Data is growing at an enormous rate in the present world. One of the finest and most popular technologies available for handling and processing that enormous amount of data is the Hadoop ecosystem. Enterprises are increasingly relying on Hadoop for storing their valuable data and processing it. However, Hadoop is still evolving. There is much vulnerability found in Hadoop, which can question the security of the sensitive information that enterprises are storing on it. In this paper, security issues associated with the framework have been identified. We have also tried to give a brief overview of the currently available solutions and what are their limitations. At the end a novel method is introduced, which can be used to eliminate the found vulnerabilities in the framework. In the modern era, information security has become a fundamental necessity for each and every individual. However, not everyone can afford the specialized distributions provided by different vendors to their Hadoop cluster. This paper presents a cost-effective technique that anyone can use with their Hadoop cluster to give it 3-D security.
[1]
Tom White,et al.
Hadoop: The Definitive Guide
,
2009
.
[2]
Bart Preneel,et al.
A Proof that the ARX Cipher Salsa20 is Secure against Differential Cryptanalysis
,
2013,
IACR Cryptol. ePrint Arch..
[3]
GhemawatSanjay,et al.
The Google file system
,
2003
.
[4]
Vincent Leith,et al.
The Rijndael Block Cipher
,
2010
.
[5]
Daniel J. Bernstein,et al.
The Salsa20 Family of Stream Ciphers
,
2008,
The eSTREAM Finalists.
[6]
Sanjay Ghemawat,et al.
MapReduce: Simplified Data Processing on Large Clusters
,
2004,
OSDI.
[7]
Priya P. Sharma.
Securing Big Data Hadoop : A Review of Security Issues , Threats and Solution
,
2014
.
[8]
Sanjay Ghemawat,et al.
MapReduce: simplified data processing on large clusters
,
2008,
CACM.
[9]
Bhushan Lakhe.
Practical Hadoop Security
,
2014,
Apress.