Monday, December 23, 2019
Hadoop Security Issues And Recommendations - 2855 Words
HADOOP SECURITY ISSUES AND RECOMMENDATIONS ABSTRACT Big Data is creating great opportunities for businesses, companies and many large scale and small scale industries. Hadoop, as an open-source cloud computing and big data framework, is increasingly used in the IT world. The rapid growth of Hadoop and Cloud Computing clearly indicates its importance as a Big Data enabling technology. Due to the loopholes of security mechanism, the security issues introduced through adaptation of this technology are also increasing. Hadoop services do not authenticate users or other services. As a result, Hadoop is subject to security risks. Big Data is already a prime target for vulnerable attacks due to the valuable information it holds. In this paper,†¦show more content†¦Because of this classification of data becomes even more important. Techniques such as encryption, logging, and security measures are required for securing this big data. Usage of the Big data for fraud detection looks very interesting and profit making for many organizati ons. Big data style analyzing of data can solve the problems like advanced threats, cyber security related issues and even malicious intruders. With the use of more sophisticated pattern analysis and with the use of multiple data sources it is easy to detect the threats in early stages of the project itself. Many organizations are fighting with the remaining issues like private issues with the usage of big data. Data privacy is a liability; thus companies must be on privacy defensive. When compared to security, Privacy should consider as profit making asset because it results in the selling of unique product to customers which results in making money. We need to maintain balance between data privacy and national security. Visualization, controlling and inspection of the network links and ports are required to ensure security. Thus there is a necessity to invest ones in understanding the loop holes, challenges, and components prone to attacks with respect to cloud computing, and we n eed to develop a platform and infrastructure which is less protected to
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.