-based Cloud Data Security", International Conference on Emerging Intelligent Data and Web Technologies, 2013.
  15. GitHub, RJ97/Kuber,  “A Framework for Large Scale Encryption in Hadoop Environment,” Mar. 2017.

Downloads

Published

2023-04-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. A. Antony Prakash, " Security Process in Hadoop Using Diverse Approach, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 2, pp.66-71, March-April-2023. Available at doi : https://doi.org/10.32628/CSEIT239023