2019
DOI: 10.1007/978-981-13-6001-5_17
|View full text |Cite
|
Sign up to set email alerts
|

Comprehensive Survey on Hadoop Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…3 Department of Computer Science and Engineering, JNTUA , Anantapuramu, Andhra Pradesh, India. 4 JNTU Anantapur, Anantapuramu, Andhra Pradesh, India.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…3 Department of Computer Science and Engineering, JNTUA , Anantapuramu, Andhra Pradesh, India. 4 JNTU Anantapur, Anantapuramu, Andhra Pradesh, India.…”
Section: Resultsmentioning
confidence: 99%
“…Many new services were contributed to Apache Hadoop framework after it became open source. The amount of security features were very less in Hadoop 1.0 and security features incorporated in Hadoop 2.0 were also inadequate [4]. In this section we will present the existing security features of Hadoop framework along with their limitations.…”
Section: Security Features In Hadoop and Its Limitationsmentioning
confidence: 99%
“…The recent boom in the Bigdata technology demands secure computing platforms. As per a study conducted by (1), there exist many security loopholes in Apache Hadoop Systems. These include the absence of any strong encryption between the client and Hadoop Server and the data is stored in unencrypted format.…”
Section: Introductionmentioning
confidence: 97%
“…Security overview [47], published by Cloudera, which provides services based on Hadoop, describes three security issues (i.e., authentication, encryption, and authorization). In addition, some studies [48][49][50] convey the meanings such as authentication, authorization, encryption, monitoring the system by expressing them such as access control, permission, data security at respite, data security internode communication, inspection, and classification. Therefore, the security requirements for a data processing platform of a C4I big data system could be organized into four categories: authentication, authorization, encryption, and security monitoring and audit.…”
mentioning
confidence: 99%