Research Challenges in Big Data Security with Hadoop Platform

  • M. R. Shrihari
  • T. N. ManjunathEmail author
  • R. A. ArchanaEmail author
  • Ravindra S. HegadiEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1037)


Every minute in the internet, enormous volume of data is generating tuning into big data. A new paradigm of data storage and processing is essential. There is extremely no query that Hadoop is an essentially unruly technology. Latest innovation in scalability, appearance, and data dispensation competence has been beating us apiece of few months over the last few years. In this source of ecosystem is the extremely classification of novelty. Big data has distorted data analytics given that extent, presentation, and flexibility that was just not potential a few years ago, at an outlay that was evenly inconceivable. But as Hadoop turn into the new standard of information technology, developers, and security policy are playing grab awake to identify with Hadoop security. Moreover, current security hypothesis and mechanism have been established. In this paper, we discuss lays out a series of recommended security controls for Hadoop along with an access control framework, which enforces access control policies dynamically based on the sensitivity of the data and systemic security, operational security and architecture for data security. A relative study of latest advances in big data for security. A number of prospect information for big data security and privacy methods are discussed.


Big data Hadoop Security Privacy 


  1. 1.
    Shamsi, J.A., Khojaye, M.A.: Understanding privacy violations in big data systems. IT Prof. 20(3), 73–81 (2018)CrossRefGoogle Scholar
  2. 2.
    Mahmou, H., Hegazy, A., Khafagy, M.H.: An approach for big data security based on Hadoop distributed file system, pp. 109–114 (2018) Google Scholar
  3. 3.
    Feng, X., Jia, S., Mai, S.: The research on industrial big data information security risks, pp. 19–23 (2018)Google Scholar
  4. 4.
    Stergiou, C., Psannis, K.E., Xifilidis, T., Plageras, A.P., Gupta, B.B.: Security and privacy of big data for social networking services in cloud, pp. 438–443 (2018)Google Scholar
  5. 5.
    Joshi, N., Kadhiwala, B.: Big data security and privacy issues - a survey, pp. 1–5 (2017)Google Scholar
  6. 6.
    Balaga, T.R., Reram, S., Pi, L.: Hadoop techniques for concise investigation of big data in multi-format data sets, pp. 490–495 (2017)Google Scholar
  7. 7.
    Lee, J.-H., Kim, Y.S., Kim, J.H., Kim, I.K., Han, K.-J.: Building a big data platform for large-scale security data analysis, pp. 976–980 (2017)Google Scholar
  8. 8.
    Hegadi, R.S., et al.: Statistical data quality model for data migration business enterprise. Int. J. Soft Comput. 8, 340–351 (2013). Scholar
  9. 9.
    Manjunath, T.N., et al.: Data quality assessment model for data migration business enterprise. Int. J. Eng. Technol. (IJET) 5(1), February–March 2013. ISSN: 0975-4024Google Scholar
  10. 10.
    Behnia, R., Yavuz, A.A., Ozmen, M.O.: High-speed high-security public key encryption with keyword search. In: Livraga, G., Zhu, S. (eds.) DBSec 2017. LNCS, vol. 10359, pp. 365–385. Springer, Cham (2017). Scholar
  11. 11.
    Shrihari, M.R., Archana, R.A., Manjunath, T.N., Hegadi, R.S.: A review on different methods to protect big data sets, issue 12, p. 4 (2018)Google Scholar
  12. 12.
    Mehmood, A., Natgunanathan, I., Xiang, Y., Hua, G., Guo, S.: Protection of big data privacy, pp. 2169–3536 (2016). IEEECrossRefGoogle Scholar
  13. 13.
    Hongbing, C., Chunming, R., Kai, H., Weihong, W., Yanyan, L.: Secure big data storage and sharing scheme for cloud tenants. China Commun. 12(6), 106–115 (2015)CrossRefGoogle Scholar
  14. 14.
    Wang, H., Jiang, X., Kambourakis, G.: Special issue on security, privacy and trust in network-based big data. Inf. Sci. Int. J. 318, 48–50 (2015)MathSciNetGoogle Scholar
  15. 15.
    Thuraisingham, B.: Big data security and privacy. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, San Antonio, TX, USA, pp. 279–280, 2–4 March 2015Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of ISEBMS Institute of Technology and ManagementBengaluruIndia
  2. 2.Bharathiar UniversityCoimbatoreIndia
  3. 3.School of Computational SciencesSolapur UniversitySolapurIndia

Personalised recommendations