Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions

Data is growing at an enormous rate in the present world. One of the finest and most popular technologies available for handling and processing that enormous amount of data is the Hadoop ecosystem. Enterprises are increasingly relying on Hadoop for storing their valuable data and processing it. Howe...

Full description

Bibliographic Details
Main Authors: Raj R. Parmar, Sudipta Roy, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay, Tai-Hoon Kim
Format: Article
Language:English
Published: IEEE 2017-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/7922533/
_version_ 1818369834749001728
author Raj R. Parmar
Sudipta Roy
Debnath Bhattacharyya
Samir Kumar Bandyopadhyay
Tai-Hoon Kim
author_facet Raj R. Parmar
Sudipta Roy
Debnath Bhattacharyya
Samir Kumar Bandyopadhyay
Tai-Hoon Kim
author_sort Raj R. Parmar
collection DOAJ
description Data is growing at an enormous rate in the present world. One of the finest and most popular technologies available for handling and processing that enormous amount of data is the Hadoop ecosystem. Enterprises are increasingly relying on Hadoop for storing their valuable data and processing it. However, Hadoop is still evolving. There is much vulnerability found in Hadoop, which can question the security of the sensitive information that enterprises are storing on it. In this paper, security issues associated with the framework have been identified. We have also tried to give a brief overview of the currently available solutions and what are their limitations. At the end a novel method is introduced, which can be used to eliminate the found vulnerabilities in the framework. In the modern era, information security has become a fundamental necessity for each and every individual. However, not everyone can afford the specialized distributions provided by different vendors to their Hadoop cluster. This paper presents a cost-effective technique that anyone can use with their Hadoop cluster to give it 3-D security.
first_indexed 2024-12-13T23:30:09Z
format Article
id doaj.art-b36a4fc4987240279319b6397702c717
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-13T23:30:09Z
publishDate 2017-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-b36a4fc4987240279319b6397702c7172022-12-21T23:27:26ZengIEEEIEEE Access2169-35362017-01-0157156716310.1109/ACCESS.2017.27002287922533Large-Scale Encryption in the Hadoop Environment: Challenges and SolutionsRaj R. Parmar0Sudipta Roy1https://orcid.org/0000-0001-5161-9311Debnath Bhattacharyya2Samir Kumar Bandyopadhyay3Tai-Hoon Kim4Department of Computer Science and Engineering, U.V. Patel College of Engineering, Ganpat University, Mehsana, IndiaDepartment of Computer Science and Engineering, U.V. Patel College of Engineering, Ganpat University, Mehsana, IndiaDepartment of Computer Science and Engineering, Vignan’s Institute of Information Technology, Visakhapatnam, IndiaDepartment of Computer Science and Engineering, Calcutta University Technology Campus, Kolkata, IndiaDepartment of Convergence Security, Sungshin Women’s University, Seoul, South KoreaData is growing at an enormous rate in the present world. One of the finest and most popular technologies available for handling and processing that enormous amount of data is the Hadoop ecosystem. Enterprises are increasingly relying on Hadoop for storing their valuable data and processing it. However, Hadoop is still evolving. There is much vulnerability found in Hadoop, which can question the security of the sensitive information that enterprises are storing on it. In this paper, security issues associated with the framework have been identified. We have also tried to give a brief overview of the currently available solutions and what are their limitations. At the end a novel method is introduced, which can be used to eliminate the found vulnerabilities in the framework. In the modern era, information security has become a fundamental necessity for each and every individual. However, not everyone can afford the specialized distributions provided by different vendors to their Hadoop cluster. This paper presents a cost-effective technique that anyone can use with their Hadoop cluster to give it 3-D security.https://ieeexplore.ieee.org/document/7922533/Big dataencryptionHadoopinformation securityKerberosSASL
spellingShingle Raj R. Parmar
Sudipta Roy
Debnath Bhattacharyya
Samir Kumar Bandyopadhyay
Tai-Hoon Kim
Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions
IEEE Access
Big data
encryption
Hadoop
information security
Kerberos
SASL
title Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions
title_full Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions
title_fullStr Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions
title_full_unstemmed Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions
title_short Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions
title_sort large scale encryption in the hadoop environment challenges and solutions
topic Big data
encryption
Hadoop
information security
Kerberos
SASL
url https://ieeexplore.ieee.org/document/7922533/
work_keys_str_mv AT rajrparmar largescaleencryptioninthehadoopenvironmentchallengesandsolutions
AT sudiptaroy largescaleencryptioninthehadoopenvironmentchallengesandsolutions
AT debnathbhattacharyya largescaleencryptioninthehadoopenvironmentchallengesandsolutions
AT samirkumarbandyopadhyay largescaleencryptioninthehadoopenvironmentchallengesandsolutions
AT taihoonkim largescaleencryptioninthehadoopenvironmentchallengesandsolutions