Skip to main content

Research Challenges in Big Data Security with Hadoop Platform

  • Conference paper
  • First Online:
Recent Trends in Image Processing and Pattern Recognition (RTIP2R 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1037))

Abstract

Every minute in the internet, enormous volume of data is generating tuning into big data. A new paradigm of data storage and processing is essential. There is extremely no query that Hadoop is an essentially unruly technology. Latest innovation in scalability, appearance, and data dispensation competence has been beating us apiece of few months over the last few years. In this source of ecosystem is the extremely classification of novelty. Big data has distorted data analytics given that extent, presentation, and flexibility that was just not potential a few years ago, at an outlay that was evenly inconceivable. But as Hadoop turn into the new standard of information technology, developers, and security policy are playing grab awake to identify with Hadoop security. Moreover, current security hypothesis and mechanism have been established. In this paper, we discuss lays out a series of recommended security controls for Hadoop along with an access control framework, which enforces access control policies dynamically based on the sensitivity of the data and systemic security, operational security and architecture for data security. A relative study of latest advances in big data for security. A number of prospect information for big data security and privacy methods are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shamsi, J.A., Khojaye, M.A.: Understanding privacy violations in big data systems. IT Prof. 20(3), 73–81 (2018)

    Article  Google Scholar 

  2. Mahmou, H., Hegazy, A., Khafagy, M.H.: An approach for big data security based on Hadoop distributed file system, pp. 109–114 (2018)

    Google Scholar 

  3. Feng, X., Jia, S., Mai, S.: The research on industrial big data information security risks, pp. 19–23 (2018)

    Google Scholar 

  4. Stergiou, C., Psannis, K.E., Xifilidis, T., Plageras, A.P., Gupta, B.B.: Security and privacy of big data for social networking services in cloud, pp. 438–443 (2018)

    Google Scholar 

  5. Joshi, N., Kadhiwala, B.: Big data security and privacy issues - a survey, pp. 1–5 (2017)

    Google Scholar 

  6. Balaga, T.R., Reram, S., Pi, L.: Hadoop techniques for concise investigation of big data in multi-format data sets, pp. 490–495 (2017)

    Google Scholar 

  7. Lee, J.-H., Kim, Y.S., Kim, J.H., Kim, I.K., Han, K.-J.: Building a big data platform for large-scale security data analysis, pp. 976–980 (2017)

    Google Scholar 

  8. Hegadi, R.S., et al.: Statistical data quality model for data migration business enterprise. Int. J. Soft Comput. 8, 340–351 (2013). https://doi.org/10.3923/ijscomp.2013.340.351

    Article  Google Scholar 

  9. Manjunath, T.N., et al.: Data quality assessment model for data migration business enterprise. Int. J. Eng. Technol. (IJET) 5(1), February–March 2013. ISSN: 0975-4024

    Google Scholar 

  10. Behnia, R., Yavuz, A.A., Ozmen, M.O.: High-speed high-security public key encryption with keyword search. In: Livraga, G., Zhu, S. (eds.) DBSec 2017. LNCS, vol. 10359, pp. 365–385. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-61176-1_21

    Chapter  Google Scholar 

  11. Shrihari, M.R., Archana, R.A., Manjunath, T.N., Hegadi, R.S.: A review on different methods to protect big data sets, issue 12, p. 4 (2018)

    Google Scholar 

  12. Mehmood, A., Natgunanathan, I., Xiang, Y., Hua, G., Guo, S.: Protection of big data privacy, pp. 2169–3536 (2016). IEEE

    Article  Google Scholar 

  13. Hongbing, C., Chunming, R., Kai, H., Weihong, W., Yanyan, L.: Secure big data storage and sharing scheme for cloud tenants. China Commun. 12(6), 106–115 (2015)

    Article  Google Scholar 

  14. Wang, H., Jiang, X., Kambourakis, G.: Special issue on security, privacy and trust in network-based big data. Inf. Sci. Int. J. 318, 48–50 (2015)

    MathSciNet  Google Scholar 

  15. Thuraisingham, B.: Big data security and privacy. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, San Antonio, TX, USA, pp. 279–280, 2–4 March 2015

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to T. N. Manjunath , R. A. Archana or Ravindra S. Hegadi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shrihari, M.R., Manjunath, T.N., Archana, R.A., Hegadi, R.S. (2019). Research Challenges in Big Data Security with Hadoop Platform. In: Santosh, K., Hegadi, R. (eds) Recent Trends in Image Processing and Pattern Recognition. RTIP2R 2018. Communications in Computer and Information Science, vol 1037. Springer, Singapore. https://doi.org/10.1007/978-981-13-9187-3_49

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-9187-3_49

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-9186-6

  • Online ISBN: 978-981-13-9187-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics