Comprehensive Survey on Hadoop Security

  • Maria MartisEmail author
  • Namratha V. Pai
  • R. S. Pragathi
  • S. Rakshatha
  • Sunanda Dixit
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 906)


The new emerging technologies have provided a way for a large amount of data generation. Secure storage of such a huge data is of prime importance. Hadoop is a tool used to store big data, where security of it is not assured. In this paper, we have considered a survey on various approaches which helps in providing secure storage of files in Hadoop. Hadoop framework is developed for the support of processing and storage of Bigdata in a distributed computing environment. Usage of Bigdata has become a key factor for the companies as they can increase their operating margin. Bigdata contains user-sensitive information and bring forth many privacy issues. Bigdata is a larger and a more complex datasets obtained from a variety of network resources. These datasets are beyond the ability of traditionally used data processing software to capture, manage, and process the data within the given time frame. These massive volumes of data are used by many of the organizations to tackle the problem that could not be done before. Since the data holds a lot of valuable information, these data need to be processed in short span of time by which companies can boost their scale and generate more revenue, traditional system resources are not sufficient for processing and storing, and this is where Hadoop comes into picture. The main objective of Hadoop is running of application of bigdata. Hadoop being a great tool for data processing, it was initially designed for internal use (i.e., within local cluster) without any security perimeter of organization, so they were easily hackable and exposed to threats.


Hadoop Data security Big data Authentication Authorization 


  1. 1.
  2. 2.
    Park, S. H., & Jeong, I. R. (2013). A study on security improvement in Hadoop distributed file system based on Kerberos. Journal of the Korea Institute of Information Security and Cryptology, 23(5), 803–813.CrossRefGoogle Scholar
  3. 3.
    Abouelmehdi, K., Beni-Hssane, A., Khaloufi, H., & Saadi, M. (2016). Big Data emerging issues: Hadoop security and privacy. In 2016 5th International Conference on Multimedia Computing and Systems (ICMCS).Google Scholar
  4. 4.
    Gao, Y., Fu, X., Luo, B., Du, X., & Guizani, M. (2015). Haddle: A framework for investigating data leakage attacks in Hadoop. In IEEE 2015.Google Scholar
  5. 5.
    Chen, C. L. P., & Zhang, C. Y. (2014). Data intensive applications, challenges, techniques and technologies: A survey on Big Data. Information Sciences, 275, 314–347.CrossRefGoogle Scholar
  6. 6.
    Zhou, H., & Wen, Q. (2014). A new solution of data security accessing for Hadoop based on CP-ABE. In IEEE 2014.Google Scholar
  7. 7.
  8. 8.
  9. 9.
    Jayan, A., & Upadhyay, B. R. (2017). RC4 in Hadoop security using mapreduce. In 2017 International Conference on Computational Intelligence in Data Science (ICCIDS).Google Scholar
  10. 10.
    Jing, F. A. H., Renfa, S. B. L., & Zhuo, T. C. T. (2013). The research of the data security for cloud disk based on the Hadoop framework. In 2013 Fourth International Conference on Intelligent Control and Information Processing (ICICIP).Google Scholar
  11. 11.
    Jung, Y.-A., & Woo, S.-J. (2015). A study on Hash Chain-based Hadoop security scheme. In IEEE 2015.Google Scholar
  12. 12.
    Yu, X., Ning, P., & Vouk, M. A. Enhancing security of Hadoop in a public cloud. In 2015 6th International Conference on Information and Communication Systems (ICICS).Google Scholar
  13. 13.
    Dean, J., & Ghemawat, S. (2004, December). MapReduce: Simplified data processing on large clusters. In Proceedings of the 6th Conference on Symposium on Operating Systems Design and Implementaton, pp. 137–150.Google Scholar
  14. 14.
    HadoopGIS on the FutureGrid.Google Scholar
  15. 15.
    Jam, M. R., Khanli, L. M., & Akbari, M. K. (2014). A survey on security of Hadoop. In 2014 ICCKE.Google Scholar
  16. 16.
    O’Malley, O., Zhang, K., Radia, S., Marti, R., & Harrell, C. (2009). Hadoop security design. In Yahoo, Inc., Tech. Rep.Google Scholar
  17. 17.
    Yuan, M. (2012). Study of security mechanism based on Hadoop. Information Security and Communications Privacy, 6, 042.Google Scholar
  18. 18.
    Somu, N., Gangaa, A., & Sriram, V. S. S. (2014, April). Authentication service in Hadoop using one time pad. Indian Journal of Science and Technology, 7(4), 56–62.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Maria Martis
    • 1
    Email author
  • Namratha V. Pai
    • 1
  • R. S. Pragathi
    • 1
  • S. Rakshatha
    • 1
  • Sunanda Dixit
    • 1
  1. 1.Department of ISEDayananda Sagar College of EngineeringBangaloreIndia

Personalised recommendations