2015
DOI: 10.1016/j.procs.2015.04.091
|View full text |Cite
|
Sign up to set email alerts
|

Big Data and Hadoop-a Study in Security Perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
50
0
4

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 121 publications
(54 citation statements)
references
References 7 publications
0
50
0
4
Order By: Relevance
“…Hadoop contains three nodes-name node, data nodes, an edge node. Name node does the main functionality of HDFS (Data Processing is done here) [5], Data node is used to store data, and edge node maintains relationship between name node and data node. A security mechanism has been employed between the user and name node, using this mechanism user must validate them self to access name node.…”
Section: Security For Hadoopmentioning
confidence: 99%
“…Hadoop contains three nodes-name node, data nodes, an edge node. Name node does the main functionality of HDFS (Data Processing is done here) [5], Data node is used to store data, and edge node maintains relationship between name node and data node. A security mechanism has been employed between the user and name node, using this mechanism user must validate them self to access name node.…”
Section: Security For Hadoopmentioning
confidence: 99%
“…Similarly some tools are developed like Hadoop; kerberos technology can be used for big data storage. [4].…”
Section: Security Issuesmentioning
confidence: 99%
“…It also decreases the data loss and prevents corruption of the file system. [4]. HDFS stores data on the compute nodes, providing high aggregate of bandwidth across the cluster.…”
Section: Hdfs(hadoop Distributed File System)mentioning
confidence: 99%
See 2 more Smart Citations