2015 Long Island Systems, Applications and Technology 2015
DOI: 10.1109/lisat.2015.7160211
|View full text |Cite
|
Sign up to set email alerts
|

Hadoop eco system for big data security and privacy

Abstract: Privacy and Security of Big Data is gaining high importance since recently all the technologies started to depend on Big Data. In this paper, we are going to discuss particularly Hadoop and difficulty in maintaining the privacy and security of Big Data. The main goal is to propose a Hadoop system that maintains the privacy and security of the information stored on the cloud.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(10 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…(This part develops the previous study presented in [9])According to the results obtained previously, vulnerabilities number remains high, and their exploitation, as described by the first 10 OWASP [13] aims to undermine the integrity or the availability of the information system with the possibility of viral contamination. The number of vulnerabilities progresses in an exponential way until the years 2006 and 2017.…”
Section: Fig 3: Big Data Processing Systems Vulnerabilities Over Thementioning
confidence: 76%
See 1 more Smart Citation
“…(This part develops the previous study presented in [9])According to the results obtained previously, vulnerabilities number remains high, and their exploitation, as described by the first 10 OWASP [13] aims to undermine the integrity or the availability of the information system with the possibility of viral contamination. The number of vulnerabilities progresses in an exponential way until the years 2006 and 2017.…”
Section: Fig 3: Big Data Processing Systems Vulnerabilities Over Thementioning
confidence: 76%
“…To carry out an assessment of a vulnerability and the capabilities of a group of threats, it will be necessary first to define the number of vulnerabilities detected over the years by Big Data management systems [9]. According to studies interested in data security, such as the annual report of cisco and cyber Security [12] , OWASP [13], and other studies work on the situation of Big Data, as well as to the security situation of systems allowing Big Data treatment, the annual Big Data guides as example, we have been able to make a graph showing the evolution of Big Data management systems vulnerabilities over the years, from 1999, until 2017 [9].…”
Section: Big Data Processing Systems Vulnerabilities Over Thementioning
confidence: 99%
“…To overcome these reasons, some advanced techniques and technologies are developed to monitor, protect and audit big data processes. Considering the related survey, this paper has classified privacy and security issues for big data under 5 titles as Lack of High secure Design, Hadoop security, cloud security, monitoring and auditing, key management and Anonymization [4]. …”
Section: Challenging Issues For Security In Big Datamentioning
confidence: 99%
“…Each data node has only a portion of data and manages their portion of data, as per the instruction from the name node. Backup node updates its status, at prescribed checkpoints, to recover name node, in case of any failures . The advantage of using the framework is the increasing performance of data analysis with support for parallel processing, without the apprehension about managing the distributed environment process (which is internally managed by the framework) …”
Section: Introductionmentioning
confidence: 99%