Abstract
Every minute in the internet, enormous volume of data is generating tuning into big data. A new paradigm of data storage and processing is essential. There is extremely no query that Hadoop is an essentially unruly technology. Latest innovation in scalability, appearance, and data dispensation competence has been beating us apiece of few months over the last few years. In this source of ecosystem is the extremely classification of novelty. Big data has distorted data analytics given that extent, presentation, and flexibility that was just not potential a few years ago, at an outlay that was evenly inconceivable. But as Hadoop turn into the new standard of information technology, developers, and security policy are playing grab awake to identify with Hadoop security. Moreover, current security hypothesis and mechanism have been established. In this paper, we discuss lays out a series of recommended security controls for Hadoop along with an access control framework, which enforces access control policies dynamically based on the sensitivity of the data and systemic security, operational security and architecture for data security. A relative study of latest advances in big data for security. A number of prospect information for big data security and privacy methods are discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shamsi, J.A., Khojaye, M.A.: Understanding privacy violations in big data systems. IT Prof. 20(3), 73–81 (2018)
Mahmou, H., Hegazy, A., Khafagy, M.H.: An approach for big data security based on Hadoop distributed file system, pp. 109–114 (2018)
Feng, X., Jia, S., Mai, S.: The research on industrial big data information security risks, pp. 19–23 (2018)
Stergiou, C., Psannis, K.E., Xifilidis, T., Plageras, A.P., Gupta, B.B.: Security and privacy of big data for social networking services in cloud, pp. 438–443 (2018)
Joshi, N., Kadhiwala, B.: Big data security and privacy issues - a survey, pp. 1–5 (2017)
Balaga, T.R., Reram, S., Pi, L.: Hadoop techniques for concise investigation of big data in multi-format data sets, pp. 490–495 (2017)
Lee, J.-H., Kim, Y.S., Kim, J.H., Kim, I.K., Han, K.-J.: Building a big data platform for large-scale security data analysis, pp. 976–980 (2017)
Hegadi, R.S., et al.: Statistical data quality model for data migration business enterprise. Int. J. Soft Comput. 8, 340–351 (2013). https://doi.org/10.3923/ijscomp.2013.340.351
Manjunath, T.N., et al.: Data quality assessment model for data migration business enterprise. Int. J. Eng. Technol. (IJET) 5(1), February–March 2013. ISSN: 0975-4024
Behnia, R., Yavuz, A.A., Ozmen, M.O.: High-speed high-security public key encryption with keyword search. In: Livraga, G., Zhu, S. (eds.) DBSec 2017. LNCS, vol. 10359, pp. 365–385. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-61176-1_21
Shrihari, M.R., Archana, R.A., Manjunath, T.N., Hegadi, R.S.: A review on different methods to protect big data sets, issue 12, p. 4 (2018)
Mehmood, A., Natgunanathan, I., Xiang, Y., Hua, G., Guo, S.: Protection of big data privacy, pp. 2169–3536 (2016). IEEE
Hongbing, C., Chunming, R., Kai, H., Weihong, W., Yanyan, L.: Secure big data storage and sharing scheme for cloud tenants. China Commun. 12(6), 106–115 (2015)
Wang, H., Jiang, X., Kambourakis, G.: Special issue on security, privacy and trust in network-based big data. Inf. Sci. Int. J. 318, 48–50 (2015)
Thuraisingham, B.: Big data security and privacy. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, San Antonio, TX, USA, pp. 279–280, 2–4 March 2015
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Shrihari, M.R., Manjunath, T.N., Archana, R.A., Hegadi, R.S. (2019). Research Challenges in Big Data Security with Hadoop Platform. In: Santosh, K., Hegadi, R. (eds) Recent Trends in Image Processing and Pattern Recognition. RTIP2R 2018. Communications in Computer and Information Science, vol 1037. Springer, Singapore. https://doi.org/10.1007/978-981-13-9187-3_49
Download citation
DOI: https://doi.org/10.1007/978-981-13-9187-3_49
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-9186-6
Online ISBN: 978-981-13-9187-3
eBook Packages: Computer ScienceComputer Science (R0)