Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions
Data is growing at an enormous rate in the present world. One of the finest and most popular technologies available for handling and processing that enormous amount of data is the Hadoop ecosystem. Enterprises are increasingly relying on Hadoop for storing their valuable data and processing it. Howe...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2017-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/7922533/ |
_version_ | 1818369834749001728 |
---|---|
author | Raj R. Parmar Sudipta Roy Debnath Bhattacharyya Samir Kumar Bandyopadhyay Tai-Hoon Kim |
author_facet | Raj R. Parmar Sudipta Roy Debnath Bhattacharyya Samir Kumar Bandyopadhyay Tai-Hoon Kim |
author_sort | Raj R. Parmar |
collection | DOAJ |
description | Data is growing at an enormous rate in the present world. One of the finest and most popular technologies available for handling and processing that enormous amount of data is the Hadoop ecosystem. Enterprises are increasingly relying on Hadoop for storing their valuable data and processing it. However, Hadoop is still evolving. There is much vulnerability found in Hadoop, which can question the security of the sensitive information that enterprises are storing on it. In this paper, security issues associated with the framework have been identified. We have also tried to give a brief overview of the currently available solutions and what are their limitations. At the end a novel method is introduced, which can be used to eliminate the found vulnerabilities in the framework. In the modern era, information security has become a fundamental necessity for each and every individual. However, not everyone can afford the specialized distributions provided by different vendors to their Hadoop cluster. This paper presents a cost-effective technique that anyone can use with their Hadoop cluster to give it 3-D security. |
first_indexed | 2024-12-13T23:30:09Z |
format | Article |
id | doaj.art-b36a4fc4987240279319b6397702c717 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-13T23:30:09Z |
publishDate | 2017-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-b36a4fc4987240279319b6397702c7172022-12-21T23:27:26ZengIEEEIEEE Access2169-35362017-01-0157156716310.1109/ACCESS.2017.27002287922533Large-Scale Encryption in the Hadoop Environment: Challenges and SolutionsRaj R. Parmar0Sudipta Roy1https://orcid.org/0000-0001-5161-9311Debnath Bhattacharyya2Samir Kumar Bandyopadhyay3Tai-Hoon Kim4Department of Computer Science and Engineering, U.V. Patel College of Engineering, Ganpat University, Mehsana, IndiaDepartment of Computer Science and Engineering, U.V. Patel College of Engineering, Ganpat University, Mehsana, IndiaDepartment of Computer Science and Engineering, Vignan’s Institute of Information Technology, Visakhapatnam, IndiaDepartment of Computer Science and Engineering, Calcutta University Technology Campus, Kolkata, IndiaDepartment of Convergence Security, Sungshin Women’s University, Seoul, South KoreaData is growing at an enormous rate in the present world. One of the finest and most popular technologies available for handling and processing that enormous amount of data is the Hadoop ecosystem. Enterprises are increasingly relying on Hadoop for storing their valuable data and processing it. However, Hadoop is still evolving. There is much vulnerability found in Hadoop, which can question the security of the sensitive information that enterprises are storing on it. In this paper, security issues associated with the framework have been identified. We have also tried to give a brief overview of the currently available solutions and what are their limitations. At the end a novel method is introduced, which can be used to eliminate the found vulnerabilities in the framework. In the modern era, information security has become a fundamental necessity for each and every individual. However, not everyone can afford the specialized distributions provided by different vendors to their Hadoop cluster. This paper presents a cost-effective technique that anyone can use with their Hadoop cluster to give it 3-D security.https://ieeexplore.ieee.org/document/7922533/Big dataencryptionHadoopinformation securityKerberosSASL |
spellingShingle | Raj R. Parmar Sudipta Roy Debnath Bhattacharyya Samir Kumar Bandyopadhyay Tai-Hoon Kim Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions IEEE Access Big data encryption Hadoop information security Kerberos SASL |
title | Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions |
title_full | Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions |
title_fullStr | Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions |
title_full_unstemmed | Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions |
title_short | Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions |
title_sort | large scale encryption in the hadoop environment challenges and solutions |
topic | Big data encryption Hadoop information security Kerberos SASL |
url | https://ieeexplore.ieee.org/document/7922533/ |
work_keys_str_mv | AT rajrparmar largescaleencryptioninthehadoopenvironmentchallengesandsolutions AT sudiptaroy largescaleencryptioninthehadoopenvironmentchallengesandsolutions AT debnathbhattacharyya largescaleencryptioninthehadoopenvironmentchallengesandsolutions AT samirkumarbandyopadhyay largescaleencryptioninthehadoopenvironmentchallengesandsolutions AT taihoonkim largescaleencryptioninthehadoopenvironmentchallengesandsolutions |