Hadoop Security Challenges and Its Solution Using KNOX

Sirisha N, Kiran K V D, R Karthik

Abstract


Big Data is a new technology and architecture. It can work on a very large volume of a variety of data with high-velocity, discovery, and/or analysis. Big Data is about the fast-growing sources of data such as web logics, Sensor networks, Social media, Internet text and documents, Internet pages, Search Index data, scientific research. Big data also formally introduces a complex range of analysis. Big data can evaluate mixed data (structured and unstructured) from multiple sources. As there are some security issues in big data which are no longer solved using the hashing techniques on large amount of data, this paper shows an idea of new approach of designing a Knox’ified Hadoop cluster.


Keywords


Kerberos; HDFS; Knox; SSL; LDAP; REST API

Full Text:

PDF

References


N.Sirisha,K.V.D.Kiran, “Protection Of Encroachment On Bigdata Aspects”, International Journal of Mechanical Engineering and Technology (IJMET), Volume 8, Issue 7, July 2017, pp. 550–558.

Priya P. Sharma, Chandrakant P. Navdeti , “Securing Big Data Hadoop: A Review of Security Issues, Threats and Solution” ,(IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014, 2126-2131, ISSN:0975-9646.

T.K.Das ,P. Mohan Kumar," BIG Data Analytics: A Framework for Unstructured Data Analysis", International Journal of Engineering and Technology (IJET), ISSN : 0975-4024 Vol 5 No 1 Feb-Mar 2013.

Sanjay Rathee," Big Data and Hadoop with components like Flume, Pig, Hive and Jaql”, International Conference on Cloud, Big Data and Trust 2013, Nov 13-15.

Priya P. Sharma, Chandrakant P. Navdeti, " Securing Big Data Hadoop: A Review of Security Issues, Threats and Solution", (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014, 2126-2131.

Varsha B.Bobade,"Survey Paper on Big Data and Hadoop", International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016

Sanjay Rathee, "Big Data and Hadoop with components like Flume, Pig, Hive and Jaql", International Conference on Cloud, Big Data and Trust 2013, Nov 13-15, RGPV.

Saranya, S.,” Dynamic Preclusion of Encroachment in Hadoop Distributed File System”, Procedia Computer Science 50 (2015): 531-536.

Dr. Md. Tabrez Quasim and Mohammad. Meraj, “Big Data Security and Privacy: A Short Review”, International Journal of Mechanical Engineering and Technology, 8(4), 2017, pp. 408-412.

Vinay Shukla, “Hadoop Security: Today and Tomorrow”, https://hortonworks.com/blog/hadoop-security-today-and-tomorrow,December 09, 2013.

Prachi R. Gawali, Roshani Talmale, Rajesh Babu,"Hadoop Security- A Review", International Journal of Innovative Research in Computer and Communication Engineering ,Vol. 3, Issue 10, October 2015.

Horton works “Technical Preview for Apache Knox Gateway”

"KNOX", Apache Knox Gateway 0.9.x User’s Guide, https://knox.apache.org/books/knox-0-9-0/user-guide.html.

"HDP Documentation", https://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.3.0/bk-know- Gateway-Admin-Guide/content.

IbrahimAbaker, TargioHashemaIbrar, Yaqoob, NorBadrulAnuar, SalimahMokhtar, AbdullahGania, SameeUllah Khan, "The rise of “big data” on cloud computing: Review and open research issues" Information Systems 47 (2015) 98–115.

Seref sagiroglu and Duygu SINANC, “Big Data: A Review Collaboration Technologies and Systems (CTS), 2013 International Conference ,May 2013“

Victor L. Voydock and Stephen T. Kent “Security mechanisms in high-level network protocols. ACM Comput. Surv.1983”.

Sujitha, G., et al. Improving security of parallel algorithm using key encryption technique. Information Technology Journal 12.12 (2013): 2398.

Cohen, Jason C., and Subrata Acharya.” Towards a trusted HDFS storage platform: Mitigating threats to Hadoop infrastructures using hardware-accelerated encryption with TPM-rooted key protection”. Journal of Information Security and Applications 19.3 (2014): 224-244.

Hashem, Ibrahim Abaker Targio, et al. The rise of “big data” on cloud computing: Review and open research issues. Information Systems 47 (2015): 98-115.

Jeong, Yoon-Su, and Yong-Tae Kim. A token-based authentication security scheme for Hadoop distributed file system using elliptic curve cryptography. Journal of Computer Virology and Hacking Techniques 11.3 (2015): 137-142.

Jeong, Yoon-Su, Seung-Soo Shin, and Kun-Hee Han. High-dimentional data authentication protocol based on hash chain for Hadoop systems. Cluster Computing 19.1 (2016): 475- 484.

Saraladevi, B., et al. Big Data and Hadoop-A study in security perspective. Procedia computer science 50 (2015): 596-601.

Dr. Md. Tabrez Quasim and Mohammad. Meraj, Big Data Security and Privacy: A Short Review, International Journal of Mechanical Engineering and Technology, 8(4), 2017, pp. 408-412.




DOI: http://doi.org/10.11591/ijeecs.v12.i1.pp%25p
Total views : 148 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

shopify stats IJEECS visitor statistics